Filter interviews by
Technical questions asked related to network and security
I appeared for an interview before May 2024, where I was asked the following questions.
Understanding key concepts in network security: vulnerabilities, threats, risks, and principles of information security.
Vulnerability: A weakness in a system (e.g., outdated software).
Threat: A potential cause of an unwanted incident (e.g., malware).
Risk: The potential for loss or damage when a threat exploits a vulnerability.
Three principles of information security: Confidentiality, Integrity, Availability.
IDs (Intrus...
Firewalls are security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Types of firewalls include: Packet Filtering, Stateful Inspection, Proxy Firewalls, and Next-Generation Firewalls.
A firewall acts as a barrier between trusted and untrusted networks, preventing unauthorized access.
Stateful firewalls track the state of active connections, while stateless fi...
I appeared for an interview before May 2024, where I was asked the following questions.
Firewalls act as barriers between trusted and untrusted networks, controlling traffic based on security rules.
Monitors incoming and outgoing traffic to enforce security policies.
Blocks unauthorized access while allowing legitimate communication.
Can be hardware-based (like Cisco ASA) or software-based (like Windows Firewall).
Uses rules to permit or deny traffic based on IP addresses, ports, and protocols.
Can provide add...
Top trending discussions
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I appeared for an interview in Oct 2024, where I was asked the following questions.
Firmware upgrades enhance device performance, security, and compatibility, while RMA ensures efficient replacement of faulty switches.
Improved Performance: Upgrading firmware can optimize the performance of network devices, such as switches, by enhancing processing capabilities.
Security Enhancements: Firmware updates often include patches for vulnerabilities, protecting the network from potential threats.
New Features: ...
I appeared for an interview in Apr 2025, where I was asked the following questions.
The 3-way handshake is a TCP connection establishment process involving SYN, SYN-ACK, and ACK messages.
Step 1: Client sends a SYN packet to the server to initiate a connection.
Step 2: Server responds with a SYN-ACK packet to acknowledge the request.
Step 3: Client sends an ACK packet back to the server, completing the handshake.
Example: A web browser (client) connects to a web server using this process.
ZCC stands for Zero-Crossing Control, a technique used in electronic circuits for efficient switching.
ZCC minimizes power loss during switching events.
Commonly used in AC motor drives to improve efficiency.
Helps reduce electromagnetic interference (EMI) in circuits.
Example: In a TRIAC-based dimmer switch, ZCC ensures smooth light dimming.
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
English , GK, arithmetic
Device bias can lead to improved performance, efficiency, and user experience in network engineering.
Device bias can result in optimized network traffic routing, leading to faster data transmission.
It can enhance security measures by prioritizing certain devices for access control and monitoring.
Device bias can improve overall network stability and reliability by allocating resources more effectively.
For example, imple...
I applied via Campus Placement and was interviewed in May 2022. There were 3 interview rounds.
Check your activity. And professional prasanality development.
How to do planning hendal of project work
I appeared for an interview before Apr 2023.
IR Response for P1 ticket involves immediate investigation, containment, and resolution of critical security incidents.
Immediately triage the incident to determine severity and impact
Contain the incident to prevent further damage or data loss
Gather evidence and conduct forensic analysis to identify root cause
Coordinate with relevant teams for remediation and recovery
Document all actions taken and lessons learned for fu...
Some of the top questions asked at the Orient Technologies Network Security Engineer interview -
based on 5 interview experiences
Difficulty level
Duration
based on 18 reviews
Rating in categories
Desktop Support Engineer
219
salaries
| ₹1.6 L/yr - ₹4.5 L/yr |
Network Support Engineer
150
salaries
| ₹1 L/yr - ₹3.1 L/yr |
Network Engineer
141
salaries
| ₹3 L/yr - ₹7.9 L/yr |
System Administrator
80
salaries
| ₹3.1 L/yr - ₹7.5 L/yr |
Technical Support Engineer
79
salaries
| ₹1.8 L/yr - ₹4.6 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant