Filter interviews by
A and B can complete a piece of work in 12 and 15 days, respectively. They work together for 4 days, and then A leaves. How many more days will B take to complete the work?
If 10 men can do a piece of work in 6 days, how long will it take for 15 men to complete it?
Find the Second Largest Number
Write a program to find the second largest number in an array.
Splunk is a software platform used for searching, monitoring, and analyzing machine-generated big data.
Splunk collects and indexes data from various sources like logs, events, and metrics.
It allows users to search, visualize, and analyze data in real-time.
Splunk can be used for security monitoring, troubleshooting, and business analytics.
Example: Splunk can be used to monitor network traffic for security threats.
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
Phishing is a cyber attack that tricks individuals into revealing sensitive information through deceptive communications.
Phishing often uses emails that appear to be from legitimate sources, like banks or popular services.
Example: An email claiming to be from your bank asking you to verify your account details.
Spear phishing targets specific individuals or organizations, often using personal information to increase cre...
Threat hunting hypothesis is a proactive approach to cybersecurity where analysts develop educated guesses about potential threats and then investigate to confirm or deny them.
Threat hunting hypothesis involves formulating educated guesses about potential threats based on available data and intelligence.
Analysts then investigate these hypotheses by actively searching for signs of compromise or malicious activity within...
Persistence is the ability of an attacker to maintain access to a compromised system, while lateral movement is the act of moving through a network to gain access to other systems.
Persistence involves maintaining access to a compromised system over time, often through backdoors or malware.
Lateral movement involves moving laterally through a network to gain access to other systems, often using compromised credentials or...
To investigate on EDR for a specific task, analyze logs, conduct endpoint forensics, review alerts, and collaborate with other teams.
Analyze EDR logs to identify any suspicious activities or anomalies
Conduct endpoint forensics to gather more information about the specific task
Review alerts generated by the EDR system for any relevant information
Collaborate with other teams such as incident response or threat intelligen...
I appeared for an interview in Jul 2024.
Phishing analysis involves examining suspicious emails or messages to identify potential threats and prevent security breaches.
Phishing analysis involves examining emails or messages for suspicious links, attachments, or requests for personal information.
Look for common phishing indicators such as misspelled URLs, generic greetings, urgent language, and requests for sensitive information.
Use tools like email filters, U...
I appeared for an interview before May 2024, where I was asked the following questions.
CPM password rotation automates the process of changing passwords for privileged accounts to enhance security.
CPM stands for CyberArk Password Manager, which manages and rotates passwords for sensitive accounts.
Automated password rotation reduces the risk of unauthorized access by frequently changing passwords.
For example, a system administrator's password can be set to rotate every 30 days.
CPM can integrate with vario...
PSM recordings are typically saved in a secure, centralized storage location for easy access and management.
Recordings are stored in a designated database or file system managed by the PSM solution.
Access to recordings is usually restricted to authorized personnel to maintain security.
Recordings can often be indexed and searched for specific sessions or events.
Examples of storage locations include cloud storage solutio...
I applied via Naukri.com and was interviewed before Nov 2022. There were 2 interview rounds.
I applied via Campus Placement and was interviewed before Jan 2023. There were 2 interview rounds.
Basic aptitude for freshers
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Sep 2019. There were 3 interview rounds.
Handle a P1 situation by prioritizing the issue, communicating effectively, and collaborating with team members.
Prioritize the issue based on impact and urgency
Communicate with stakeholders about the situation and potential solutions
Collaborate with team members to address the issue efficiently
It would be challenging to work all rotational shifts without shift allowance.
Working all rotational shifts without shift allowance can lead to burnout and decreased job satisfaction.
It may be difficult to maintain work-life balance without shift allowance.
Financial compensation for working rotational shifts is a common practice in many industries.
Without shift allowance, employees may feel undervalued and demotivated.
...
based on 10 interview experiences
Difficulty level
Duration
based on 138 reviews
Rating in categories
Application Development Analyst
39.3k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
27.7k
salaries
| ₹7 L/yr - ₹20.5 L/yr |
Team Lead
26.5k
salaries
| ₹7.3 L/yr - ₹26.6 L/yr |
Senior Analyst
19.4k
salaries
| ₹5.6 L/yr - ₹21.5 L/yr |
Senior Software Engineer
18.5k
salaries
| ₹6.2 L/yr - ₹21 L/yr |
TCS
Cognizant
Capgemini
Infosys