Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Aujas Cybersecurity-NuSummit company Team. If you also belong to the team, you can get access from here

Aujas Cybersecurity-NuSummit company Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Aujas Cybersecurity-NuSummit company Network Security Engineer Interview Questions and Answers

Updated 17 Sep 2023

Aujas Cybersecurity-NuSummit company Network Security Engineer Interview Experiences

1 interview found

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(5 Questions)

  • Q1. What is the privilege of nessus security tool
  • Ans. 

    Nessus security tool provides vulnerability scanning and assessment capabilities for network security.

    • Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.

    • It can identify misconfigurations, missing patches, and potential security threats.

    • Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.

  • Answered by AI
  • Q2. What is privilege of windows and linux
  • Ans. 

    Privilege in Windows and Linux refers to the level of access and control a user or process has over system resources.

    • Privilege levels in Windows are typically categorized as Administrator, Standard User, and Guest.

    • In Linux, privilege levels are determined by user accounts and groups, with root being the highest level of privilege.

    • Windows uses User Account Control (UAC) to manage privileges and prevent unauthorized chan...

  • Answered by AI
  • Q3. What is use of 443 port
  • Ans. 

    Port 443 is used for secure HTTP (HTTPS) communication over the internet.

    • Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.

    • It is commonly used for secure communication between web browsers and servers.

    • HTTPS ensures that data transmitted over the internet is encrypted and secure.

    • Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive informa...

  • Answered by AI
  • Q4. Tco,udp,ftp https,http port number?
  • Ans. 

    Common network protocols and their associated port numbers for TCP, UDP, FTP, HTTPS, and HTTP.

    • TCP (Transmission Control Protocol) is used for reliable communication, typically on port 80 for HTTP.

    • UDP (User Datagram Protocol) is used for faster, connectionless communication, often on port 53 for DNS.

    • FTP (File Transfer Protocol) operates on TCP port 21 for control and port 20 for data transfer.

    • HTTPS (Hypertext Transfer P...

  • Answered by AI
  • Q5. What is the firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Can be hardware-based or software-based

    • Filters traffic based on IP addresses, ports, protocols, and other criteria

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - cyber security is big concept use a single partial job in security like penetration testing ,hardware firewall like palo alto , Cisco asa

Skills evaluated in this interview

Top trending discussions

View All
Interview Hub
4d (edited)
anshitanegi
·
ex -
Planet Spark
When HR’s Chinese English made me drop the interview!
So, I talked to the HR yesterday about the interview. I asked Please send me the location But their English… bro I was shocked! It was like talking to someone jisne english nahi kuch ar hi seekh liya ho, if the HR’s English is this I can only imagine the rest of the company I decided to drop the interview with this chinese english😶‍🌫️
FeedCard Image
Got a question about Aujas Cybersecurity-NuSummit company?
Ask anonymously on communities.

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. Depends upon client,iOS Upgradation,ospf,bgp,hsrp,vlan,vpn,nat, firewall rule.blocking.l etc
  • Q2. Need to read sd wan
  • Q3. Firewall traffic flow
  • Q4. Stp and vtp how to work need depth knowledge
  • Ans. 

    STP prevents loops in network topologies, while VTP manages VLAN configurations across switches.

    • STP (Spanning Tree Protocol) prevents loops by creating a loop-free logical topology.

    • STP uses a root bridge election process based on bridge IDs to determine the best path.

    • VTP (VLAN Trunking Protocol) allows switches to share VLAN information, simplifying VLAN management.

    • VTP operates in different modes: Server, Client, and T...

  • Answered by AI
Round 3 - HR 

(1 Question)

  • Q1. About joining and PKG.

Interview Preparation Tips

Interview preparation tips for other job seekers - Read about switch and firewall and one routing protocol

Network Security Engineer Interview Questions Asked at Other Companies

Q1. Which protocols are used in the transport layer of the OSI model?
Q2. what are the types of firewalls ? what is a firewall and why is i ... read more
Q3. What is the diff between a vulnerability, a threat and a risk ? w ... read more
Q4. Describe your experience with Palo Alto, Cisco ASA, Checkpoint, a ... read more
asked in AT&T
Q5. What is the difference between the phases of a site-to-site VPN?

I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.

Interview Questionnaire 

4 Questions

  • Q1. Started with checkpoint, anti spoofing, Clustering, SIC Communication, Checkpoint commands etc
  • Q2. ASA - Security levels, Difference between 8.3 pre and post, Transparent and Routed mode firewall, VPN, Stateful and stateless failover. Commands related to vpn
  • Ans. 

    The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.

    • ASA firewall has security levels assigned to interfaces to control traffic flow

    • The 8.3 version of ASA introduced significant changes in NAT configuration

    • Transparent mode firewall operates at Layer 2 and d...

  • Answered by AI
  • Q3. F5, Basics like LB Methods, VIP, POOL, POOL MEMBERS, Self ip, floating ip, profiles, Failover, commands to check the route etc
  • Q4. Why you wants to join Microland, how soon you can join, and in return the brief notes about the Microland
  • Ans. 

    I want to join Microland because of its reputation for innovation and growth. I can join within two weeks.

    • I am impressed by Microland's track record of providing cutting-edge solutions in the IT industry.

    • I am excited about the opportunity to work with a team of talented professionals at Microland.

    • I believe my skills and experience align well with the challenges and opportunities at Microland.

    • I can join within two weeks...

  • Answered by AI

Interview Preparation Tips

Round: Manager round
Experience: About the nature of work, the incident flow, change flow, ITIL related stuffs , any other expectation apart from the salary stack etc

General Tips: Interview process is very easy here in Microland, if you have theory and bit of practice, can crack it. All the very best
Skills: Security , Communication, Body Language
Duration: 1-3 Months

Skills evaluated in this interview

I applied via Recruitment Consultant and was interviewed in Nov 2019. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. They asked about firewalls. Rule creation, apply ips ddos and atp.Basics of Network Security.

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and answer according to your real life experience.
They will ask you to design cyber security for an organisation.

I applied via Referral and was interviewed before Jan 2021. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. BGP OSPF Subnetting VLAN HSRP

Interview Preparation Tips

Interview preparation tips for other job seekers - Just Be calm and reply your answer.
Interviewer is very good in Sify .

I applied via Approached by Company and was interviewed in Oct 2021. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Networking Issue, Knowledge about leased line.
  • Q2. Mpls technology, routing protocols

Interview Preparation Tips

Interview preparation tips for other job seekers - Confident, Honest, punctual, energetic
Be interview-ready. Browse the most asked HR questions.
illustration image
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What is the SMTP?
  • Q2. What is the RSMTP?
  • Ans. 

    RSNTP (Reliable Simple Network Transfer Protocol) is an extension of SMTP for reliable email delivery.

    • RSNTP enhances SMTP by providing reliability features.

    • It ensures message delivery even in case of network failures.

    • RSNTP can be used in environments where email delivery is critical.

    • Example: A financial institution using RSNTP to ensure transaction emails are reliably sent.

  • Answered by AI
  • Q3. Tell about TCP Rest
  • Ans. 

    TCP Rest refers to the use of TCP for RESTful web services, ensuring reliable communication between clients and servers.

    • TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data transmission.

    • REST (Representational State Transfer) is an architectural style for designing networked applications, often using HTTP.

    • TCP provides error-checking and guarantees that data packets are deliver...

  • Answered by AI

Skills evaluated in this interview

Are these interview questions helpful?

I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. CCNA networks, OSI model, IP address, DNS, DHCP, scenario based questions, security, different protocols
  • Q2. Mainly on CCNA basics and security

Interview Preparation Tips

Interview preparation tips for other job seekers - 4 rounds of interview it is not too tough to crack the interview if you know the basics of the concepts only if you are certified engineers they go deeper otherwise it is easy to get in here.depend on the project questions will be there
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. Salary related questions
  • Q2. Location and position

Interview Preparation Tips

Interview preparation tips for other job seekers - 3i infotech is the best company but salary is so poor
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Briefly explain the your network architecture.
  • Ans. 

    Our network architecture is a hybrid model combining on-premises and cloud-based solutions for optimal performance and scalability.

    • Utilize on-premises servers for critical data storage and applications

    • Leverage cloud services for scalability and flexibility

    • Implement redundant network connections for high availability

    • Use virtual private networks (VPNs) for secure remote access

    • Employ firewalls and intrusion detection/prev...

  • Answered by AI
  • Q2. Choose your best routing protocols
  • Ans. 

    My best routing protocols are OSPF, BGP, and EIGRP.

    • OSPF is a link-state routing protocol known for its scalability and fast convergence.

    • BGP is a path vector protocol commonly used for inter-domain routing.

    • EIGRP is a Cisco proprietary protocol that combines features of both distance vector and link-state protocols.

  • Answered by AI

Aujas Cybersecurity-NuSummit company Interview FAQs

How many rounds are there in Aujas Cybersecurity-NuSummit company Network Security Engineer interview?
Aujas Cybersecurity-NuSummit company interview process usually has 2 rounds. The most common rounds in the Aujas Cybersecurity-NuSummit company interview process are Resume Shortlist and Technical.
What are the top questions asked in Aujas Cybersecurity-NuSummit company Network Security Engineer interview?

Some of the top questions asked at the Aujas Cybersecurity-NuSummit company Network Security Engineer interview -

  1. what is the privilege of nessus security t...read more
  2. what is privilege of windows and li...read more
  3. what is use of 443 p...read more

Tell us how to improve this page.

Overall Interview Experience Rating

3/5

based on 1 interview experience

Difficulty level

Moderate 100%

Duration

Less than 2 weeks 100%
View more
68% more than the average Network Security Engineer Salary in India
View more details

Aujas Cybersecurity-NuSummit company Network Security Engineer Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

4.0

Skill development

3.0

Work-life balance

5.0

Salary

3.0

Job security

1.0

Company culture

3.0

Promotions

2.0

Work satisfaction

Explore 1 Review and Rating
Consultant
396 salaries
unlock blur

₹8.4 L/yr - ₹14.9 L/yr

Senior Consultant
281 salaries
unlock blur

₹12 L/yr - ₹20.1 L/yr

Associate Consultant
237 salaries
unlock blur

₹3.9 L/yr - ₹9 L/yr

Security Consultant
128 salaries
unlock blur

₹6 L/yr - ₹14 L/yr

Lead Consultant
92 salaries
unlock blur

₹20 L/yr - ₹36 L/yr

Explore more salaries
Compare Aujas Cybersecurity-NuSummit company with

ITC Infotech

3.7
Compare

3i Infotech

3.4
Compare

Sify Technologies

3.8
Compare

Microland

3.5
Compare
write
Share an Interview