i
Arete
Filter interviews by
The different phases of Incident Response are preparation, identification, containment, eradication, recovery, and lessons learned.
Preparation: Establishing policies and procedures, training staff, and implementing security measures.
Identification: Detecting and analyzing security incidents.
Containment: Isolating the affected systems to prevent further damage.
Eradication: Removing the threat and restoring systems to th...
Phishing is a type of cyber attack where attackers trick victims into revealing sensitive information.
Phishing can be done through emails, text messages, social media, or fake websites.
Spear phishing targets specific individuals or organizations.
Whaling is a type of phishing that targets high-profile individuals like CEOs.
Vishing is phishing done through phone calls.
Smishing is phishing done through SMS or text message...
Investigating a ransomware attack involves identifying the type of ransomware, analyzing the attack vector, and determining the extent of damage.
Isolate infected systems to prevent further spread
Identify the type of ransomware and its behavior
Analyze the attack vector (e.g. phishing email, exploit kit)
Determine the extent of damage and data loss
Attempt to recover encrypted data
Investigate any possible leads or suspects
...
Shimcache is a Windows registry key that stores information about recently executed programs.
Shimcache is used by forensic analysts to determine which programs were executed on a Windows system.
It can be accessed using tools like RegRipper and Volatility.
Shimcache can provide valuable information in malware investigations.
It stores information such as the file path, last modified time, and execution time of programs.
Sh...
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
There are simple technical test before manger round and it was very easy to crack
Yes, I make sure to thoroughly read and understand all company policies.
I believe it is important to read and understand company policies to ensure compliance and avoid any misunderstandings.
Reading company policies helps me stay informed about the rules and regulations within the organization.
I make it a priority to review and familiarize myself with all policies to ensure I am following the correct procedures.
For exa...
Moderate level, maths reasoning questions
I applied via Naukri.com and was interviewed before Feb 2022. There were 4 interview rounds.
Basic aptitude questions of quant and reasoning and general english
Case study of varies products asked around 15-20 which were easy to attempt
SQL is a programming language used for managing and manipulating relational databases. Excel formulas are used for performing calculations and data analysis in Microsoft Excel.
SQL is used to retrieve, insert, update, and delete data from databases.
Excel formulas are written using functions and operators to perform calculations and manipulate data.
SQL example: SELECT * FROM customers WHERE age > 30;
Excel formula example...
I applied via Referral and was interviewed in Jun 2022. There were 3 interview rounds.
Normal aptitude questions
I applied via Naukri.com and was interviewed before May 2023. There were 2 interview rounds.
There will be MCQ Questions. They will ask you to use internet and answer the questions.
They want to check your research skills.
Aptitude test of 30 min is conducted
I waa given telecom market in indua
posted on 28 Jun 2024
I applied via Approached by Company and was interviewed before Jun 2023. There was 1 interview round.
based on 1 review
Rating in categories
Architect
5
salaries
| ₹4.3 L/yr - ₹11.3 L/yr |
Data Analyst
5
salaries
| ₹4 L/yr - ₹12.5 L/yr |
Forensic Analyst
4
salaries
| ₹9 L/yr - ₹19.3 L/yr |
HR Executive
4
salaries
| ₹1.5 L/yr - ₹3.2 L/yr |
Marketing Manager
4
salaries
| ₹6.3 L/yr - ₹17.7 L/yr |
GfK MODE
Market Xcel Data Matrix
Nyx-medical Solutions
Rapid Care Transcription