Filter interviews by
I applied via Job Portal
The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.
Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.
Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access to se...
I applied via Referral and was interviewed before Sep 2022. There were 3 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and co...
Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.
Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.
Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.
Viruses can be dormant until triggered by...
Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.
File infectors: attach themselves to executable files and spread when the infected file is run.
Macro viruses: infect documents and spreadsheets that support macros.
Boot sector viruses: infect the master boot record of a storage device.
Ransomware: encrypts files and demands payment for decryption.
There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.
Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.
Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.
Application firewalls filter traffic at the application layer of the OSI model an...
One well-known cyber-attack is the WannaCry ransomware attack.
WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.
The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.
WannaCry was attributed to North Korea by various security experts and agencies.
Top trending discussions
I applied via Referral and was interviewed before Apr 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before May 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2021. There was 1 interview round.
I applied via Approached by Company and was interviewed before May 2021. There were 4 interview rounds.
Online questions were based on scenarios to write SQL queries. Also got few questions on Python as well for which I had only limited knowledge.
The source row will be treated as an update, but the target object will be deleted.
The session level property 'Treat source row as Update' will be applied to the source row.
The target object will be deleted regardless of the update status of the source row.
This can result in data loss if the source row contains important information.
Dimension tables are used in data warehousing to provide descriptive information about the data in fact tables.
Slowly changing dimensions
Junk dimensions
Degenerate dimensions
Role-playing dimensions
Bridge dimensions
We used a relational schema in our previous project as it was suitable for the data structure and allowed for efficient querying.
Relational schema was used as it allowed for efficient querying of data
The data structure was suitable for a relational schema
We were able to easily join tables to retrieve necessary data
Examples include using SQL to query a database with multiple tables
Normalization was used to reduce data r
Joiner combines data from multiple sources based on a common key, while Lookup retrieves data from a reference table based on a matching key.
Joiner is used to combine data from two or more sources based on a common key column.
Lookup is used to retrieve data from a reference table based on a matching key column.
Joiner can perform inner, outer, left, and right joins, while Lookup can only perform an inner join.
Joiner can...
We used Git for version control in our previous project.
We created a Git repository for the project.
All team members were added as collaborators to the repository.
We followed the Git flow branching model.
We used pull requests for code review and merging.
We used tags to mark important releases.
We regularly pushed our changes to the remote repository.
We used Git commands like commit, push, pull, merge, and rebase.
We used...
I have worked on SCD Type 2 before.
SCD Type 2 is used to track historical changes in data.
It creates a new record for each change and maintains a history of changes.
It includes start and end dates for each record.
Example: Tracking changes in employee salary over time.
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
I applied via Walk-in and was interviewed in Mar 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed before Jul 2020. There were 3 interview rounds.
Performa is a performance monitoring tool for HPE 3PAR storage arrays.
Performa provides real-time monitoring of storage performance metrics.
It helps identify performance bottlenecks and optimize storage performance.
Performa can generate reports and alerts based on user-defined thresholds.
It can also be used for capacity planning and trend analysis.
Examples of performance metrics monitored by Performa include IOPS, late
I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.
Aadhaar card is a unique identification card issued by the Indian government to residents of India.
Aadhaar card is a 12-digit unique identification number issued by the Unique Identification Authority of India (UIDAI).
It serves as proof of identity and address for Indian residents.
Aadhaar card contains biometric and demographic information of the cardholder, including fingerprints and iris scans.
It is used for various ...
based on 2 interviews
Interview experience
based on 7 reviews
Rating in categories
Associate Consultant
31
salaries
| ₹2.5 L/yr - ₹6 L/yr |
Information Security Consultant
27
salaries
| ₹2.8 L/yr - ₹9.8 L/yr |
Associate Information Security Consultant
15
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Junior Analyst
9
salaries
| ₹1.8 L/yr - ₹3 L/yr |
Information Security Analyst
8
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
TCS
Accenture
Cognizant
Infosys