Filter interviews by
Be the first one to contribute and help others!
I was interviewed in Oct 2024.
To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.
Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.
Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.
Ensure that the IPsec tunnel is properly configured and tested for secure d...
To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.
Check the IPsec configuration on both ends to ensure they match
Verify that the tunnel endpoints can reach each other
Monitor logs on both devices for any error messages related to the tunnel
Use packet capture tools like Wireshark to analyze traffic going through the tunnel
SSL VPN allows remote users to securely access the network from any location.
SSL VPN uses encryption to secure the connection between the remote user and the network.
It authenticates users before granting access to resources.
SSL VPN can be set up using a web browser or a client application.
It provides a secure way for remote employees to access company resources.
SSL VPN can be configured to restrict access based on use
Configuring IPsec tunnel for 3 different locations and explaining traffic flow
Configure IPsec tunnel on routers/firewalls at each location
Set up IPsec policies for encryption and authentication
Define IPsec tunnel endpoints and establish secure communication
Ensure proper routing between locations for traffic flow
Monitor and troubleshoot the IPsec tunnel for any issues
To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.
Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.
Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...
To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.
Check the IPsec configurations on both ends to ensure they match
Verify network connectivity between the two locations
Check firewall and security policies to ensure they are not blocking the IPsec traffic
Review logs on both ends for any error messages or indications of the issue
Restart the IPsec serv
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Ai interview backend microservices core java
I applied via Walk-in and was interviewed in Nov 2023. There were 3 interview rounds.
Surging is a phenomenon in which a system experiences rapid and temporary increases in pressure or flow rate.
Surging can occur in various systems such as pipelines, compressors, pumps, and turbines.
It is often caused by sudden changes in demand, equipment malfunctions, or improper system design.
Surging can lead to damage to equipment, reduced efficiency, and safety hazards.
Examples include water hammer in pipelines and
Froude number is a dimensionless number used to quantify the influence of gravity on fluid flow.
Froude number is defined as the ratio of inertia force to gravitational force in a fluid flow.
It is used to determine the type of flow (subcritical, critical, or supercritical) in open channel flow.
Froude number is calculated as Fr = V / sqrt(g * d), where V is velocity, g is acceleration due to gravity, and d is depth of fl
Weeping is the process of fluid leaking out of a solid material, often due to damage or excess moisture.
Weeping can occur in materials such as wood, concrete, and metal.
It is often a sign of structural damage or deterioration.
Examples include water weeping from a crack in a wall or oil weeping from a car engine.
Weeping can also refer to the shedding of tears in humans and animals.
A basic PFD of a WTP plant including feed quality and sensors.
Include feed quality parameters such as turbidity, pH, temperature, and flow rate
Include sensors for monitoring parameters like chlorine levels, pressure, and conductivity
Show the flow of water through various treatment processes like coagulation, flocculation, sedimentation, filtration, and disinfection
Process checks in line testing of a 6inch dia pigging line and associated calculations
Pressure testing to ensure integrity of the line
Flow testing to check for blockages or restrictions
Calibration of pigging equipment for accurate results
Calculations involve pressure drop, flow rate, and pigging efficiency
Recording and analyzing data for future reference
I applied via Naukri.com and was interviewed in Dec 2023. There were 2 interview rounds.
Use SQL query to fetch maximum and minimum salary from emp table
Use SELECT MAX(salary) FROM emp to fetch maximum salary
Use SELECT MIN(salary) FROM emp to fetch minimum salary
Indexes and exceptions are used to optimize database performance and handle errors in code.
Indexes are used to quickly retrieve data from a database by creating a sorted list of values.
Exceptions are used to handle errors in code and prevent the program from crashing.
Examples: Creating indexes on frequently queried columns like 'id' or 'timestamp'. Using try-catch blocks to handle exceptions like divide by zero.
GD&T stands for Geometric Dimensioning and Tolerancing. It is a system for defining and communicating engineering tolerances.
GD&T is used to specify the allowable variations in form, size, and orientation of part features.
It helps improve communication between designers, engineers, and manufacturers by providing a clear and concise way to define part requirements.
GD&T uses symbols, such as position, concentricity, and ...
First angle projection is commonly used in Europe and Asia, while third angle projection is commonly used in North America.
First angle projection places the object in the first quadrant, with the plane of projection between the observer and the object.
Third angle projection places the object in the third quadrant, with the plane of projection behind the object.
First angle projection is commonly used in Europe and Asia,...
Java hash map is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.
HashMap in Java implements the Map interface and allows null keys and values.
It uses hashing to store and retrieve key-value pairs, providing O(1) time complexity for get() and put() operations.
Example: HashMap
I applied via Company Website and was interviewed before Mar 2023. There were 3 interview rounds.
Hacker Rank test with medium difficulty
A case study for a problem statement
posted on 21 Mar 2021
I applied via Referral and was interviewed in Feb 2021. There was 1 interview round.
A unique not null column can be used as a primary key, but not vice versa.
Primary key must be unique and not null, but not all unique not null columns need to be primary keys.
Primary key is used to identify each row uniquely, while unique not null column is used to ensure data integrity.
A table can have multiple unique not null columns, but only one primary key.
Null cannot be equated as it represents absence of a value.
Null is not equal to any value, including itself.
Attempting to equate null can result in unexpected behavior.
Null is often used to represent the absence of a value or unknown value.
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
SIEM tools are security information and event management tools used to collect, analyze, and report on security data.
SIEM tools help organizations to detect and respond to security incidents in real-time.
They collect data from various sources such as network devices, servers, and applications.
SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.
Examples of SIEM tools i...
Yes, I have experience writing playbooks rules for automation in various engineering projects.
Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.
I have experience creating rule-based automation scripts to streamline engineering processes.
I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.
Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.
Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.
Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.
Analyzing the evidence using specialized tools and techniques to uncover ...
Senior Research Analyst
4
salaries
| ₹9.7 L/yr - ₹21 L/yr |
Nielsen
Euromonitor International
GfK MODE
Kantar