Filter interviews by
I applied via Company Website and was interviewed in Aug 2024. There were 2 interview rounds.
False positive and false negative are errors in security analysis where a legitimate activity is incorrectly flagged as malicious, or a malicious activity is incorrectly classified as legitimate.
False Positive: When a security system incorrectly identifies a legitimate activity as malicious. For example, a firewall blocking a harmless website due to a false alarm.
False Negative: When a security system fails to detect a...
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how different networking protocols work together.
Each layer of the OSI Model has specific functions and communicates with adjacent layers.
Examples of OSI Model layers include Physical, Data Lin...
Top trending discussions
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
posted on 3 Jun 2024
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed in May 2022. There were 5 interview rounds.
Written exam on Scenario based ethical hacking questions and coding.
posted on 15 Jun 2024
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
I am looking for a competitive salary based on my experience and skills.
I am seeking a salary that is in line with industry standards for a Network Security Engineer position.
I am open to negotiation based on the overall compensation package offered by the company.
I value fair compensation for the level of responsibility and expertise required for this role.
posted on 30 Sep 2021
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
The phases of site-to-site VPN are the steps involved in establishing and maintaining a secure connection between two networks.
Phase 1: Authentication and key exchange
Phase 2: Data encryption and tunnel establishment
Phase 3: Traffic protection and monitoring
Each phase has its own set of protocols and processes
For example, in Phase 1, the VPN peers authenticate each other using methods like pre-shared keys or digital ce
NAT stands for Network Address Translation. It is a technique used to map a public IP address to a private IP address.
NAT is used to conserve public IP addresses.
It allows multiple devices to share a single public IP address.
NAT can be implemented using hardware or software.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
BGP stands for Border Gateway Protocol, a routing protocol used to exchange routing information between different networks.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that selects the best path for data to travel based on various attributes.
BGP is used by internet service providers (ISPs) to exchange routing information with each other.
It is a complex protocol t...
Senior Analyst
3
salaries
| ₹7.5 L/yr - ₹9.5 L/yr |
Quality Analyst
3
salaries
| ₹3 L/yr - ₹6 L/yr |
Bharti Airtel
Jio
Tata Play
Hathway