Filter interviews by
I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.
The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.
ASA firewall has security levels assigned to interfaces to control traffic flow
The 8.3 version of ASA introduced significant changes in NAT configuration
Transparent mode firewall operates at Layer 2 and d...
posted on 13 Oct 2022
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
posted on 3 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
Wireless refers to the transmission of data without the use of physical cables or wires.
Wireless technology uses radio waves to transmit data over a network.
Examples of wireless technology include Wi-Fi, Bluetooth, and cellular networks.
Wireless networks are convenient for mobile devices and allow for greater flexibility in connectivity.
Switch congestion occurs when a network switch is overwhelmed with traffic, leading to delays or dropped packets.
Switch congestion can occur when there is a high volume of data being transmitted through the switch
It can lead to delays in data transmission or even dropped packets
Switch congestion can be alleviated by implementing Quality of Service (QoS) policies or upgrading to higher capacity switches
Wireless device configuration involves setting up and managing wireless networks for optimal performance.
Understand the network requirements and goals
Select appropriate wireless devices and access points
Configure SSIDs, security settings, and encryption protocols
Optimize placement of access points for coverage and performance
Monitor and troubleshoot network performance
posted on 30 Jun 2022
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
based on 4 reviews
Rating in categories
Senior Engineer
369
salaries
| ₹2.3 L/yr - ₹5.5 L/yr |
Senior Administrator
269
salaries
| ₹3.7 L/yr - ₹14 L/yr |
Sme Associate
218
salaries
| ₹7.1 L/yr - ₹17 L/yr |
System Administrator
211
salaries
| ₹2.2 L/yr - ₹7.6 L/yr |
Senior Analyst
196
salaries
| ₹4 L/yr - ₹12 L/yr |
Wipro
HCLTech
Tech Mahindra
TCS