i
TCS
Filter interviews by
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
IPsec VPN works by encrypting and authenticating all traffic between two endpoints over the internet.
IPsec VPN uses protocols like AH (Authentication Header) and ESP (Encapsulating Security Payload) to provide security.
It creates a secure tunnel between the two endpoints, ensuring confidentiality, integrity, and authenticity of the data.
IPsec VPN can be configured in different modes like transport mode and tunnel mode.
...
VPC stands for Virtual Private Cloud, a virtual network dedicated to a single account within a cloud provider's infrastructure.
VPC allows users to define their own virtual network in the cloud
It provides control over network settings such as IP address range, subnets, route tables, and network gateways
VPC helps in isolating resources and providing a secure environment within the cloud
Examples of cloud providers offerin...
Sandbox inspection is a security mechanism that isolates and analyzes suspicious files in a controlled environment.
Sandbox creates a virtual environment to execute and observe potentially malicious files.
It monitors the behavior of the file to determine if it is safe or malicious.
Sandbox can detect malware by analyzing its actions without risking the actual system.
Common sandbox tools include Cuckoo, FireEye, and Palo
DNS sinkhole is a technique used to redirect malicious traffic to a controlled server for analysis or blocking.
DNS sinkhole involves redirecting DNS queries for malicious domains to a sinkhole server.
It can be used to prevent malware from communicating with its command and control server.
Sinkholing can also be used to gather intelligence on malicious activities by analyzing the traffic.
Popular tools like BIND and Pi-ho
Persistence type in load balancer refers to the method used to maintain session affinity for client requests.
Persistence type ensures that subsequent requests from the same client are directed to the same server.
Common persistence types include source IP, cookie-based, SSL session ID, and URI-based.
For example, source IP persistence uses the client's IP address to route subsequent requests to the same server.
Packet capture process involves capturing network traffic for analysis and troubleshooting.
Use tools like Wireshark or tcpdump to capture packets
Specify the network interface to capture traffic from
Apply filters to capture specific packets of interest
Analyze captured packets for troubleshooting network issues
posted on 23 Feb 2024
I applied via Naukri.com and was interviewed before Feb 2023. There were 2 interview rounds.
posted on 21 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 7 interview rounds.
An aptitude is a component of a competence to do a certain kind of work at a certain level. Outstanding aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped
Coding is the process of allowing humans to speak to computers. As computers only understand binary language — a series of zeros and ones — humans need to use a programming language as a translator of sorts.
Group discussion is a discussion between a group of participants on a given subject. A group discussion typically forms a part of the selection process used by organisations and educational institutions. The candidates talk about the given topic to present facts, opinions and conclusions.
An assignment is a task that someone in authority has asked you to do. The word assignment is just the noun form of the common verb assign, which you use when you want to give someone a duty or a job. When you assign something, that something is called an assignment.
Case study is an appropriate research design when you want to gain concrete, contextual, in-depth knowledge about a specific real-world subject. It allows you to explore the key characteristics, meanings, and implications of the case. Case studies are often a good choice in a
Technical skills often require specific education, such as programming languages, technical writing, or data analysis.
Programming languages: Examples include Java, Python, C++, etc.
Technical writing: Ability to write technical documentation, manuals, and reports.
Data analysis: Skills in analyzing and interpreting data using tools like Excel, SQL, or R.
I applied via Referral and was interviewed in Jun 2024. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
There are different types of routing protocols such as RIP, OSPF, EIGRP, and BGP.
Static routing involves manually ...
Switching is a networking technique used to forward data packets between devices on a computer network.
Switching involves the process of receiving, analyzing, and forwarding data packets within a network.
Switches operate at Layer 2 (Data Link Layer) of the OSI model.
Switches use MAC addresses to determine the destination of data packets.
Switches create separate collision domains and broadcast domains, improving network...
Normal aptitude group discussion assignment case study
Coding test assignment one on one round
Technical skills are essential for a Network Engineer, but soft skills are also important for effective communication and teamwork.
Technical skills are necessary for configuring and troubleshooting network devices.
Soft skills like communication, teamwork, and problem-solving are crucial for working effectively with colleagues and clients.
Balancing technical expertise with interpersonal skills is key to success in the r...
DHCP is a protocol used to assign IP addresses dynamically to devices on a network, while DNS is a system that translates domain names to IP addresses.
DHCP assigns IP addresses to devices on a network dynamically
DNS translates domain names to IP addresses
RDP (Remote Desktop Protocol) allows users to remotely connect to a computer
FRP (Fiberglass Reinforced Plastic) is a material used in construction
30nd does not seem to
posted on 2 Mar 2024
I applied via Company Website and was interviewed in Feb 2024. There was 1 interview round.
Protocol is a set of rules used in digital communication to connect network devices and exchange information.
Protocols define the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Different protocols serve different purposes, such as routing data, sending
A gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.
Gateway acts as an entry and exit point for data traffic between networks
It translates data between different network protocols
Examples include routers and firewalls that connect a local network to the internet
posted on 24 Jan 2024
I applied via LinkedIn and was interviewed in Dec 2023. There was 1 interview round.
There are five types of VLAN in computer networking: Default VLAN, Data VLAN, Voice VLAN, Management VLAN, and Native VLAN.
Default VLAN is the VLAN that all switch ports are assigned to by default.
Data VLAN is used to carry regular network traffic.
Voice VLAN is used to carry voice traffic for VoIP systems.
Management VLAN is used for managing network devices.
Native VLAN is used for untagged traffic on a trunk port.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for the creation of multiple virtual networks within a single physical network.
VLANs divide a single broadcast domain into multiple broadcast domains.
They provide a way to group devices within a VLAN, allowing for better network management and security.
VLANs can be used to separate different departments or functions within an organizatio...
I applied via Naukri.com and was interviewed in Nov 2023. There was 1 interview round.
Stuck switching refers to a situation where a network switch is unable to forward traffic due to a malfunction or configuration issue.
Stuck switching can occur when a switch's forwarding table becomes corrupted or when there is a hardware failure.
It can also happen if there is a loop in the network causing broadcast storms.
Troubleshooting stuck switching involves checking the switch's configuration, monitoring network ...
BGP path selection process determines the best path for routing based on various attributes.
BGP selects the path with the highest weight attribute first
If weights are the same, BGP looks at the local preference attribute
Next, BGP considers the AS path length
BGP then checks the origin code attribute
After that, BGP looks at the MED (Multi-Exit Discriminator) attribute
If all else is equal, BGP chooses the path with the lo...
A stub area is an OSPF area that does not contain external routes.
Stub areas reduce the amount of routing information exchanged within an OSPF network.
Stub areas use a default route to reach external networks.
Stub areas are commonly used to reduce the size of the OSPF database and improve network performance.
STP stands for Spanning Tree Protocol, used in network environments to prevent loops and ensure redundant paths are utilized efficiently.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by selecting a single path for data traffic while blocking redundant paths.
STP elects a root bridge and calculates the shortest path to each network segment.
If a link fails, STP recalculates the network topo...
Routers switch configuration and commands involve setting up and managing network devices for efficient data routing.
Routers use commands like 'show ip route' to display routing table information
Configuration involves setting up IP addresses, subnet masks, and default gateways
Commands like 'show interfaces' can display interface status and configuration details
based on 1 review
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.6k
salaries
| ₹5.1 L/yr - ₹15.9 L/yr |
AST Consultant
51.2k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.9k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.8k
salaries
| ₹8.9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture