Filter interviews by
I applied via Referral and was interviewed before Apr 2023. There were 2 interview rounds.
Types of attacks include malware, phishing, DDoS, ransomware, and insider threats.
Malware attacks involve malicious software that can harm systems or steal data.
Phishing attacks use deceptive emails or websites to trick users into revealing sensitive information.
DDoS attacks flood a network or server with traffic to disrupt service.
Ransomware attacks encrypt data and demand payment for decryption.
Insider threats involv...
Top trending discussions
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I applied via campus placement at Aditya Degree College, Kakinada and was interviewed before Dec 2023. There were 3 interview rounds.
Aptitude, reasoning and english
Yes, I am flexible to relocate for the right opportunity.
I am open to relocating for the right job opportunity
I have relocated in the past for career advancement
I am willing to consider relocation based on the specifics of the job offer
Yes, I am flexible to shifts and can adapt to different schedules as needed.
I am willing to work different shifts, including nights and weekends
I understand the importance of being flexible in a fast-paced work environment
I have previous experience working rotating shifts in a similar role
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
CIA stands for Confidentiality, Integrity, and Availability. Splunk and IBM QRadar are both security information and event management (SIEM) tools.
CIA is a security model that focuses on protecting information by ensuring its confidentiality, integrity, and availability.
Splunk is a SIEM tool that collects, indexes, and analyzes machine data to provide insights into security events and threats.
IBM QRadar is another SIEM...
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Basic aptitude topics
Scenario based questions
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model helps in understanding how data is transmitted over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of OSI layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application la
I applied via Naukri.com and was interviewed before Mar 2023. There were 4 interview rounds.
Software Engineer
48
salaries
| ₹4 L/yr - ₹11.8 L/yr |
Devops Engineer
34
salaries
| ₹4 L/yr - ₹12 L/yr |
Softwaretest Engineer
22
salaries
| ₹2.8 L/yr - ₹8.9 L/yr |
Software Developer
17
salaries
| ₹3 L/yr - ₹8.4 L/yr |
Big Data Developer
11
salaries
| ₹4 L/yr - ₹10 L/yr |
TCS
Accenture
Cognizant
Infosys