Filter interviews by
I applied via Company Website and was interviewed in Jul 2021. There were 3 interview rounds.
The time I get to resolve a task problem depends on the severity of the issue and the resources available.
The severity of the issue determines the priority level and the time frame for resolution.
The resources available, such as technology and personnel, also impact the time frame.
Communication with stakeholders and team members is crucial to ensure timely resolution.
Regular progress updates and status reports help man...
Top trending discussions
I applied via Naukri.com and was interviewed before Mar 2021. There was 1 interview round.
Quantitive question
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
To configure a VPN, you need to set up a VPN server, create user accounts, configure client devices, and establish secure connections.
Set up a VPN server using software like OpenVPN or Windows Server
Create user accounts with unique credentials for accessing the VPN
Configure client devices to connect to the VPN server using the provided credentials
Establish secure connections by encrypting data transmitted over the VPN
To resolve system slowness, check for hardware issues, optimize software, update drivers, and monitor resource usage.
Check for hardware issues such as low memory or CPU usage
Optimize software by removing unnecessary programs or services
Update drivers for hardware components
Monitor resource usage to identify bottlenecks
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I appeared for an interview in Jan 2025.
I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.
Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.
based on 2 reviews
Rating in categories
Senior Executive
207
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Executive
124
salaries
| ₹1 L/yr - ₹4.5 L/yr |
Executive Assistant
106
salaries
| ₹1 L/yr - ₹3.6 L/yr |
Team Lead
83
salaries
| ₹4.4 L/yr - ₹9.6 L/yr |
Senior Associate
70
salaries
| ₹2.8 L/yr - ₹5.8 L/yr |
Softenger
Foray Software
Nelito System
Black Knight