Filter interviews by
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
Top trending discussions
I applied via Naukri.com and was interviewed before Nov 2019. There were 4 interview rounds.
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as S...
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Exam...
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Et
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway setting...
I appeared for an interview in Jul 2024.
posted on 2 Sep 2021
I applied via Referral and was interviewed in Aug 2021. There was 1 interview round.
Mutable objects can be modified after creation, while immutable objects cannot be modified.
Mutable objects can have their state changed, while immutable objects cannot.
Immutable objects are thread-safe, while mutable objects may require synchronization.
Examples of mutable objects include lists, sets, and dictionaries, while examples of immutable objects include strings, numbers, and tuples.
Yes, indexing can be used in dictionaries.
Dictionaries in Python support indexing using keys.
You can access the value associated with a key by using the key as an index.
Indexing in dictionaries is efficient as it uses hash tables for key-value lookup.
Example: my_dict = {'name': 'John', 'age': 25}; print(my_dict['name']) will output 'John'.
Visual Studio Code
Free and open-source code editor
Supports multiple programming languages
Has a large library of extensions
Integrates with Git for version control
I applied via Campus Placement
General aptitude test topics like Math, Reasoning, English, from computer science subjects.
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Jan 2022. There was 1 interview round.
I appeared for an interview before Apr 2024, where I was asked the following questions.
The OS upgrade process for F5 devices involves careful planning, execution, and validation to ensure network reliability.
Backup current configuration and data before starting the upgrade.
Download the latest OS version from the F5 support site.
Use the F5 Configuration Utility or CLI to upload the new OS image.
Verify the integrity of the uploaded image using checksum.
Schedule a maintenance window to minimize impact on us...
Troubleshooting APM sign-on issues involves checking configurations, logs, and network connectivity.
Verify user credentials: Ensure the username and password are correct.
Check APM configuration: Review the APM settings for any misconfigurations.
Inspect logs: Look at the APM logs for error messages or warnings.
Network connectivity: Ensure there are no network issues preventing access.
Test with different browsers: Someti...
based on 7 reviews
Rating in categories
Network Engineer
1.1k
salaries
| ₹1.6 L/yr - ₹9.8 L/yr |
System Engineer
264
salaries
| ₹1.7 L/yr - ₹9 L/yr |
Senior Network Engineer
217
salaries
| ₹4 L/yr - ₹15.2 L/yr |
Assistant Manager
208
salaries
| ₹6.2 L/yr - ₹26 L/yr |
Senior Systems Engineer
172
salaries
| ₹3.4 L/yr - ₹14 L/yr |
ITC Infotech
3i Infotech
Microland
Newgen Software Technologies