Filter interviews by
I applied via Walk-in and was interviewed in Mar 2022. There were 3 interview rounds.
Top trending discussions
posted on 6 Feb 2020
I applied via Naukri.com and was interviewed in Aug 2019. There were 3 interview rounds.
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
I applied via LinkedIn and was interviewed in May 2021. There were 3 interview rounds.
Handled a critical situation with a customer
Identified the issue and its impact on the customer
Communicated effectively with the customer to understand their concerns
Collaborated with the team to find a solution
Implemented the solution and ensured customer satisfaction
Followed up with the customer to ensure the issue was resolved
NGFw stands for Next-Generation Firewall and it has advanced features compared to traditional firewalls.
NGFw can identify and block advanced threats like malware, ransomware, and phishing attacks.
It can perform deep packet inspection to analyze network traffic and detect anomalies.
NGFw can also provide application-level visibility and control to manage network traffic based on application usage.
It can integrate with ot...
SSL handshake and IPsec negotiation are both security protocols used to establish secure communication channels.
SSL handshake is used to establish secure communication between a client and a server over the internet.
IPsec negotiation is used to establish secure communication between two network devices.
SSL handshake uses a combination of public and private keys to encrypt and decrypt data.
IPsec negotiation uses a combi...
posted on 19 Nov 2021
I applied via Recruitment Consultant and was interviewed before Nov 2020. There were 4 interview rounds.
posted on 22 Feb 2022
I applied via Naukri.com and was interviewed before Feb 2021. There were 2 interview rounds.
Phase 1 is for establishing a secure channel and Phase 2 is for negotiating IPSec SAs.
IKEv1 is a protocol used for VPN tunneling
Phase 1 negotiates the parameters for the secure channel
Phase 2 negotiates the IPSec SAs for data transmission
Phase 1 uses Diffie-Hellman for key exchange
Phase 2 uses either AH or ESP for data encryption and authentication
NAT-T is a protocol used to encapsulate and encrypt IPsec traffic when NAT is used in the network.
NAT-T stands for Network Address Translation - Traversal
It allows IPsec traffic to pass through NAT devices
It encapsulates and encrypts IPsec traffic in UDP packets
It uses port 4500 by default
Example: A remote worker using a VPN to connect to their company's network from a hotel room with a NAT router
TCP flags are control bits used in TCP to indicate the status of a connection.
TCP flags are 6 bits in the TCP header.
They are used to indicate the status of a connection, such as whether it is being opened, closed, or reset.
Some common TCP flags include SYN, ACK, FIN, RST, and URG.
SYN is used to initiate a connection, ACK is used to acknowledge receipt of data, FIN is used to terminate a connection, RST is used to rese...
SSL Inspection is a process of intercepting and decrypting SSL/TLS traffic to inspect it for security purposes.
SSL Inspection intercepts SSL/TLS traffic and decrypts it
It allows inspection of encrypted traffic for security threats
It requires a trusted root certificate to be installed on the device
It can cause issues with end-to-end encryption and privacy concerns
SSL handshake is a process of establishing a secure connection between a client and a server.
Client sends a request to the server to initiate the SSL handshake
Server responds with its SSL certificate
Client verifies the certificate and generates a symmetric key
Client sends a message encrypted with the symmetric key to the server
Server decrypts the message and sends a confirmation to the client
The SSL handshake is comple
posted on 5 Aug 2024
Some common commands for technical support engineers include ping, ipconfig, and tracert.
Ping: Used to test the reachability of a host on an IP network.
Ipconfig: Displays all current TCP/IP network configuration values.
Tracert: Shows the route that packets take to reach a specified destination.
posted on 7 Nov 2022
I applied via LinkedIn and was interviewed in Oct 2022. There were 3 interview rounds.
Basics test, maths and logical
posted on 10 Sep 2020
I applied via Referral and was interviewed in Mar 2020. There were 4 interview rounds.
Data Integrity refers to the accuracy and consistency of data throughout its lifecycle.
Ensuring data is not corrupted or modified without authorization
Maintaining data accuracy and consistency through proper storage and retrieval
Preventing data loss or unauthorized access
Examples: checksums, encryption, access controls
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
based on 1 review
Rating in categories
Software Development Engineer
231
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Support Engineer
143
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
126
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
73
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
44
salaries
| ₹0 L/yr - ₹0 L/yr |
Gen
Trend Micro
Kaspersky Lab
Sophos Technologies