Filter interviews by
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
Top trending discussions
I applied via Naukri.com and was interviewed before Nov 2019. There were 4 interview rounds.
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as S...
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Exam...
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Et
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway setting...
posted on 2 Sep 2021
I applied via Referral and was interviewed in Aug 2021. There was 1 interview round.
Mutable objects can be modified after creation, while immutable objects cannot be modified.
Mutable objects can have their state changed, while immutable objects cannot.
Immutable objects are thread-safe, while mutable objects may require synchronization.
Examples of mutable objects include lists, sets, and dictionaries, while examples of immutable objects include strings, numbers, and tuples.
Yes, indexing can be used in dictionaries.
Dictionaries in Python support indexing using keys.
You can access the value associated with a key by using the key as an index.
Indexing in dictionaries is efficient as it uses hash tables for key-value lookup.
Example: my_dict = {'name': 'John', 'age': 25}; print(my_dict['name']) will output 'John'.
Visual Studio Code
Free and open-source code editor
Supports multiple programming languages
Has a large library of extensions
Integrates with Git for version control
I appeared for an interview in Jul 2024.
I applied via Campus Placement
General aptitude test topics like Math, Reasoning, English, from computer science subjects.
I applied via Walk-in and was interviewed in Jan 2022. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
posted on 30 Jun 2022
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
based on 7 reviews
Rating in categories
Network Engineer
1.1k
salaries
| ₹1.6 L/yr - ₹9.5 L/yr |
System Engineer
266
salaries
| ₹1.7 L/yr - ₹9 L/yr |
Assistant Manager
221
salaries
| ₹5.9 L/yr - ₹26 L/yr |
Senior Network Engineer
215
salaries
| ₹3.9 L/yr - ₹15.2 L/yr |
Senior Systems Engineer
169
salaries
| ₹3.9 L/yr - ₹13.7 L/yr |
ITC Infotech
3i Infotech
Microland
Newgen Software Technologies