Filter interviews by
I applied via Referral and was interviewed before Sep 2022. There were 2 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and co...
Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.
Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.
Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.
Viruses can be dormant until triggered by...
Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.
File infectors: attach themselves to executable files and spread when the infected file is run.
Macro viruses: infect documents and spreadsheets that support macros.
Boot sector viruses: infect the master boot record of a storage device.
Ransomware: encrypts files and demands payment for decryption.
There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.
Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.
Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.
Application firewalls filter traffic at the application layer of the OSI model an...
One well-known cyber-attack is the WannaCry ransomware attack.
WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.
The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.
WannaCry was attributed to North Korea by various security experts and agencies.
I applied via Job Portal
The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.
Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.
Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access to se...
Top trending discussions
posted on 20 Dec 2024
TCP/IP model is a networking protocol suite that defines how data is transmitted over a network.
Consists of four layers: Application, Transport, Internet, Link
Each layer has specific functions and protocols
Example: TCP operates at the Transport layer, while IP operates at the Internet layer
posted on 12 Aug 2021
I applied via Recruitment Consultant
Symantec DLP is a data loss prevention software that helps organizations protect sensitive data from being leaked or stolen.
Symantec DLP uses advanced detection techniques to identify and prevent data breaches.
It can monitor and control data across various channels, including email, web, and cloud applications.
Symantec DLP can also classify and encrypt sensitive data to ensure its protection.
It helps organizations comp...
There are several types of solutions to protect data from DLP, including network-based, endpoint-based, and cloud-based solutions.
Network-based solutions monitor traffic on the network and can block or quarantine sensitive data.
Endpoint-based solutions monitor data on individual devices and can prevent unauthorized access or transmission.
Cloud-based solutions monitor data stored in the cloud and can prevent unauthorize...
The database communication with DLP server can happen through various ports depending on the configuration.
The port number can be configured during the installation of the DLP server.
Commonly used ports for database communication are 1433 for SQL Server, 1521 for Oracle, and 3306 for MySQL.
Firewalls and network security policies may also affect the port used for communication.
It is important to ensure that the appropri...
Classification is the process of categorizing data or information based on certain criteria.
It involves grouping similar items together.
It helps in organizing and managing data effectively.
Examples include classifying emails as spam or not spam, or categorizing documents based on their content.
Classification can also be used in machine learning to train models to recognize patterns and make predictions.
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
posted on 18 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a comprehensive list of techniques used by attackers to compromise systems.
Techniques are categorized into tactics such as Initial Access, Execution, Persistence, etc.
Examples of techniques include Spearphishing Attachment, Command and Scripting Interpreter, and Registry Run Keys / S
posted on 11 May 2023
posted on 25 Apr 2023
Sanrio base question
posted on 13 Jun 2022
I was interviewed in May 2022.
Interview experience
based on 8 reviews
Rating in categories
Information Security Consultant
28
salaries
| ₹2.8 L/yr - ₹10.1 L/yr |
Associate Consultant
23
salaries
| ₹2.5 L/yr - ₹6 L/yr |
Associate Information Security Consultant
11
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Consultant
6
salaries
| ₹5.5 L/yr - ₹8.5 L/yr |
Information Security Analyst
6
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
TCS
Infosys
Wipro
HCLTech