Filter interviews by
Dealing with a sophisticated ransomware attack that encrypted critical data and demanded a large sum of money for decryption.
Quickly isolating infected systems to prevent further spread
Working with law enforcement and cybersecurity experts to investigate the source of the breach
Implementing backup and recovery procedures to restore encrypted data
Negotiating with attackers to minimize financial impact
Top trending discussions
posted on 18 Aug 2024
One hour - only maths
posted on 7 Jan 2025
Code DB Transactions like rollback
posted on 7 Aug 2024
I applied via Approached by Company and was interviewed in Feb 2024. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
Zone protection DoS is a feature that protects against DoS attacks by limiting traffic to specific zones, while DoS attack rule is a specific rule that detects and blocks DoS attacks.
Zone protection DoS limits traffic to specific zones to prevent DoS attacks
DoS attack rule detects and blocks DoS attacks based on specific rules
Zone protection DoS is a proactive measure while DoS attack rule is a reactive measure
Zone pro...
DoS zone protection and DoS attack rule are two different methods to prevent DoS attacks.
DoS zone protection is a feature that blocks traffic from a specific IP address or subnet if it exceeds a certain threshold.
DoS attack rule is a security policy that identifies and blocks traffic patterns that are indicative of a DoS attack.
DoS zone protection is a proactive measure that prevents traffic from reaching the target, w...
SP3 architecture is a security architecture designed to protect against malware attacks.
SP3 stands for Security Platform 3
It is a hardware-based security architecture
It is designed to protect against malware attacks by isolating critical system components
It is used in some Intel processors, such as the Intel Core i7
It provides a secure execution environment for sensitive applications
posted on 3 May 2024
Their are 60 questions. these 60 questions divided into 2 parts one is apptitude and another is technical .
I was interviewed before May 2023.
Aptitude questions need to be clear
2 coding questions need to solve
posted on 12 Nov 2024
I applied via Approached by Company and was interviewed before Nov 2023. There was 1 interview round.
I applied via Company Website and was interviewed before Aug 2022. There was 1 interview round.
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.
It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.
Subnet masks are used to determine which part of an IP ad...
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers are typically used to connect different networks, such as a home netw...
Senior Security Analyst
5
salaries
| ₹22 L/yr - ₹23 L/yr |
System Engineer Hardware
5
salaries
| ₹9.5 L/yr - ₹12.3 L/yr |
Senior Analyst
4
salaries
| ₹12.3 L/yr - ₹20.5 L/yr |
Senior Consultant
4
salaries
| ₹5.1 L/yr - ₹12.6 L/yr |
Senior Data Analyst
4
salaries
| ₹7.3 L/yr - ₹10.5 L/yr |
Edelweiss
Motilal Oswal Financial Services
ICICI Securities
HDFC Securities