Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Nov 2023. There was 1 interview round.
Top trending discussions
Burp Suite is a web application security testing tool.
Burp Suite is used for manual and automated testing of web applications.
It includes various tools like a proxy, scanner, intruder, repeater, and sequencer.
The proxy tool allows intercepting and modifying HTTP/S traffic.
The scanner tool automatically identifies vulnerabilities in web applications.
The intruder tool can be used for brute-forcing, fuzzing, and payload t...
Nmap is a powerful network scanning tool used to discover hosts and services on a network.
Nmap can be used to scan specific hosts or entire networks.
It provides various scan types such as TCP, UDP, SYN, etc.
Nmap can detect open ports, running services, and operating systems.
It offers advanced features like OS fingerprinting, version detection, and script scanning.
Example: 'nmap -p 1-1000 -sS 192.168.0.1' scans ports 1
I applied via Walk-in and was interviewed in Aug 2023. There was 1 interview round.
I applied via campus placement at Haldia Institute of Technology (HIT) and was interviewed before Nov 2023. There were 2 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates w...
I am passionate about cybersecurity and believe in the values and mission of your company.
I have a strong background in cybersecurity with experience in threat detection and prevention.
I am impressed by your company's reputation for innovative security solutions.
I am excited about the opportunity to work with a team of talented professionals in the field.
I believe that my skills and expertise align well with the challe
I applied via Referral and was interviewed in Oct 2022. There were 2 interview rounds.
posted on 12 Jun 2024
I applied via Campus Placement and was interviewed before Jun 2023. There was 1 interview round.
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Authentication precedes authorization in the access control process.
Example: Logging into a system (authentication) ...
Cryptography is the practice and study of techniques for securing information and communication.
Cryptography is used to protect data from unauthorized access.
It involves techniques such as encryption and decryption.
Common encryption algorithms include DES, 3DES, AES, and RC4.
Asymmetric encryption uses different keys for encryption and decryption, while symmetric encryption uses the same key.
Cryptography is essential fo
based on 12 reviews
Rating in categories
Team Lead
485
salaries
| ₹2.4 L/yr - ₹9 L/yr |
Process Associate
398
salaries
| ₹1.4 L/yr - ₹4.5 L/yr |
Associate
393
salaries
| ₹1 L/yr - ₹6 L/yr |
Team Lead Operations
224
salaries
| ₹3.3 L/yr - ₹10 L/yr |
Channel Team Lead
224
salaries
| ₹4.8 L/yr - ₹13 L/yr |
Delhivery
Ekart Logistics
Blue Dart Express
DTDC Express