Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Movate Team. If you also belong to the team, you can get access from here

Movate Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Movate Network Security Interview Questions, Process, and Tips

Updated 4 Apr 2022

Movate Network Security Interview Experiences

1 interview found

I was interviewed in Jun 2021.

Round 1 - Video Call 

(5 Questions)

Round duration - 60 minutes
Round difficulty - Medium

This was a technical round with questions entirely based on Networking.

  • Q1. Why is transport layer necessary for communication in computer networks?
  • Q2. What is a subnet mask?
  • Q3. Why is VLAN needed?
  • Q4. What are the different types of Address Resolution Protocol (ARP)?
  • Q5. What is the difference between a MAC Address and an IP Address?
Round 2 - HR 

Round duration - 30 minutes
Round difficulty - Easy

This was a typical managerial round.

Interview Preparation Tips

Eligibility criteriaAbove 7 CGPACSS Corp interview preparation:Topics to prepare for the interview - Networking, Fundamentals of Operating System, Cloud computing, Firewalls and Security, Troubleshooting ProcessesTime required to prepare for the interview - 5 monthsInterview preparation tips for other job seekers

Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : This interview is basically to know if you have clarity on your basics and how things actually happen rather than just theory. My advice would be have a thorough knowledge and be very clear on the packet flow and how does it happen.

Application resume tips for other job seekers

Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.

Final outcome of the interviewSelected

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What are the information in TCP IP Header?
  • Ans. 

    TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

    • Source IP address

    • Destination IP address

    • Source port number

    • Destination port number

    • Sequence number

    • Acknowledgment number

    • Header length

    • Checksum

  • Answered by AI
  • Q2. What is App ID in Palo Alto Firewalls?
  • Ans. 

    App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

    • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

    • It allows administrators to create policies based on specific applications rather than just ports or protocols.

    • App ID helps in enhancing security by allowing granular ...

  • Answered by AI
  • Q3. What is the SP3 Architecture of Palo Alto Firewalls?
  • Ans. 

    SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.

    • SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)

    • Security Processing Plane (SP) handles security functions like threat prevention and decryption

    • Control Plane (C) manages routing and firewall policies

    • Data Plane (D) processes and forwards traffic based on firewall pol...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Very Technical questions, starting from packet parsing and analysis.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic questions
Round 2 - Technical 

(1 Question)

  • Q1. Security basic questions
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What do you understand by RSA?
  • Ans. 

    RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.

    • RSA is a public-key cryptosystem used for secure data transmission.

    • It involves generating a public key and a private key for encryption and decryption.

    • RSA encryption is based on the difficulty of factoring large prime numbers.

    • It is commonly used in secure communication protocols like HTTPS.

    • RSA can be used for digital signa

  • Answered by AI
  • Q2. Basic principles of security management?
  • Ans. 

    Basic principles of security management involve risk assessment, access control, incident response, and security awareness.

    • Risk assessment: Identifying and evaluating potential risks to the organization's security.

    • Access control: Implementing measures to control who has access to sensitive information or resources.

    • Incident response: Developing plans and procedures to respond to security incidents effectively.

    • Security a...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be yourself
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is OWASP and it's attributes?
  • Ans. 

    OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.

    • OWASP provides resources such as tools, documentation, and guidelines for web application security.

    • It publishes a list of the top 10 most critical web application security risks.

    • OWASP also offers training and conferences to educate professionals on security best practices.

  • Answered by AI

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI

I applied via Referral and was interviewed in Oct 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Packet flow fortigate
  • Q2. IPsec VPN troubleshooting
Round 3 - Technical 

(2 Questions)

  • Q1. Fortigate proxy and flow mode
  • Q2. How to design HA in active passive environment
  • Ans. 

    Designing HA in active passive environment involves ensuring redundancy and failover mechanisms.

    • Identify critical components and services that require high availability

    • Implement redundancy by setting up a secondary system that can take over in case of failure

    • Ensure automatic failover mechanisms are in place to minimize downtime

    • Regularly test the failover mechanisms to ensure they work as expected

    • Consider load balancing...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Please prepares strong for networking fundamentals

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is the architecture of a Checkpoint firewall and how does packet flow through it?
Round 2 - HR 

(1 Question)

  • Q1. What are your expected salary and notice period?

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.5k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.7k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.9k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
DXC Technology Interview Questions
3.7
 • 817 Interviews
Mphasis Interview Questions
3.4
 • 810 Interviews
Nagarro Interview Questions
4.0
 • 778 Interviews
View all
Senior Engineer
1.5k salaries
unlock blur

₹2.4 L/yr - ₹10.2 L/yr

Technical Support Engineer
1.5k salaries
unlock blur

₹1 L/yr - ₹8 L/yr

Network Engineer
1.1k salaries
unlock blur

₹1.8 L/yr - ₹9 L/yr

Engineer
1.1k salaries
unlock blur

₹1.8 L/yr - ₹8.5 L/yr

Specialist
323 salaries
unlock blur

₹4.5 L/yr - ₹15.7 L/yr

Explore more salaries
Compare Movate with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview