i
Akamai
Technologies
Filter interviews by
WAFs typically do not decrypt payloads; they analyze traffic patterns to block XSS attacks.
WAFs inspect HTTP requests and responses for malicious patterns.
They use signature-based detection to identify known XSS payloads.
WAFs may employ heuristics and anomaly detection to block suspicious behavior.
Example: A WAF might block a request containing '<script>' tags.
Encryption is not usually involved in the detect...
HTTPS is a secure version of HTTP, using encryption to protect data exchanged between a client and server.
HTTPS stands for HyperText Transfer Protocol Secure.
It uses SSL/TLS protocols to encrypt data, ensuring secure communication.
When a user visits a website, the browser checks the site's SSL certificate.
Example: A URL starting with 'https://' indicates a secure connection.
HTTPS protects against eavesdropping and...
HTTPS uses SSL/TLS protocols to encrypt data between the client and server, ensuring secure communication over the internet.
HTTPS employs SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols for encryption.
SSL/TLS encrypts data in transit, protecting it from eavesdropping and tampering.
A common example is the padlock icon in web browsers indicating a secure connection.
TLS 1.2 and TLS 1.3 are the...
Identifying pain points and creating use cases for a given business scenario.
Identify user frustrations, such as slow response times in a system.
Analyze workflow inefficiencies, like redundant data entry.
Consider stakeholder needs, such as reporting requirements for management.
Evaluate system integration issues, for example, lack of communication between platforms.
Assess user experience challenges, like a confusin...
OSPF is a link-state routing protocol that enables routers to exchange routing information efficiently within an autonomous system.
OSPF (Open Shortest Path First) uses a link-state algorithm to determine the best path for data packets.
Routers in OSPF form adjacencies and exchange Link State Advertisements (LSAs) to share their routing information.
Each router builds a complete topology of the network using the LSAs...
High-level design for a URL shortener system
Use a database to store original URLs and their corresponding short URLs
Implement a service to generate unique short URLs and redirect to original URLs
Consider scalability and performance by using caching and load balancing
Ensure security by validating input URLs and preventing malicious redirects
I manage risks by identifying potential risks, assessing their impact, developing mitigation strategies, and monitoring them throughout the project.
Identify potential risks by conducting risk assessments
Assess the impact of each risk on the project's objectives
Develop mitigation strategies to address high-priority risks
Monitor risks throughout the project lifecycle and adjust strategies as needed
To deal with difficult stakeholders, it is important to communicate effectively, build trust, manage expectations, and find common ground.
Communicate openly and regularly with stakeholders to address concerns and keep them informed
Build trust by delivering on promises and being transparent in your actions
Manage expectations by setting clear goals and timelines, and being realistic about what can be achieved
Find co...
Understanding BGP route manipulation is crucial for network security and performance optimization.
BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems.
Route manipulation can involve techniques like route filtering, route aggregation, and route redistribution.
Example: Using prefix lists to filter out unwanted routes from being advertised.
BGP attributes like AS_PATH, NEXT_...
Opening a website involves DNS resolution, server requests, and rendering content in the browser.
1. DNS Resolution: The browser queries a DNS server to translate the domain name (e.g., www.example.com) into an IP address.
2. TCP Connection: A TCP connection is established between the browser and the web server using the IP address.
3. HTTP Request: The browser sends an HTTP request to the server for the desired reso...
I appeared for an interview in Jun 2025, where I was asked the following questions.
HTTPS is a secure version of HTTP, using encryption to protect data exchanged between a client and server.
HTTPS stands for HyperText Transfer Protocol Secure.
It uses SSL/TLS protocols to encrypt data, ensuring secure communication.
When a user visits a website, the browser checks the site's SSL certificate.
Example: A URL starting with 'https://' indicates a secure connection.
HTTPS protects against eavesdropping and man-...
HTTPS uses SSL/TLS protocols to encrypt data between the client and server, ensuring secure communication over the internet.
HTTPS employs SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols for encryption.
SSL/TLS encrypts data in transit, protecting it from eavesdropping and tampering.
A common example is the padlock icon in web browsers indicating a secure connection.
TLS 1.2 and TLS 1.3 are the most...
Using 'dig google.com' queries DNS servers to resolve the domain name to its corresponding IP address.
The 'dig' command is a DNS lookup utility used to query DNS servers.
When you run 'dig google.com', it sends a request to the DNS server for the IP address associated with google.com.
The DNS server responds with the IP address, allowing your computer to connect to Google's servers.
Example output may show multiple IP add...
WAFs typically do not decrypt payloads; they analyze traffic patterns to block XSS attacks.
WAFs inspect HTTP requests and responses for malicious patterns.
They use signature-based detection to identify known XSS payloads.
WAFs may employ heuristics and anomaly detection to block suspicious behavior.
Example: A WAF might block a request containing '<script>' tags.
Encryption is not usually involved in the detection o...
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
To deal with difficult stakeholders, it is important to communicate effectively, build trust, manage expectations, and find common ground.
Communicate openly and regularly with stakeholders to address concerns and keep them informed
Build trust by delivering on promises and being transparent in your actions
Manage expectations by setting clear goals and timelines, and being realistic about what can be achieved
Find common ...
I faced challenges with team communication and resource allocation, but resolved them through regular meetings and adjusting timelines.
Team communication breakdowns led to misunderstandings and delays
Resource allocation issues caused bottlenecks in project progress
Held regular team meetings to address communication issues and clarify tasks
Adjusted project timelines to accommodate resource constraints and meet deadlines
I manage risks by identifying potential risks, assessing their impact, developing mitigation strategies, and monitoring them throughout the project.
Identify potential risks by conducting risk assessments
Assess the impact of each risk on the project's objectives
Develop mitigation strategies to address high-priority risks
Monitor risks throughout the project lifecycle and adjust strategies as needed
I proactively identify delays, assess impact, communicate with stakeholders, and collaborate on solutions.
Identify the cause of the delay and assess its impact on the project timeline and deliverables
Communicate the delay to stakeholders promptly and transparently, providing clear reasons and potential solutions
Collaborate with stakeholders to develop a plan to mitigate the delay and adjust project timelines accordingl...
I applied via Campus Placement and was interviewed in May 2024. There were 4 interview rounds.
Every round was held in banglore office . The round consisted of some mathematics and paragraphed based questions and some video baed ques related to akamai
Actually due to time costraint and less no of candidates they didnt conduct the gd
SQL query, Linux, OS fundamentals
I applied via Company Website and was interviewed in Apr 2024. There were 4 interview rounds.
All aptitude questions like percentage,permutation and combination ,english sentences etc ,normal aptitude questions.
Normal GD topics ,current affairs etc.
I applied via LinkedIn and was interviewed in Feb 2024. There was 1 interview round.
I appeared for an interview in Mar 2025, where I was asked the following questions.
Identifying pain points and creating use cases for a given business scenario.
Identify user frustrations, such as slow response times in a system.
Analyze workflow inefficiencies, like redundant data entry.
Consider stakeholder needs, such as reporting requirements for management.
Evaluate system integration issues, for example, lack of communication between platforms.
Assess user experience challenges, like a confusing int...
I applied via Campus Placement and was interviewed in Jun 2024. There were 2 interview rounds.
Easiest test in my life
Opening a website involves DNS resolution, server requests, and rendering content in the browser.
1. DNS Resolution: The browser queries a DNS server to translate the domain name (e.g., www.example.com) into an IP address.
2. TCP Connection: A TCP connection is established between the browser and the web server using the IP address.
3. HTTP Request: The browser sends an HTTP request to the server for the desired resource ...
Understanding BGP route manipulation is crucial for network security and performance optimization.
BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems.
Route manipulation can involve techniques like route filtering, route aggregation, and route redistribution.
Example: Using prefix lists to filter out unwanted routes from being advertised.
BGP attributes like AS_PATH, NEXT_HOP, ...
Top trending discussions
Some of the top questions asked at the Akamai Technologies interview -
The duration of Akamai Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 55 interview experiences
Difficulty level
Duration
based on 416 reviews
Rating in categories
Cloud Support Engineer
161
salaries
| ₹12.7 L/yr - ₹19 L/yr |
Senior Software Engineer
135
salaries
| ₹29.6 L/yr - ₹50 L/yr |
Software Engineer
133
salaries
| ₹12.6 L/yr - ₹22 L/yr |
Software Engineer2
115
salaries
| ₹16 L/yr - ₹26.5 L/yr |
Service Delivery Manager
88
salaries
| ₹21.9 L/yr - ₹40 L/yr |
24/7 Customer
Thomson Reuters
Oracle Cerner
Adobe