i
NETSURION TECHNOLOGIES
Filter interviews by
Implemented open-close principle in a project
Used interfaces to define abstract behavior
Implemented concrete classes that adhere to the interface
New functionality added by creating new classes that implement the interface
Existing code remains untouched and doesn't need modification
Example: Created an interface 'Shape' with methods like 'calculateArea' and 'draw'. Implemented classes like 'Circle' and 'Rectangle' that i...
The dependency inversion principle is important to implement in a project because it promotes loose coupling, flexibility, and testability.
Dependency inversion principle helps in decoupling high-level modules from low-level modules.
It allows for easier maintenance and modification of code.
By depending on abstractions rather than concrete implementations, it enables flexibility and extensibility.
It facilitates unit test...
Top trending discussions
posted on 9 Dec 2022
I applied via Referral and was interviewed before Dec 2021. There were 4 interview rounds.
HTTP2 is faster, more efficient, and supports multiplexing and server push.
HTTP2 uses binary instead of text format for better performance.
HTTP2 supports multiplexing, allowing multiple requests to be sent and received at the same time.
HTTP2 also supports server push, where the server can send resources to the client before they are requested.
HTTP2 has header compression, reducing the amount of data that needs to be se...
posted on 14 Aug 2024
30min, DSA related question
EVPN VXLAN topology explanation
EVPN (Ethernet VPN) is a technology used to extend Layer 2 connectivity across a Layer 3 network
VXLAN (Virtual Extensible LAN) is a tunneling protocol used to overlay virtualized Layer 2 networks over Layer 3 networks
EVPN VXLAN topology combines the benefits of both technologies to provide scalable and flexible network virtualization
It allows for efficient communication between virtual ma...
I applied via Walk-in and was interviewed before Mar 2022. There were 3 interview rounds.
Python data types, list comprehension
posted on 12 Jun 2022
I applied via Approached by Company and was interviewed in May 2022. There were 2 interview rounds.
Traffic flow between two computers refers to the communication of data packets between the two devices.
Traffic flow can be managed using network protocols such as TCP/IP.
Routers and switches help direct traffic between computers.
Firewalls can be used to monitor and control traffic flow for security purposes.
posted on 26 Nov 2022
I applied via Naukri.com and was interviewed before Nov 2021. There were 2 interview rounds.
Ping/traceroute are network diagnostic tools used to test connectivity and identify network issues.
Ping sends ICMP echo request packets to a specific IP address and waits for a response.
Traceroute sends packets with increasing TTL values to trace the route to a destination.
Ping is used to check if a host is reachable, while traceroute shows the path packets take to reach a destination.
Both tools are commonly used to tr
Interview experience
Associate Security Analyst
46
salaries
| ₹4.2 L/yr - ₹8 L/yr |
Security Analyst
45
salaries
| ₹2.8 L/yr - ₹8.8 L/yr |
Information Security Analyst
19
salaries
| ₹2.8 L/yr - ₹6 L/yr |
Senior Test Engineer
19
salaries
| ₹6 L/yr - ₹13 L/yr |
Senior Security Analyst
19
salaries
| ₹4.8 L/yr - ₹15 L/yr |
Paladion Networks
QUICK HEAL TECHNOLOGIES
Trend Micro
Symantec Software Solutions