Filter interviews by
There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.
Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.
Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.
Application firewalls filter traffic at the application layer of the OSI mod...
Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.
File infectors: attach themselves to executable files and spread when the infected file is run.
Macro viruses: infect documents and spreadsheets that support macros.
Boot sector viruses: infect the master boot record of a storage device.
Ransomware: encrypts files and demands payment for decryption.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions a...
Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.
Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.
Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.
Viruses can be dormant until trigger...
The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.
Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.
Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access ...
One well-known cyber-attack is the WannaCry ransomware attack.
WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.
The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.
WannaCry was attributed to North Korea by various security experts and agencies.
I applied via Job Portal
The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.
Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.
Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access to se...
I applied via Referral and was interviewed before Sep 2022. There were 3 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and co...
Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.
Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.
Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.
Viruses can be dormant until triggered by...
Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.
File infectors: attach themselves to executable files and spread when the infected file is run.
Macro viruses: infect documents and spreadsheets that support macros.
Boot sector viruses: infect the master boot record of a storage device.
Ransomware: encrypts files and demands payment for decryption.
There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.
Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.
Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.
Application firewalls filter traffic at the application layer of the OSI model an...
One well-known cyber-attack is the WannaCry ransomware attack.
WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.
The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.
WannaCry was attributed to North Korea by various security experts and agencies.
Top trending discussions
I applied via Naukri.com and was interviewed before Feb 2020. There were 3 interview rounds.
Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.
Workflow is a series of automated steps that can be used to streamline business processes.
Triggers are used to execute code before or after a record is inserted, updated, or deleted.
Reports are used to display data in a visual format, such as a table or chart.
Roles are used to define the hierarchy of ...
I appeared for an interview before Jul 2020.
Yes, Infosys is listed on the Indian stock exchanges as well as on the NYSE.
Infosys is listed on the Bombay Stock Exchange (BSE) and National Stock Exchange of India (NSE)
It is also listed on the New York Stock Exchange (NYSE)
Infosys has a market capitalization of over $80 billion as of 2021
I applied via Naukri.com and was interviewed before Jul 2021. There were 2 interview rounds.
AMCAT English assignment test
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Mar 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2019. There were 8 interview rounds.
Our product is the only one in the market that offers a unique combination of features and benefits.
Our product is designed to solve a specific problem that no other product in the market can solve.
Our product offers a unique combination of features and benefits that are not available in any other product.
Our product is backed by extensive research and development, ensuring that it is the most effective solution in the...
I applied via Company Website and was interviewed before Sep 2020. There was 1 interview round.
based on 2 interview experiences
Difficulty level
Duration
based on 7 reviews
Rating in categories
Associate Consultant
41
salaries
| ₹2 L/yr - ₹8.5 L/yr |
Information Security Consultant
25
salaries
| ₹2.8 L/yr - ₹9.8 L/yr |
Associate Information Security Consultant
17
salaries
| ₹2.5 L/yr - ₹6.5 L/yr |
Junior Analyst
12
salaries
| ₹1.8 L/yr - ₹3.5 L/yr |
Information Security Analyst
8
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
TCS
Accenture
Wipro
Cognizant