i
TCS
Filter interviews by
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
IPsec VPN works by encrypting and authenticating all traffic between two endpoints over the internet.
IPsec VPN uses protocols like AH (Authentication Header) and ESP (Encapsulating Security Payload) to provide security.
It creates a secure tunnel between the two endpoints, ensuring confidentiality, integrity, and authenticity of the data.
IPsec VPN can be configured in different modes like transport mode and tunnel mode.
...
VPC stands for Virtual Private Cloud, a virtual network dedicated to a single account within a cloud provider's infrastructure.
VPC allows users to define their own virtual network in the cloud
It provides control over network settings such as IP address range, subnets, route tables, and network gateways
VPC helps in isolating resources and providing a secure environment within the cloud
Examples of cloud providers offerin...
Sandbox inspection is a security mechanism that isolates and analyzes suspicious files in a controlled environment.
Sandbox creates a virtual environment to execute and observe potentially malicious files.
It monitors the behavior of the file to determine if it is safe or malicious.
Sandbox can detect malware by analyzing its actions without risking the actual system.
Common sandbox tools include Cuckoo, FireEye, and Palo
DNS sinkhole is a technique used to redirect malicious traffic to a controlled server for analysis or blocking.
DNS sinkhole involves redirecting DNS queries for malicious domains to a sinkhole server.
It can be used to prevent malware from communicating with its command and control server.
Sinkholing can also be used to gather intelligence on malicious activities by analyzing the traffic.
Popular tools like BIND and Pi-ho
Persistence type in load balancer refers to the method used to maintain session affinity for client requests.
Persistence type ensures that subsequent requests from the same client are directed to the same server.
Common persistence types include source IP, cookie-based, SSL session ID, and URI-based.
For example, source IP persistence uses the client's IP address to route subsequent requests to the same server.
Packet capture process involves capturing network traffic for analysis and troubleshooting.
Use tools like Wireshark or tcpdump to capture packets
Specify the network interface to capture traffic from
Apply filters to capture specific packets of interest
Analyze captured packets for troubleshooting network issues
posted on 23 Feb 2024
I applied via Naukri.com and was interviewed before Feb 2023. There were 2 interview rounds.
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I would like simple test
Normal communication check
A loop is a sequence of instructions that is continually repeated until a certain condition is met. An IP (Internet Protocol) address is a unique numerical label assigned to each device connected to a computer network.
A loop is used in programming to execute a block of code repeatedly until a specific condition is met.
There are different types of loops such as for loop, while loop, and do-while loop.
An IP address is us...
BGP, OSPF, and VPN are all protocols used in networking to facilitate communication and secure data transmission.
BGP (Border Gateway Protocol) is used to exchange routing information between different autonomous systems on the internet.
OSPF (Open Shortest Path First) is an interior gateway protocol used to find the best path for routing within a single autonomous system.
VPN (Virtual Private Network) is a technology tha...
I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.
Configured routers and switches to optimize network performance
Assisted in setting up VLANs and implementing security protocols
Troubleshooted network connectivity issues for end users
Participated in network infrastructure upgrades and maintenance
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Referral and was interviewed in Jun 2024. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
There are different types of routing protocols such as RIP, OSPF, EIGRP, and BGP.
Static routing involves manually ...
Switching is a networking technique used to forward data packets between devices on a computer network.
Switching involves the process of receiving, analyzing, and forwarding data packets within a network.
Switches operate at Layer 2 (Data Link Layer) of the OSI model.
Switches use MAC addresses to determine the destination of data packets.
Switches create separate collision domains and broadcast domains, improving network...
based on 1 review
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.8k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
31.3k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.6k
salaries
| ₹9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture