i
Movate
Filter interviews by
I have handled various types of tickets including network connectivity issues, security policy configurations, VPN troubleshooting, and software upgrades.
Network connectivity issues
Security policy configurations
VPN troubleshooting
Software upgrades
Day to day work activities involve troubleshooting network issues, configuring devices, and providing technical support to customers.
Troubleshooting network issues
Configuring devices
Providing technical support to customers
TCP and SSL headers are used in network communication to provide reliable and secure data transmission.
TCP header contains source and destination port numbers, sequence and acknowledgment numbers, and control flags.
SSL header contains information about the SSL version, cipher suite, and other parameters for secure communication.
TCP header is 20 bytes long, while SSL header size varies depending on the SSL version ...
Troubleshooting IPsec involves understanding its phases: IKE and IPsec, and common issues like authentication and tunnel establishment.
Phase 1 (IKE): Establishes a secure channel. Check for mismatched pre-shared keys or certificates.
Phase 2 (IPsec): Negotiates the IPsec tunnel. Verify the correct transform sets and traffic selectors.
Use 'show crypto isakmp sa' to check IKE status and 'show crypto ipsec sa' for IPs...
ARP (Address Resolution Protocol) is used to map a network address (such as an IP address) to a physical address (such as a MAC address).
ARP is used in Ethernet networks to find the MAC address of a device based on its IP address.
When a device needs to send data to another device on the network, it sends an ARP request asking for the MAC address of the destination device.
The destination device responds with its MA...
IPSEC messages are used for secure communication. Troubleshooting scenarios include connectivity issues and misconfigured settings.
IPSEC messages are used to establish and maintain secure communication between two devices
Common troubleshooting scenarios include connectivity issues, such as failed VPN connections
Misconfigured settings can also cause IPSEC issues, such as incorrect encryption or authentication setti...
IP and TCP headers explained with purpose of each field
IP header contains source and destination IP addresses, version, header length, type of service, total length, identification, flags, fragment offset, time to live, protocol, header checksum
TCP header contains source and destination port numbers, sequence number, acknowledgement number, data offset, reserved, flags, window size, checksum, urgent pointer
Purpose...
Encryption and deception of packet
Encryption is the process of converting plain text into cipher text to protect data from unauthorized access
Packet deception is a technique used to mislead attackers by sending fake packets to divert their attention
Combining encryption and packet deception can enhance network security by making it difficult for attackers to intercept and decipher data
Tools like honeypots and honey...
Day to day work activities involve troubleshooting network issues, configuring devices, and providing technical support to customers.
Troubleshooting network issues
Configuring devices
Providing technical support to customers
I have handled various types of tickets including network connectivity issues, security policy configurations, VPN troubleshooting, and software upgrades.
Network connectivity issues
Security policy configurations
VPN troubleshooting
Software upgrades
I applied via LinkedIn and was interviewed in May 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
TCP and SSL headers are used in network communication to provide reliable and secure data transmission.
TCP header contains source and destination port numbers, sequence and acknowledgment numbers, and control flags.
SSL header contains information about the SSL version, cipher suite, and other parameters for secure communication.
TCP header is 20 bytes long, while SSL header size varies depending on the SSL version and c...
Troubleshooting IPsec involves understanding its phases: IKE and IPsec, and common issues like authentication and tunnel establishment.
Phase 1 (IKE): Establishes a secure channel. Check for mismatched pre-shared keys or certificates.
Phase 2 (IPsec): Negotiates the IPsec tunnel. Verify the correct transform sets and traffic selectors.
Use 'show crypto isakmp sa' to check IKE status and 'show crypto ipsec sa' for IPsec st...
Encryption and deception of packet
Encryption is the process of converting plain text into cipher text to protect data from unauthorized access
Packet deception is a technique used to mislead attackers by sending fake packets to divert their attention
Combining encryption and packet deception can enhance network security by making it difficult for attackers to intercept and decipher data
Tools like honeypots and honeynets ...
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
ARP (Address Resolution Protocol) is used to map a network address (such as an IP address) to a physical address (such as a MAC address).
ARP is used in Ethernet networks to find the MAC address of a device based on its IP address.
When a device needs to send data to another device on the network, it sends an ARP request asking for the MAC address of the destination device.
The destination device responds with its MAC add...
IP and TCP headers explained with purpose of each field
IP header contains source and destination IP addresses, version, header length, type of service, total length, identification, flags, fragment offset, time to live, protocol, header checksum
TCP header contains source and destination port numbers, sequence number, acknowledgement number, data offset, reserved, flags, window size, checksum, urgent pointer
Purpose of e...
IPSEC messages are used for secure communication. Troubleshooting scenarios include connectivity issues and misconfigured settings.
IPSEC messages are used to establish and maintain secure communication between two devices
Common troubleshooting scenarios include connectivity issues, such as failed VPN connections
Misconfigured settings can also cause IPSEC issues, such as incorrect encryption or authentication settings
To...
Top trending discussions
posted on 2 Jun 2022
I appeared for an interview before Jun 2021.
Had DSA and aptitude questions
I applied via Walk-in and was interviewed before Aug 2021. There were 3 interview rounds.
posted on 16 Sep 2021
I appeared for an interview in Oct 2020.
Round duration - 75 min
Round difficulty - Medium
This round was MCQ and coding round. 25 MCQs and one coding question were asked. MCQs were based on OS, DBMS, Aptitude and Data Structures.
You have 'N' tasks to complete. Each task can only be done on one of two specific days provided in two arrays: day1
and day2
.
For each task i, day1[i]
represents the earliest...
Find the minimum number of days required to complete all tasks given specific completion days for each task.
Sort the tasks based on day1 in ascending order.
For each task, choose the minimum of day1 and day2 as the completion day.
Keep track of the maximum completion day for each task.
The final answer is the maximum completion day of all tasks.
Round duration - 30 min
Round difficulty - Easy
This was a Data Structural round. Only one coding question was asked by the interviewer. The interviewer was very friendly. This round was very easy.
Sort the given unsorted array consisting of N non-negative integers in non-decreasing order using the Bubble Sort algorithm.
The first line contains an integer 'T' r...
Bubble Sort algorithm is used to sort an array of non-negative integers in non-decreasing order.
Implement the Bubble Sort algorithm to sort the array in place.
Compare adjacent elements and swap them if they are in the wrong order.
Repeat this process until the array is sorted.
Time complexity of Bubble Sort is O(n^2) in the worst case.
Example: For input [6, 2, 8, 4, 10], the output should be [2, 4, 6, 8, 10].
Tip 1 : Be confident!
Tip 2 : Maintain high Cgpa
Tip 3 : Do your best
Tip 1 : Mention clear points
Tip 2 : Atleast 3 projects and never put anything you have not revised
posted on 16 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 75 minutes
Round difficulty - Medium
It was in the evening.
It consisted of 26 questions of easy to hard level.
It consisted of 25 MCQs and only 1 coding problem.
Given a structured list of books and their authors, format the information as specified.
The first line of input contains an integer ‘T' representing the number of tes...
The task is to format a list of authors and their books in a specific way as per the given input format.
Parse the input to extract the number of test cases, number of authors, author names, and their respective books.
Format the output by printing the author names and their books in the specified format.
Ensure correct sequence and labeling of authors and books as per the example provided.
Handle multiple test cases and a...
Round duration - 15 minutes
Round difficulty - Medium
It was more of CV based round. A brief discussion on projects was there followed by some questions like why optum.
You are provided with a linked list of integers. Your task is to implement a function that deletes a node located at a specified position 'POS'.
The first line co...
Implement a function to delete a node from a linked list at a specified position.
Traverse the linked list to find the node at the specified position.
Update the pointers of the previous and next nodes to skip the node to be deleted.
Handle edge cases such as deleting the head or tail of the linked list.
Ensure to free the memory of the deleted node to avoid memory leaks.
Round duration - 15 minutes
Round difficulty - Easy
A short round where some basic dbms questions like procedure, cursor were asked. Then some questions on whether I would prefer working alone or in a team. Where I see myself in 5 years.
You are given a graph with 'N' vertices numbered from '1' to 'N' and 'M' edges. Your task is to color this graph using two colors, such as blue and red, in a way that no two adjacen...
Given a graph with 'N' vertices and 'M' edges, determine if it can be colored using two colors without adjacent vertices sharing the same color.
Use graph coloring algorithm like BFS or DFS to check if the graph can be colored with two colors without conflicts.
Check if any adjacent vertices have the same color. If so, it is not possible to color the graph as described.
If the graph has connected components, color each co...
Tip 1 : Projects do not matter much for this company.
Tip 2 : I did almost all the puzzles from Interviewbit.
Tip 3 : DBMS is really important. Practice queries in SQL thoroughly. You should know the use of limit and top also. It may be asked to write the same query in more than 1 form.
Tip 4 : Practice all the data structures. Questions were simple and you should know the basics of every data structure.
Tip 1 : Don't write anything just for the sake of it.
Tip 2 : If you are writing some project then be thorough with all the details. If you are not much confident, then simply remove it and focus on other subjects.
posted on 12 Jun 2021
based on 4 interview experiences
Difficulty level
Duration
based on 11 reviews
Rating in categories
Technical Support Engineer
1.5k
salaries
| ₹1.8 L/yr - ₹5.5 L/yr |
Senior Engineer
1.5k
salaries
| ₹4.3 L/yr - ₹10.1 L/yr |
Network Engineer
1.2k
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Engineer
1.1k
salaries
| ₹2.2 L/yr - ₹6.9 L/yr |
Network Security Engineer
330
salaries
| ₹4 L/yr - ₹8.4 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
Virtusa Consulting Services