Filter interviews by
I applied via Naukri.com and was interviewed before Feb 2021. There were 2 interview rounds.
Phase 1 is for establishing a secure channel and Phase 2 is for negotiating IPSec SAs.
IKEv1 is a protocol used for VPN tunneling
Phase 1 negotiates the parameters for the secure channel
Phase 2 negotiates the IPSec SAs for data transmission
Phase 1 uses Diffie-Hellman for key exchange
Phase 2 uses either AH or ESP for data encryption and authentication
NAT-T is a protocol used to encapsulate and encrypt IPsec traffic when NAT is used in the network.
NAT-T stands for Network Address Translation - Traversal
It allows IPsec traffic to pass through NAT devices
It encapsulates and encrypts IPsec traffic in UDP packets
It uses port 4500 by default
Example: A remote worker using a VPN to connect to their company's network from a hotel room with a NAT router
TCP flags are control bits used in TCP to indicate the status of a connection.
TCP flags are 6 bits in the TCP header.
They are used to indicate the status of a connection, such as whether it is being opened, closed, or reset.
Some common TCP flags include SYN, ACK, FIN, RST, and URG.
SYN is used to initiate a connection, ACK is used to acknowledge receipt of data, FIN is used to terminate a connection, RST is used to rese...
SSL Inspection is a process of intercepting and decrypting SSL/TLS traffic to inspect it for security purposes.
SSL Inspection intercepts SSL/TLS traffic and decrypts it
It allows inspection of encrypted traffic for security threats
It requires a trusted root certificate to be installed on the device
It can cause issues with end-to-end encryption and privacy concerns
SSL handshake is a process of establishing a secure connection between a client and a server.
Client sends a request to the server to initiate the SSL handshake
Server responds with its SSL certificate
Client verifies the certificate and generates a symmetric key
Client sends a message encrypted with the symmetric key to the server
Server decrypts the message and sends a confirmation to the client
The SSL handshake is comple
I applied via Referral and was interviewed before May 2021. There was 1 interview round.
Abstract class is a class that cannot be instantiated and can have both abstract and non-abstract methods. Interface is a collection of abstract methods.
Abstract class can have constructors while interface cannot
A class can implement multiple interfaces but can only inherit from one abstract class
Abstract class can have instance variables while interface cannot
Abstract class is used when we want to provide a common bas...
Git commands are used to manage version control of code. There are various types of Git commands.
Basic commands: add, commit, push, pull, clone
Branching commands: branch, checkout, merge, rebase
Advanced commands: stash, cherry-pick, reset, revert
Query commands: log, diff, blame, show
I applied via Naukri.com and was interviewed in Aug 2019. There were 3 interview rounds.
I was interviewed before Jul 2016.
Sophos Technologies interview questions for popular designations
Top trending discussions
The duration of Sophos Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 19 interviews
Interview experience
based on 206 reviews
Rating in categories
Technical Support Engineer
105
salaries
| ₹3.5 L/yr - ₹11 L/yr |
Senior Software Engineer
87
salaries
| ₹14.8 L/yr - ₹42 L/yr |
Network Security Engineer
68
salaries
| ₹4.7 L/yr - ₹16.4 L/yr |
Software Engineer
42
salaries
| ₹6.2 L/yr - ₹22.5 L/yr |
Software Engineer III
33
salaries
| ₹11.8 L/yr - ₹30 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen