i
Net Access India
Filter interviews by
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
I am a dedicated Network Security Engineer with 5 years of experience in designing and implementing secure network solutions.
5 years of experience in network security
Proficient in designing and implementing secure network solutions
Strong knowledge of firewalls, VPNs, and intrusion detection systems
Certified in CISSP and CCNA
Experience in conducting security assessments and audits
Top trending discussions
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Nov 2019. There were 4 interview rounds.
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as S...
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Exam...
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Et
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway setting...
posted on 14 May 2018
I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.
The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.
ASA firewall has security levels assigned to interfaces to control traffic flow
The 8.3 version of ASA introduced significant changes in NAT configuration
Transparent mode firewall operates at Layer 2 and d...
I want to join Microland because of its reputation for innovation and growth. I can join within two weeks.
I am impressed by Microland's track record of providing cutting-edge solutions in the IT industry.
I am excited about the opportunity to work with a team of talented professionals at Microland.
I believe my skills and experience align well with the challenges and opportunities at Microland.
I can join within two weeks
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
VTP is a Cisco proprietary protocol used to manage VLAN configurations across a network.
VTP allows for centralized management of VLANs by automatically propagating VLAN information to all switches in the network.
It reduces the need to manually configure VLANs on each switch, making network administration more efficient.
VTP operates in client, server, and transparent modes, with the server being the switch that can crea...
To troubleshoot a switch in ROMMON mode after a reboot, follow these steps.
Check the configuration register value to ensure it is correct
Verify the boot image and configuration file are present and accessible
Attempt to boot the switch manually using the boot command
If necessary, reload the switch with a valid IOS image from a TFTP server
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
I appeared for an interview before Apr 2024, where I was asked the following questions.
The OS upgrade process for F5 devices involves careful planning, execution, and validation to ensure network reliability.
Backup current configuration and data before starting the upgrade.
Download the latest OS version from the F5 support site.
Use the F5 Configuration Utility or CLI to upload the new OS image.
Verify the integrity of the uploaded image using checksum.
Schedule a maintenance window to minimize impact on us...
Troubleshooting APM sign-on issues involves checking configurations, logs, and network connectivity.
Verify user credentials: Ensure the username and password are correct.
Check APM configuration: Review the APM settings for any misconfigurations.
Inspect logs: Look at the APM logs for error messages or warnings.
Network connectivity: Ensure there are no network issues preventing access.
Test with different browsers: Someti...
based on 1 interview
Interview experience
based on 1 review
Rating in categories
System Engineer
240
salaries
| ₹1.5 L/yr - ₹4 L/yr |
Senior Systems Engineer
77
salaries
| ₹2.1 L/yr - ₹6.2 L/yr |
Team Lead
44
salaries
| ₹3.6 L/yr - ₹10 L/yr |
Software Engineer
32
salaries
| ₹2.3 L/yr - ₹6.6 L/yr |
Desktop Support Engineer
25
salaries
| ₹1.6 L/yr - ₹2.8 L/yr |
3i Infotech
Microland
Newgen Software Technologies
NSE.IT