Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Aug 2023. There were 3 interview rounds.
General knowledge, General Maths
Change management is the process of planning, implementing, and controlling changes to systems or processes in an organization.
Involves identifying the need for change
Planning and implementing the change
Communicating the change to stakeholders
Managing resistance to change
Evaluating the impact of the change
Service Level Agreement is a contract between a service provider and a customer that outlines the level of service expected.
Defines the services to be provided
Specifies the responsibilities of both parties
Outlines the metrics used to measure performance
Includes penalties for not meeting agreed-upon service levels
Can cover aspects like uptime, response time, and resolution time
Example: An SLA between a cloud service pro
My expectation is to utilize my skills and knowledge to effectively analyze security threats and vulnerabilities, and implement measures to protect the organization's assets.
Expectation to continuously monitor and analyze security threats
Ability to identify vulnerabilities and recommend solutions
Implementing security measures to protect assets
Collaborating with team members to enhance security posture
I am passionate about cybersecurity and believe in the mission and values of your organization.
I have a strong background in cybersecurity and am eager to apply my skills in a challenging environment.
I admire the innovative approach your organization takes towards security and want to be a part of that.
I have heard great things about the team culture and professional development opportunities here.
Top trending discussions
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Basic questions related to speed, time, efficiency
5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.
5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.
5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.
5GHz offers more available channels, reducing the likelihood of congest...
Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.
Enable routing features on the switch
Configure routing protocols such as OSPF or EIGRP
Assign IP addresses to interfaces
Implement access control lists for security
Install a routing software image if necessary
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed in May 2022. There were 5 interview rounds.
Written exam on Scenario based ethical hacking questions and coding.
posted on 30 Sep 2021
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
The phases of site-to-site VPN are the steps involved in establishing and maintaining a secure connection between two networks.
Phase 1: Authentication and key exchange
Phase 2: Data encryption and tunnel establishment
Phase 3: Traffic protection and monitoring
Each phase has its own set of protocols and processes
For example, in Phase 1, the VPN peers authenticate each other using methods like pre-shared keys or digital ce
NAT stands for Network Address Translation. It is a technique used to map a public IP address to a private IP address.
NAT is used to conserve public IP addresses.
It allows multiple devices to share a single public IP address.
NAT can be implemented using hardware or software.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
BGP stands for Border Gateway Protocol, a routing protocol used to exchange routing information between different networks.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that selects the best path for data to travel based on various attributes.
BGP is used by internet service providers (ISPs) to exchange routing information with each other.
It is a complex protocol t...
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Basic questions related to speed, time, efficiency
5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.
5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.
5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.
5GHz offers more available channels, reducing the likelihood of congest...
Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.
Enable routing features on the switch
Configure routing protocols such as OSPF or EIGRP
Assign IP addresses to interfaces
Implement access control lists for security
Install a routing software image if necessary
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network ...
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link c...
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test ...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
based on 1 interview
Interview experience
Senior Engineer
31
salaries
| ₹4 L/yr - ₹9.7 L/yr |
Engineer
26
salaries
| ₹3.6 L/yr - ₹7.5 L/yr |
SQL Developer
26
salaries
| ₹2.7 L/yr - ₹6 L/yr |
Team Lead
22
salaries
| ₹6.2 L/yr - ₹16.5 L/yr |
Software Developer
15
salaries
| ₹2.4 L/yr - ₹8 L/yr |
TCS
Wipro
Infosys
HCLTech