i
Inspira Enterprise India
Limited
Filter interviews by
EDR plays a crucial role in incident response by continuously monitoring and analyzing endpoint activities for signs of malicious behavior.
EDR solutions provide real-time visibility into endpoint activities, allowing for quick detection of potential threats.
They use advanced analytics and machine learning to identify suspicious behavior and indicators of compromise.
EDR tools can automatically respond to threats by isol...
Top trending discussions
I applied via Referral and was interviewed before Jan 2021. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
English , GK, arithmetic
Device bias can lead to improved performance, efficiency, and user experience in network engineering.
Device bias can result in optimized network traffic routing, leading to faster data transmission.
It can enhance security measures by prioritizing certain devices for access control and monitoring.
Device bias can improve overall network stability and reliability by allocating resources more effectively.
For example, imple...
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I appeared for an interview in Oct 2024, where I was asked the following questions.
Firmware upgrades enhance device performance, security, and compatibility, while RMA ensures efficient replacement of faulty switches.
Improved Performance: Upgrading firmware can optimize the performance of network devices, such as switches, by enhancing processing capabilities.
Security Enhancements: Firmware updates often include patches for vulnerabilities, protecting the network from potential threats.
New Features: ...
I appeared for an interview in Apr 2025, where I was asked the following questions.
The 3-way handshake is a TCP connection establishment process involving SYN, SYN-ACK, and ACK messages.
Step 1: Client sends a SYN packet to the server to initiate a connection.
Step 2: Server responds with a SYN-ACK packet to acknowledge the request.
Step 3: Client sends an ACK packet back to the server, completing the handshake.
Example: A web browser (client) connects to a web server using this process.
SSL (Secure Sockets Layer) is a protocol for establishing a secure, encrypted link between a web server and a browser.
SSL encrypts data transmitted over the internet, ensuring privacy and security.
It uses a combination of asymmetric and symmetric encryption for secure communication.
Websites using SSL have URLs that start with 'https://' instead of 'http://'.
SSL certificates are issued by Certificate Authorities (CAs) t...
ZCC stands for Zero-Crossing Control, a technique used in electronic circuits for efficient switching.
ZCC minimizes power loss during switching events.
Commonly used in AC motor drives to improve efficiency.
Helps reduce electromagnetic interference (EMI) in circuits.
Example: In a TRIAC-based dimmer switch, ZCC ensures smooth light dimming.
The OSI model is a conceptual framework used to understand network communication in seven layers.
Layer 1: Physical - Deals with the physical connection (e.g., cables, switches).
Layer 2: Data Link - Manages node-to-node data transfer (e.g., Ethernet, Wi-Fi).
Layer 3: Network - Handles routing and forwarding of data packets (e.g., IP).
Layer 4: Transport - Ensures complete data transfer (e.g., TCP, UDP).
Layer 5: Session - ...
A VPN (Virtual Private Network) creates a secure connection over the internet, protecting data and privacy.
Encrypts internet traffic to protect data from eavesdroppers.
Allows remote access to a private network, useful for telecommuting.
Bypasses geo-restrictions, enabling access to region-locked content.
Examples include services like NordVPN, ExpressVPN, and Cisco AnyConnect.
posted on 27 Oct 2021
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems.
BGP is an exterior gateway protocol used in large-scale networks.
It allows routers in different autonomous systems to communicate and exchange routing information.
BGP uses path vector routing, which takes into account multiple factors to determine the best path for data transmission.
BGP assigns ...
OSPF (Open Shortest Path First) is a routing protocol used in computer networks to determine the best path for data packets to travel.
OSPF is an interior gateway protocol (IGP) used within a single autonomous system (AS).
It uses the link-state routing algorithm to calculate the shortest path between routers.
OSPF divides the network into areas to improve scalability and reduce routing overhead.
Each area has its own link...
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
A router is a networking device that forwards data packets between computer networks, while a switch is a networking device that connects devices within a network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to route traffic between different networks, while switches use MAC addresses to forward data within a network.
Ro...
Modem type in refers to the process of configuring a modem to connect to a network.
Modem type in involves setting up the modem to establish a connection with a network.
It includes configuring the modem's settings such as IP address, subnet mask, and default gateway.
Examples of modem types include DSL modems, cable modems, and wireless modems.
I applied via Approached by Company and was interviewed in Jun 2022. There was 1 interview round.
based on 1 interview experience
Security Analyst
360
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Security Analyst
240
salaries
| ₹5 L/yr - ₹20 L/yr |
Network Engineer
171
salaries
| ₹1.8 L/yr - ₹8.5 L/yr |
Cyber Security Analyst
135
salaries
| ₹2.8 L/yr - ₹9.5 L/yr |
SOC Analyst
108
salaries
| ₹3.3 L/yr - ₹10 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland