Filter interviews by
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
I applied via Referral and was interviewed before May 2023. There were 3 interview rounds.
I applied via Company Website and was interviewed before Aug 2022. There were 2 interview rounds.
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.
It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.
Subnet masks are used to determine which part of an IP ad...
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers are typically used to connect different networks, such as a home netw...
Paladion Networks interview questions for popular designations
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Malware refers to any software designed to harm or exploit any device or network.
Malware is a broad term that includes viruses, worms, trojans, ransomware, spyware, adware, and more.
Viruses are malicious programs that replicate themselves and infect other files on the device.
Worms are self-replicating malware that spread through networks.
Trojans are disguised as legitimate software but contain malicious code.
Ransomware...
Top trending discussions
Zone protection DoS is a feature that protects against DoS attacks by limiting traffic to specific zones, while DoS attack rule is a specific rule that detects and blocks DoS attacks.
Zone protection DoS limits traffic to specific zones to prevent DoS attacks
DoS attack rule detects and blocks DoS attacks based on specific rules
Zone protection DoS is a proactive measure while DoS attack rule is a reactive measure
Zone pro...
DoS zone protection and DoS attack rule are two different methods to prevent DoS attacks.
DoS zone protection is a feature that blocks traffic from a specific IP address or subnet if it exceeds a certain threshold.
DoS attack rule is a security policy that identifies and blocks traffic patterns that are indicative of a DoS attack.
DoS zone protection is a proactive measure that prevents traffic from reaching the target, w...
SP3 architecture is a security architecture designed to protect against malware attacks.
SP3 stands for Security Platform 3
It is a hardware-based security architecture
It is designed to protect against malware attacks by isolating critical system components
It is used in some Intel processors, such as the Intel Core i7
It provides a secure execution environment for sensitive applications
I appeared for an interview before May 2021.
Round duration - 60 Minutes
Round difficulty - Medium
Timing: Morning
How was the environment? It happened in the Computer Lab of my institution
All students were assigned a computer and we had to solve questions on hackerrank
Consider 'N' individuals numbered from 0 to N-1 standing in a queue. You are provided with two arrays: Height
and Infront
, each consisting of 'N' non-negative int...
The task is to find the actual order of people in a queue based on their heights and the number of taller people in front of them.
Iterate through the given arrays and create a list of tuples containing the height and number of taller people for each person.
Sort the list of tuples in descending order of height and ascending order of the number of taller people.
Create an empty result list and insert each tuple into the r...
Round duration - 60 Minutes
Round difficulty - Medium
Round was a mix of concepts from OOPS, OS and Problem Solving
Given a Binary Search Tree (BST) and a key value 'X', determine if there exists a node within the BST containing the value 'X'.
Consider the tree represe...
The task is to find if a given value is present in a Binary Search Tree (BST).
Start from the root node and compare the value with the target value.
If the value matches, return true.
If the target value is less than the current node value, move to the left child.
If the target value is greater than the current node value, move to the right child.
Repeat the process until a match is found or a leaf node is reached.
If a leaf...
Tip 1 : Try to code the data structures that you have learned to understand things better
Tip 2 : Try to solve the problem even if it is the worst possible solution you think and then try to optimize don't jump to get the
best possible solution
Tip 3 : Discuss things among peers it helps to improve the understanding, even try to teach someone anything new you learn, this is very helpful during the interviews as you will have habit of explaining things
Tip 1 : Try to be honest in the resume don't write something you don't know, most of the time it backfires.
Tip 2 : Try to make 2 good projects for cv and know about the challenges you can face on the project and think about how you can solve that challenge.
based on 3 interviews
Interview experience
based on 122 reviews
Rating in categories
Security Analyst
109
salaries
| ₹2.4 L/yr - ₹10 L/yr |
Senior Security Analyst
67
salaries
| ₹4.8 L/yr - ₹11.3 L/yr |
Information Security Analyst
58
salaries
| ₹3 L/yr - ₹10.6 L/yr |
Cyber Security Analyst
29
salaries
| ₹2.4 L/yr - ₹8 L/yr |
Software Engineer
25
salaries
| ₹2 L/yr - ₹7.8 L/yr |
Sterlite Technologies
Indus Towers
Cisco
BT Business