Filter interviews by
I applied via Approached by Company and was interviewed before Apr 2023. There was 1 interview round.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
Each layer of the OSI model has specific functions and interacts with adjacent layers.
Examples of OSI model layers include physical lay...
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help improve network security by isolating traffic between different groups of users.
Types of VLANs include: port-based VLANs, MAC address-based VLANs, protocol-based VLANs, and subnet-based VLANs.
For example, a company may have separate VLANs for finance,...
VPN stands for Virtual Private Network, a secure connection between two or more devices over the internet. Protocol is a set of rules for communication between devices.
VPN allows users to securely access a private network and share data remotely
Protocols define how data is formatted, transmitted, and received
Examples of VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2
Examples of communication protocols include TCP,
Top trending discussions
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Data link layer is responsible for transferring data between adjacent network nodes.
Data link layer ensures error-free transmission of data over the physical layer.
It divides data into frames for transmission.
It also handles flow control and error detection/correction.
Examples include Ethernet, Wi-Fi, and PPP protocols.
DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used to assign IP addresses automatically to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS server addresses automatically
DHCP servers lease IP addresses to devices for a specific period of time
DHCP ...
The preferred location for a Network Security Engineer is typically in a secure office environment with access to necessary equipment and resources.
Secure office environment with restricted access to unauthorized personnel
Access to necessary equipment and resources such as servers, firewalls, and monitoring tools
Proximity to the IT team for collaboration and communication
Possibly located near the data center for quick
posted on 26 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.
STP elects a root bridge to serve as the central point in the network
Each switch determines the best path to the root bridge based on the lowest path cost
Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Jan 2022. There were 2 interview rounds.
I applied via LinkedIn and was interviewed before May 2022. There were 2 interview rounds.
Network Security Engineer
6
salaries
| ₹3 L/yr - ₹5 L/yr |
TCS
Accenture
Wipro
Cognizant