Filter interviews by
I appeared for an interview before May 2024, where I was asked the following questions.
IPS (Intrusion Prevention System) and IDS (Intrusion Detection System) are security technologies for monitoring and protecting networks.
IPS actively blocks potential threats, while IDS only detects and alerts.
Example of IPS: Snort IPS, which can prevent attacks in real-time.
Example of IDS: Snort IDS, which logs and alerts on suspicious activities.
IPS is often placed inline, whereas IDS is typically placed out of band.
Stateful firewalls track active connections, while stateless firewalls filter packets based on predefined rules without connection context.
Stateful firewalls maintain a table of active connections, allowing them to make decisions based on the state of the connection.
Stateless firewalls inspect each packet individually, applying rules without considering the context of the traffic flow.
Example of a stateful firewall: Ci...
Firewalls are security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Packet Filtering Firewall: Inspects packets and allows or blocks them based on IP addresses, ports, and protocols. Example: Cisco ASA.
Stateful Inspection Firewall: Tracks the state of active connections and makes decisions based on the context of traffic. Example: Check Point Firewall.
Prox...
Configuring a firewall involves defining rules to control network traffic and protect systems from unauthorized access.
1. Determine the firewall type: hardware or software (e.g., Cisco ASA for hardware, Windows Firewall for software).
2. Define security policies: establish rules for allowed and denied traffic based on IP addresses, ports, and protocols.
3. Configure interfaces: set up internal and external interfaces wit...
Upgrading firewall firmware involves planning, downloading, and applying updates to enhance security and performance.
1. Backup current configuration: Always save the existing settings before making changes.
2. Check compatibility: Ensure the new firmware version is compatible with your hardware model.
3. Download firmware: Obtain the latest firmware from the manufacturer's website.
4. Review release notes: Understand new ...
NAT (Network Address Translation) is a method used to modify IP address information in packet headers while in transit across a router.
NAT allows multiple devices on a local network to share a single public IP address.
It enhances security by hiding internal IP addresses from external networks.
Example: A home router uses NAT to allow multiple devices to access the internet through one public IP.
Types of NAT include Stat...
SNAT translates source IP addresses, while DNAT translates destination IP addresses in network address translation.
SNAT (Source Network Address Translation) modifies the source IP address of packets.
Example of SNAT: A private IP (192.168.1.10) is translated to a public IP (203.0.113.5) for internet access.
DNAT (Destination Network Address Translation) modifies the destination IP address of packets.
Example of DNAT: A pu...
Web filters are tools that control and manage internet content access, enhancing security and productivity.
Blocks access to harmful websites, such as those containing malware or phishing attempts.
Enforces company policies by restricting access to non-work-related sites, like social media or gaming.
Monitors internet usage to ensure compliance with regulations and internal policies.
Can categorize websites into different ...
Antispoofing refers to techniques used to prevent unauthorized access by verifying the authenticity of users or devices.
Antispoofing techniques include biometric verification, such as fingerprint or facial recognition.
In cybersecurity, antispoofing can involve email authentication methods like SPF and DKIM to prevent email spoofing.
Voice recognition systems may use antispoofing measures to differentiate between real vo...
IKEv1 and IKEv2 are protocols for establishing secure connections in IPsec VPNs, with key differences in features and performance.
IKEv1 supports only main mode and aggressive mode, while IKEv2 simplifies this with a single mode.
IKEv2 has built-in support for NAT traversal, improving connectivity in various network environments.
IKEv2 offers better security features, including support for EAP (Extensible Authentication P...
Top trending discussions
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I appeared for an interview in Apr 2025, where I was asked the following questions.
The 3-way handshake is a TCP connection establishment process involving SYN, SYN-ACK, and ACK messages.
Step 1: Client sends a SYN packet to the server to initiate a connection.
Step 2: Server responds with a SYN-ACK packet to acknowledge the request.
Step 3: Client sends an ACK packet back to the server, completing the handshake.
Example: A web browser (client) connects to a web server using this process.
SSL (Secure Sockets Layer) is a protocol for establishing a secure, encrypted link between a web server and a browser.
SSL encrypts data transmitted over the internet, ensuring privacy and security.
It uses a combination of asymmetric and symmetric encryption for secure communication.
Websites using SSL have URLs that start with 'https://' instead of 'http://'.
SSL certificates are issued by Certificate Authorities (CAs) t...
ZCC stands for Zero-Crossing Control, a technique used in electronic circuits for efficient switching.
ZCC minimizes power loss during switching events.
Commonly used in AC motor drives to improve efficiency.
Helps reduce electromagnetic interference (EMI) in circuits.
Example: In a TRIAC-based dimmer switch, ZCC ensures smooth light dimming.
The OSI model is a conceptual framework used to understand network communication in seven layers.
Layer 1: Physical - Deals with the physical connection (e.g., cables, switches).
Layer 2: Data Link - Manages node-to-node data transfer (e.g., Ethernet, Wi-Fi).
Layer 3: Network - Handles routing and forwarding of data packets (e.g., IP).
Layer 4: Transport - Ensures complete data transfer (e.g., TCP, UDP).
Layer 5: Session - ...
A VPN (Virtual Private Network) creates a secure connection over the internet, protecting data and privacy.
Encrypts internet traffic to protect data from eavesdroppers.
Allows remote access to a private network, useful for telecommuting.
Bypasses geo-restrictions, enabling access to region-locked content.
Examples include services like NordVPN, ExpressVPN, and Cisco AnyConnect.
I appeared for an interview in Oct 2024, where I was asked the following questions.
Firmware upgrades enhance device performance, security, and compatibility, while RMA ensures efficient replacement of faulty switches.
Improved Performance: Upgrading firmware can optimize the performance of network devices, such as switches, by enhancing processing capabilities.
Security Enhancements: Firmware updates often include patches for vulnerabilities, protecting the network from potential threats.
New Features: ...
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
I appeared for an interview in Dec 2023.
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
English , GK, arithmetic
Device bias can lead to improved performance, efficiency, and user experience in network engineering.
Device bias can result in optimized network traffic routing, leading to faster data transmission.
It can enhance security measures by prioritizing certain devices for access control and monitoring.
Device bias can improve overall network stability and reliability by allocating resources more effectively.
For example, imple...
posted on 22 Nov 2021
I applied via Walk-in and was interviewed before Nov 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed before Mar 2020. There were 4 interview rounds.
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashma...
based on 1 interview experience
Difficulty level
Duration
based on 2 reviews
Rating in categories
Desktop Support Engineer
229
salaries
| ₹1.6 L/yr - ₹4.5 L/yr |
Network Engineer
150
salaries
| ₹1.7 L/yr - ₹7.9 L/yr |
Network Support Engineer
143
salaries
| ₹0.9 L/yr - ₹6 L/yr |
Technical Support Engineer
82
salaries
| ₹2 L/yr - ₹5.1 L/yr |
System Administrator
77
salaries
| ₹3.3 L/yr - ₹7.5 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant