Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Session, Presentation, and
Different types of attacks include phishing, malware, DDoS, and social engineering.
Phishing: fraudulent emails or websites to trick users into revealing sensitive information
Malware: malicious software designed to harm or exploit a computer system
DDoS: Distributed Denial of Service attacks overwhelm a system with traffic, causing it to crash
Social engineering: manipulating individuals into divulging confidential inform
Positives include strong analytical skills and attention to detail. Negatives may include lack of experience or difficulty working in a team.
Positives: strong analytical skills, attention to detail, ability to work independently
Negatives: lack of experience, difficulty working in a team, limited knowledge of specific tools or technologies
Top trending discussions
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Basic aptitude topics
Scenario based questions
Logical reasoning and verbal ability.
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a degree in Sociology with a focus on research methods
I have experience conducting surveys and interviews to gather data
I am proficient in data analysis software such as SPSS and Excel
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model helps in understanding how data is transmitted over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of OSI layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application la
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
A SOC analyst's day-to-day activities involve monitoring and analyzing security events, investigating incidents, and responding to threats.
Monitoring security events and alerts from various sources
Analyzing and investigating potential security incidents
Responding to and mitigating security threats
Performing vulnerability assessments and penetration testing
Creating and maintaining security incident reports
Collaborating ...
I applied via Naukri.com and was interviewed before Mar 2023. There were 4 interview rounds.
based on 3 interviews
1 Interview rounds
based on 3 reviews
Rating in categories
Associate Consultant
5.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Consultant
4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
2k
salaries
| ₹0 L/yr - ₹0 L/yr |
System Engineer
936
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
856
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech