Filter interviews by
Clear (1)
I applied via Recruitment Consultant and was interviewed before Nov 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Feb 2021. There were 2 interview rounds.
Phase 1 is for establishing a secure channel and Phase 2 is for negotiating IPSec SAs.
IKEv1 is a protocol used for VPN tunneling
Phase 1 negotiates the parameters for the secure channel
Phase 2 negotiates the IPSec SAs for data transmission
Phase 1 uses Diffie-Hellman for key exchange
Phase 2 uses either AH or ESP for data encryption and authentication
NAT-T is a protocol used to encapsulate and encrypt IPsec traffic when NAT is used in the network.
NAT-T stands for Network Address Translation - Traversal
It allows IPsec traffic to pass through NAT devices
It encapsulates and encrypts IPsec traffic in UDP packets
It uses port 4500 by default
Example: A remote worker using a VPN to connect to their company's network from a hotel room with a NAT router
TCP flags are control bits used in TCP to indicate the status of a connection.
TCP flags are 6 bits in the TCP header.
They are used to indicate the status of a connection, such as whether it is being opened, closed, or reset.
Some common TCP flags include SYN, ACK, FIN, RST, and URG.
SYN is used to initiate a connection, ACK is used to acknowledge receipt of data, FIN is used to terminate a connection, RST is used to rese...
SSL Inspection is a process of intercepting and decrypting SSL/TLS traffic to inspect it for security purposes.
SSL Inspection intercepts SSL/TLS traffic and decrypts it
It allows inspection of encrypted traffic for security threats
It requires a trusted root certificate to be installed on the device
It can cause issues with end-to-end encryption and privacy concerns
SSL handshake is a process of establishing a secure connection between a client and a server.
Client sends a request to the server to initiate the SSL handshake
Server responds with its SSL certificate
Client verifies the certificate and generates a symmetric key
Client sends a message encrypted with the symmetric key to the server
Server decrypts the message and sends a confirmation to the client
The SSL handshake is comple
I applied via Naukri.com and was interviewed in Aug 2019. There were 3 interview rounds.
Top trending discussions
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
posted on 8 Dec 2024
During the lockdown, I focused on enhancing my technical skills and learning new technologies.
Took online courses and certifications to improve my knowledge in areas like networking and troubleshooting
Participated in virtual workshops and webinars to stay updated with the latest industry trends
Practiced troubleshooting scenarios on virtual machines to sharpen my problem-solving abilities
Contributed to online technical ...
As a Technical Support Engineer, my day is spent troubleshooting and resolving technical issues for customers.
I start my day by checking emails and responding to any urgent customer inquiries.
I prioritize and manage my workload, addressing high-priority issues first.
I collaborate with other team members to share knowledge and seek assistance when needed.
I troubleshoot technical problems reported by customers, analyzing...
posted on 14 Nov 2024
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
posted on 7 May 2017
I was interviewed in Feb 2017.
based on 14 reviews
Rating in categories
Technical Support Engineer
105
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
33
salaries
| ₹0 L/yr - ₹0 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen