Filter interviews by
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
Top trending discussions
I applied via Naukri.com and was interviewed before Nov 2019. There were 4 interview rounds.
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as S...
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Exam...
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Et
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway setting...
I applied via Campus Placement
General aptitude test topics like Math, Reasoning, English, from computer science subjects.
I applied via Walk-in and was interviewed in Jan 2022. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
I appeared for an interview in Jul 2024.
posted on 2 Sep 2021
I applied via Referral and was interviewed in Aug 2021. There was 1 interview round.
Mutable objects can be modified after creation, while immutable objects cannot be modified.
Mutable objects can have their state changed, while immutable objects cannot.
Immutable objects are thread-safe, while mutable objects may require synchronization.
Examples of mutable objects include lists, sets, and dictionaries, while examples of immutable objects include strings, numbers, and tuples.
Yes, indexing can be used in dictionaries.
Dictionaries in Python support indexing using keys.
You can access the value associated with a key by using the key as an index.
Indexing in dictionaries is efficient as it uses hash tables for key-value lookup.
Example: my_dict = {'name': 'John', 'age': 25}; print(my_dict['name']) will output 'John'.
Visual Studio Code
Free and open-source code editor
Supports multiple programming languages
Has a large library of extensions
Integrates with Git for version control
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
based on 7 reviews
Rating in categories
Network Engineer
1.1k
salaries
| ₹1.6 L/yr - ₹9.8 L/yr |
System Engineer
264
salaries
| ₹1.7 L/yr - ₹9 L/yr |
Senior Network Engineer
217
salaries
| ₹4 L/yr - ₹15.2 L/yr |
Assistant Manager
208
salaries
| ₹6.2 L/yr - ₹26 L/yr |
Senior Systems Engineer
172
salaries
| ₹3.4 L/yr - ₹14 L/yr |
ITC Infotech
3i Infotech
Microland
Newgen Software Technologies