Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by NETSURION TECHNOLOGIES Team. If you also belong to the team, you can get access from here

NETSURION TECHNOLOGIES Verified Tick

Compare button icon Compare button icon Compare
3.3

based on 65 Reviews

Filter interviews by

NETSURION TECHNOLOGIES Security Analyst Interview Questions and Answers

Updated 15 Mar 2024

NETSURION TECHNOLOGIES Security Analyst Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Be thorough with whatever you have mentioned in your resume and go through some interview questions that should be enough
  • Q2. Basic networking concepts
  • Q3. Soc questions refer Anand guru interview pdf documents

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

One hour - only maths

Round 2 - Technical 

(2 Questions)

  • Q1. Basic dsa questions were asked
  • Q2. Basic oops questions were asked
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Coding Test 

Code DB Transactions like rollback

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Real time scenarios

Interview Preparation Tips

Topics to prepare for Lumen Technologies Information Security Consultant interview:
  • Real Time Analysis
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is Routing please explain
  • Ans. 

    Routing is the process of selecting the best path for network traffic to travel from one network to another.

    • Routing involves analyzing network topology and determining the most efficient path for data to travel

    • Routing protocols such as OSPF and BGP are used to exchange routing information between routers

    • Routing tables are used to store information about network destinations and the best path to reach them

    • Routing can be...

  • Answered by AI
  • Q2. What is subnetting, please explain
  • Ans. 

    Subnetting is the process of dividing a network into smaller subnetworks.

    • Subnetting helps in efficient utilization of IP addresses

    • It improves network performance and security

    • Subnetting is done by borrowing bits from the host portion of an IP address

    • Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Networking knowledge is must along with information security knowledge

Skills evaluated in this interview

Interview Questionnaire 

3 Questions

  • Q1. What is the diff between zone protection dos and dos attack rule
  • Ans. 

    Zone protection DoS is a feature that protects against DoS attacks by limiting traffic to specific zones, while DoS attack rule is a specific rule that detects and blocks DoS attacks.

    • Zone protection DoS limits traffic to specific zones to prevent DoS attacks

    • DoS attack rule detects and blocks DoS attacks based on specific rules

    • Zone protection DoS is a proactive measure while DoS attack rule is a reactive measure

    • Zone pro...

  • Answered by AI
  • Q2. What is the diff between dos zone protection and dos attack rule
  • Ans. 

    DoS zone protection and DoS attack rule are two different methods to prevent DoS attacks.

    • DoS zone protection is a feature that blocks traffic from a specific IP address or subnet if it exceeds a certain threshold.

    • DoS attack rule is a security policy that identifies and blocks traffic patterns that are indicative of a DoS attack.

    • DoS zone protection is a proactive measure that prevents traffic from reaching the target, w...

  • Answered by AI
  • Q3. What is sp3 architecture
  • Ans. 

    SP3 architecture is a security architecture designed to protect against malware attacks.

    • SP3 stands for Security Platform 3

    • It is a hardware-based security architecture

    • It is designed to protect against malware attacks by isolating critical system components

    • It is used in some Intel processors, such as the Intel Core i7

    • It provides a secure execution environment for sensitive applications

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Their are 60 questions. these 60 questions divided into 2 parts one is apptitude and another is technical .

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I was interviewed before May 2023.

Round 1 - Aptitude Test 

Aptitude questions need to be clear

Round 2 - Coding Test 

2 coding questions need to solve

Round 3 - Technical 

(1 Question)

  • Q1. Technical interview round questions related to networking
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed before Nov 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. BGP protocol and DDoS attacks.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Aug 2022. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain network subnetting with explain
  • Ans. 

    Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.

    • Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.

    • It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.

    • Subnet masks are used to determine which part of an IP ad...

  • Answered by AI
  • Q2. Explain difference between router and switch
  • Ans. 

    Routers connect multiple networks together, while switches connect devices within a single network.

    • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

    • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

    • Routers are typically used to connect different networks, such as a home netw...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Knowledge of CCNA concepts will help

Skills evaluated in this interview

NETSURION TECHNOLOGIES Interview FAQs

How many rounds are there in NETSURION TECHNOLOGIES Security Analyst interview?
NETSURION TECHNOLOGIES interview process usually has 1 rounds. The most common rounds in the NETSURION TECHNOLOGIES interview process are Technical.
How to prepare for NETSURION TECHNOLOGIES Security Analyst interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at NETSURION TECHNOLOGIES. The most common topics and skills that interviewers at NETSURION TECHNOLOGIES expect are Security Analysis, SIEM, Network Security, Ceh and Networking.
What are the top questions asked in NETSURION TECHNOLOGIES Security Analyst interview?

Some of the top questions asked at the NETSURION TECHNOLOGIES Security Analyst interview -

  1. Soc questions refer Anand guru interview pdf docume...read more
  2. basic networking conce...read more

Tell us how to improve this page.

NETSURION TECHNOLOGIES Security Analyst Interview Process

based on 1 interview

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

Cisco Interview Questions
4.1
 • 396 Interviews
Nvidia Interview Questions
3.7
 • 104 Interviews
Vertiv Interview Questions
4.0
 • 49 Interviews
Arista Networks Interview Questions
4.2
 • 43 Interviews
View all
NETSURION TECHNOLOGIES Security Analyst Salary
based on 45 salaries
₹2.8 L/yr - ₹8.8 L/yr
10% less than the average Security Analyst Salary in India
View more details

NETSURION TECHNOLOGIES Security Analyst Reviews and Ratings

based on 3 reviews

4.0/5

Rating in categories

3.2

Skill development

3.2

Work-life balance

3.2

Salary

3.5

Job security

3.5

Company culture

3.2

Promotions

3.2

Work satisfaction

Explore 3 Reviews and Ratings
Associate Security Analyst
46 salaries
unlock blur

₹4.2 L/yr - ₹8 L/yr

Security Analyst
45 salaries
unlock blur

₹2.8 L/yr - ₹8.8 L/yr

Information Security Analyst
19 salaries
unlock blur

₹2.8 L/yr - ₹6 L/yr

Senior Test Engineer
19 salaries
unlock blur

₹6 L/yr - ₹13 L/yr

Senior Security Analyst
19 salaries
unlock blur

₹4.8 L/yr - ₹15 L/yr

Explore more salaries
Compare NETSURION TECHNOLOGIES with

Paladion Networks

4.0
Compare

QUICK HEAL TECHNOLOGIES

3.7
Compare

Trend Micro

4.2
Compare

Symantec Software Solutions

4.3
Compare
Did you find this page helpful?
Yes No
write
Share an Interview