i
Wipro
Filter interviews by
posted on 8 Nov 2024
I applied via Approached by Company and was interviewed in May 2024. There were 3 interview rounds.
Firewall traffic flow refers to the movement of data packets through the firewall based on defined rules and policies.
Firewall inspects incoming and outgoing traffic to determine if it should be allowed or blocked
Traffic flow can be controlled using access control lists (ACLs) and security policies
Firewall can also perform Network Address Translation (NAT) to hide internal IP addresses
Examples of traffic flow include a...
Firewall architecture involves packet filtering, stateful inspection, and application layer filtering to protect networks.
Firewall acts as a barrier between internal network and external network
Packet filtering examines packets based on predefined rules to allow or block traffic
Stateful inspection tracks the state of active connections to make decisions on allowing or blocking traffic
Application layer filtering inspect...
I am seeking new challenges and opportunities for growth in my career.
Seeking new challenges to expand my skills and knowledge
Opportunities for career growth and advancement
Desire for a change in work environment or company culture
posted on 11 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
posted on 26 Mar 2024
Virtual router and virtual system play a crucial role in network security by providing isolated environments for routing and security policies.
Virtual router is a software-based routing instance that operates within a virtualized environment.
Virtual system is a logical division of a physical firewall that allows for separate security policies and configurations.
Both virtual router and virtual system help in creating is...
App-ID and Content-ID are features used in network security to identify and control applications and content.
App-ID is used to identify applications based on their behavior, not just port and protocol
Content-ID is used to identify and control content within applications
Both features are commonly used in next-generation firewalls for advanced security policies
Example: App-ID can identify and block social media applicati...
U-turn NAT is a network configuration where traffic enters and exits the same interface on a network device.
U-turn NAT is also known as hairpin NAT or NAT loopback.
It allows internal hosts to access resources using their public IP address from within the same network.
This is commonly used in scenarios where internal hosts need to access a server using its public IP address.
U-turn NAT can be configured on firewalls or r
A service route is the path that a service takes to reach its destination, including all the network devices it passes through.
Service routes can include routers, switches, firewalls, and other network devices.
Understanding service routes is important for network security to identify potential vulnerabilities or points of failure.
Examples of service routes include the path an email takes from sender to recipient, or th...
Wildfire is a type of malware analysis service provided by Palo Alto Networks.
Malware analysis service
Identifies and blocks unknown threats in real-time
Utilizes machine learning and AI for threat detection
posted on 18 Oct 2023
I applied via Approached by Company and was interviewed in Sep 2023. There were 4 interview rounds.
Fortigate IPsec tunnel is a secure connection established between two Fortigate devices for secure communication.
IPsec tunnel is used to encrypt data traffic between two Fortigate devices
Fortigate devices authenticate each other using pre-shared keys or certificates
IPsec tunnel can be configured using the Fortigate web interface or CLI commands
Fortigate HA cluster is a high availability setup where two or more Fortigate devices work together to ensure continuous network security.
Fortigate HA cluster involves setting up two or more Fortigate devices in an active-passive or active-active configuration.
In active-passive setup, one device is active while the other is on standby, ready to take over in case of failure.
In active-active setup, both devices actively ...
Packet flow in Fortigate involves ingress, inspection, routing, and egress stages.
Ingress stage: Packet enters the Fortigate device through a physical or virtual interface.
Inspection stage: Packet is inspected by security policies, firewall rules, and security services like antivirus and IPS.
Routing stage: Packet is routed based on destination IP address and routing table.
Egress stage: Packet exits the Fortigate device...
Normal aptitude group discussion assignment case study
Coding test assignment one on one round
Technical skills are essential for a Network Engineer, but soft skills are also important for effective communication and teamwork.
Technical skills are necessary for configuring and troubleshooting network devices.
Soft skills like communication, teamwork, and problem-solving are crucial for working effectively with colleagues and clients.
Balancing technical expertise with interpersonal skills is key to success in the r...
DHCP is a protocol used to assign IP addresses dynamically to devices on a network, while DNS is a system that translates domain names to IP addresses.
DHCP assigns IP addresses to devices on a network dynamically
DNS translates domain names to IP addresses
RDP (Remote Desktop Protocol) allows users to remotely connect to a computer
FRP (Fiberglass Reinforced Plastic) is a material used in construction
30nd does not seem to
I applied via Campus Placement and was interviewed in Sep 2023. There was 1 interview round.
Human Resources
HR stands for Human Resources
It is a department within an organization responsible for managing employees
HR handles recruitment, training, benefits, and employee relations
Example: The HR department at XYZ Company is in charge of hiring new employees
The 7 functions of HR include recruitment, training, performance management, employee relations, compensation and benefits, compliance, and HR strategy.
Recruitment: Attracting and hiring qualified candidates for open positions.
Training: Providing employees with the necessary skills and knowledge to perform their jobs effectively.
Performance management: Evaluating and improving employee performance through feedback and ...
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Approached by Company and was interviewed in Apr 2022. There were 4 interview rounds.
The interview was very good as they asked me my experiences(good & bad) from the day I am professional. How to handle the situations when a senior person makes a mistake. What are the ways of learning that you prefer.
I have worked with a variety of tools as a Network Engineer.
Cisco Packet Tracer
Wireshark
SolarWinds Network Performance Monitor
Nmap
GNS3
Ping
Traceroute
I have worked on a variety of technologies as a Network Engineer.
Cisco networking equipment
Routing and switching protocols (e.g. OSPF, BGP)
Firewalls and security appliances (e.g. Cisco ASA, Palo Alto)
Network monitoring and management tools (e.g. SolarWinds, Wireshark)
Virtualization technologies (e.g. VMware, Hyper-V)
Load balancers (e.g. F5, Citrix NetScaler)
Wireless networking (e.g. Cisco Meraki, Aruba)
Network troubles
based on 1 interview
Interview experience
based on 9 reviews
Rating in categories
Project Engineer
32.7k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23.1k
salaries
| ₹5.8 L/yr - ₹23 L/yr |
Senior Associate
21.3k
salaries
| ₹0.9 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.4k
salaries
| ₹5 L/yr - ₹19.5 L/yr |
Technical Lead
18.7k
salaries
| ₹8.3 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon