Orange Business
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Referral and was interviewed in Oct 2022. There were 3 interview rounds.
Designing HA in active passive environment involves ensuring redundancy and failover mechanisms.
Identify critical components and services that require high availability
Implement redundancy by setting up a secondary system that can take over in case of failure
Ensure automatic failover mechanisms are in place to minimize downtime
Regularly test the failover mechanisms to ensure they work as expected
Consider load balancing...
Top trending discussions
posted on 11 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I was interviewed in Mar 2024.
DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, and Acknowledge stages.
DHCP Discover: Client broadcasts a request for IP address
DHCP Offer: Server responds with an available IP address
DHCP Request: Client requests the offered IP address
DHCP Acknowledge: Server confirms the IP address assignment
A personal computer communicates with a web application through a series of steps involving network protocols.
The computer sends a request to the web application's server using the HTTP protocol.
The server processes the request and sends back a response containing the requested information.
The communication is facilitated by the TCP/IP protocol stack.
Data is transmitted over the internet using IP addresses and domain n...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a hello message to server with supported encryption algorithms
Server responds with its own hello message, including its certificate
Client verifies server's certificate and generates a pre-master secret
Both client and server use the pre-master secret to generate a unique ...
ARP (Address Resolution Protocol) is a protocol used for mapping an IP address to a MAC address.
ARP is used to resolve IP addresses to MAC addresses on a local network.
There are two main types of ARP: ARP Request and ARP Reply.
ARP Request is sent by a device to find the MAC address of another device with a known IP address.
ARP Reply is sent in response to an ARP Request, providing the MAC address of the requested IP ad
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I was interviewed in Mar 2024.
Types of ARP include ARP request, ARP reply, ARP probe, and ARP announcement.
ARP request is used to find the MAC address of a device on the network.
ARP reply is the response to an ARP request, providing the MAC address of the target device.
ARP probe is used to check if an IP address is already in use on the network.
ARP announcement is used to inform other devices on the network about a change in MAC address.
based on 1 review
Rating in categories
Network Engineer
364
salaries
| ₹1.6 L/yr - ₹9.5 L/yr |
Technical Consultant
291
salaries
| ₹2.8 L/yr - ₹10.5 L/yr |
Senior Technical Consultant
268
salaries
| ₹5.7 L/yr - ₹19.4 L/yr |
Software Engineer
256
salaries
| ₹5 L/yr - ₹17.4 L/yr |
Senior Software Engineer
232
salaries
| ₹9.6 L/yr - ₹26 L/yr |
Tata Communications
Tech Mahindra
Wipro
HCLTech