i
Tata Communications
Filter interviews by
Top trending discussions
I applied via Approached by Company and was interviewed in May 2022. There were 5 interview rounds.
Written exam on Scenario based ethical hacking questions and coding.
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Basic questions related to speed, time, efficiency
5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.
5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.
5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.
5GHz offers more available channels, reducing the likelihood of congest...
Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.
Enable routing features on the switch
Configure routing protocols such as OSPF or EIGRP
Assign IP addresses to interfaces
Implement access control lists for security
Install a routing software image if necessary
posted on 3 Jun 2024
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
posted on 30 Sep 2021
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
The phases of site-to-site VPN are the steps involved in establishing and maintaining a secure connection between two networks.
Phase 1: Authentication and key exchange
Phase 2: Data encryption and tunnel establishment
Phase 3: Traffic protection and monitoring
Each phase has its own set of protocols and processes
For example, in Phase 1, the VPN peers authenticate each other using methods like pre-shared keys or digital ce
NAT stands for Network Address Translation. It is a technique used to map a public IP address to a private IP address.
NAT is used to conserve public IP addresses.
It allows multiple devices to share a single public IP address.
NAT can be implemented using hardware or software.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
BGP stands for Border Gateway Protocol, a routing protocol used to exchange routing information between different networks.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that selects the best path for data to travel based on various attributes.
BGP is used by internet service providers (ISPs) to exchange routing information with each other.
It is a complex protocol t...
I applied via Approached by Company and was interviewed in May 2022. There were 5 interview rounds.
Written exam on Scenario based ethical hacking questions and coding.
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...
posted on 15 Jun 2024
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
I am looking for a competitive salary based on my experience and skills.
I am seeking a salary that is in line with industry standards for a Network Security Engineer position.
I am open to negotiation based on the overall compensation package offered by the company.
I value fair compensation for the level of responsibility and expertise required for this role.
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Network Engineer
1.7k
salaries
| ₹1.4 L/yr - ₹6.8 L/yr |
Assistant Manager
1.3k
salaries
| ₹5.3 L/yr - ₹22.5 L/yr |
Customer Service Executive
937
salaries
| ₹2.4 L/yr - ₹7 L/yr |
Associate Engineer
907
salaries
| ₹1 L/yr - ₹4.6 L/yr |
Manager
863
salaries
| ₹8.5 L/yr - ₹31 L/yr |
Bharti Airtel
Reliance Communications
Vodafone Idea
Tech Mahindra