Filter interviews by
I applied via Approached by Company and was interviewed before May 2023. There were 2 interview rounds.
VPN stands for Virtual Private Network. Site-to-site VPN allows multiple locations to securely connect over the internet.
VPN creates a secure connection over the internet, allowing users to access a private network remotely.
Site-to-site VPN connects multiple locations of a company securely over the internet.
Site-to-site VPN uses IPsec (Internet Protocol Security) to encrypt data and ensure secure communication.
Example:...
posted on 4 Jun 2020
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
I applied via Company Website and was interviewed before Aug 2022. There were 2 interview rounds.
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.
It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.
Subnet masks are used to determine which part of an IP ad...
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers are typically used to connect different networks, such as a home netw...
posted on 20 Sep 2020
I applied via Referral and was interviewed in Aug 2020. There were 4 interview rounds.
posted on 14 Sep 2023
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
posted on 7 May 2017
I was interviewed in Feb 2017.
I was interviewed before May 2016.
based on 1 interview
Interview experience
Security Engineer
78
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
53
salaries
| ₹0 L/yr - ₹0 L/yr |
SOC Analyst
17
salaries
| ₹0 L/yr - ₹0 L/yr |
Graduate Analyst
16
salaries
| ₹0 L/yr - ₹0 L/yr |
Cyber Security Analyst
16
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Gen
FireEye
Palo Alto Networks