Filter interviews by
Clear (1)
posted on 8 May 2023
I applied via LinkedIn and was interviewed in Nov 2022. There were 4 interview rounds.
Implementing cloud security controls involves identifying risks, selecting appropriate controls, and monitoring their effectiveness.
Conduct a risk assessment to identify potential threats and vulnerabilities
Select appropriate security controls based on the identified risks
Implement and configure the selected controls
Regularly monitor and assess the effectiveness of the controls
Examples of cloud security controls includ...
Authentication and access rights controls are enforced to ensure only authorized users can access sensitive information.
Authentication verifies the identity of a user before granting access.
Access rights controls limit the actions a user can perform based on their role or permissions.
Enforcement can be done through various methods such as passwords, biometrics, and multi-factor authentication.
Regular audits and reviews...
Top trending discussions
I applied via Walk-in and was interviewed before Sep 2021. There was 1 interview round.
The flow of a voice call involves the transmission of audio data between two or more parties.
The call is initiated by one party and a connection is established with the other party.
Audio data is transmitted in real-time between the parties.
The call may be routed through various networks and technologies, such as cellular networks or VoIP.
The call may be terminated by either party ending the connection.
Technical Specialist
312
salaries
| ₹14 L/yr - ₹35 L/yr |
Senior Associate
277
salaries
| ₹8.3 L/yr - ₹21.7 L/yr |
Network Engineer
222
salaries
| ₹3.5 L/yr - ₹13.6 L/yr |
Senior Technical Specialist
145
salaries
| ₹23 L/yr - ₹47 L/yr |
Senior Network Engineer
110
salaries
| ₹7 L/yr - ₹22 L/yr |
Verizon
Vodafone Idea
Bharti Airtel
Reliance Communications