Filter interviews by
I applied via Naukri.com and was interviewed in May 2020. There were 3 interview rounds.
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
posted on 10 Oct 2024
TCP/IP model is a conceptual framework used to understand how data is transmitted over a network.
Consists of four layers: Application, Transport, Internet, Link
Each layer has specific functions and protocols
Data is encapsulated and decapsulated as it moves through the layers
Example: HTTP operates at the Application layer, while TCP operates at the Transport layer
Strength: Strong leadership skills, Weakness: Difficulty delegating tasks
Strength: Effective communication and problem-solving skills
Strength: Ability to remain calm under pressure
Weakness: Tendency to take on too much responsibility
Weakness: Struggle with trusting others to complete tasks
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.
Firewall is a security system that filters network traffic based on predetermined security rules.
Gateway is a node that acts as an entry and exit point for data between two networks.
Firewall can be a software program or a hardware device, while gateway is typical...
To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.
Implement firewalls to filter out malicious traffic
Use intrusion detection systems to detect and block suspicious activity
Implement rate limiting to prevent overwhelming the network with excessive requests
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
posted on 26 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.
STP elects a root bridge to serve as the central point in the network
Each switch determines the best path to the root bridge based on the lowest path cost
Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology
I applied via Naukri.com and was interviewed before Nov 2021. There were 3 interview rounds.
XSS is a type of web vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers can exploit XSS vulnerabilities by injecting malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, such as login credentials or personal data, from the victim's browser.
XSS attacks can be prevented by prope...
CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.
CSRF stands for Cross-Site Request Forgery
It can be exploited by tricking a user into clicking a link or button on a malicious website that sends a request to a different website where the user is logged in
The request can perform actions on behalf of the user without their knowledge or consent
To prevent CSR...
SAST and DAST are security testing techniques used to identify vulnerabilities in software applications.
SAST (Static Application Security Testing) is performed on the source code of an application to identify security vulnerabilities before the application is compiled and deployed.
DAST (Dynamic Application Security Testing) is performed on a running application to identify vulnerabilities in real-time.
SAST is useful fo...
httpsOnly and secure flag are used for securing web traffic and preventing attacks.
httpsOnly ensures that all traffic to a website is encrypted and cannot be intercepted by attackers.
Secure flag ensures that cookies are only sent over encrypted connections, preventing session hijacking attacks.
Both are important security measures for protecting sensitive information and preventing attacks.
Examples of websites that use ...
Security headers are used to enhance the security of web applications by providing additional protection against attacks.
Common security headers include Content-Security-Policy (CSP), X-XSS-Protection, X-Content-Type-Options, X-Frame-Options, and Strict-Transport-Security (HSTS)
CSP helps prevent cross-site scripting (XSS) attacks by specifying which sources of content are allowed to be loaded
X-XSS-Protection helps prev...
Cache control is implemented through HTTP headers to specify how long a resource should be cached.
Cache-Control header is used to specify caching directives
Expires header is used to specify an expiration date for the resource
Max-Age header is used to specify the maximum age of the resource in seconds
Pragma header is used for backwards compatibility with HTTP/1.0
Examples: Cache-Control: max-age=3600, Expires: Wed, 21 Oc
Assistant Manager
17
salaries
| ₹3.5 L/yr - ₹6.6 L/yr |
Deputy Manager
16
salaries
| ₹6.3 L/yr - ₹10 L/yr |
Executive
7
salaries
| ₹2 L/yr - ₹4.2 L/yr |
Maintenance Executive
6
salaries
| ₹2.6 L/yr - ₹3.1 L/yr |
Purchase Officer
5
salaries
| ₹2 L/yr - ₹2.5 L/yr |
Cognizant
Teleperformance
Reliance Retail
iEnergizer