Filter interviews by
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Session, Presentation, and
Different types of attacks include phishing, malware, DDoS, and social engineering.
Phishing: fraudulent emails or websites to trick users into revealing sensitive information
Malware: malicious software designed to harm or exploit a computer system
DDoS: Distributed Denial of Service attacks overwhelm a system with traffic, causing it to crash
Social engineering: manipulating individuals into divulging confidential inform
Positives include strong analytical skills and attention to detail. Negatives may include lack of experience or difficulty working in a team.
Positives: strong analytical skills, attention to detail, ability to work independently
Negatives: lack of experience, difficulty working in a team, limited knowledge of specific tools or technologies
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
Logical reasoning and verbal ability.
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
Event ID 4624 is for successful login in Windows Security Event Log.
Event ID 4624 is logged in the Windows Security Event Log when a user successfully logs on to a computer.
This event is commonly used by security analysts to track user activity and identify potential security incidents.
The event includes information such as the account name, account domain, logon type, and logon process.
For example, in a Windows enviro...
Event ID 4625 is for login fail
Event ID 4625 is generated when a user fails to log in to a system
It is commonly seen in Windows Security event logs
The event provides information on the account that failed to log in, the reason for the failure, and the source of the login attempt
This question is likely asking about the reason code 4625 for a login failure.
4625 is the event ID for a failed login attempt in Windows systems
It could indicate a user entering incorrect credentials or an account being locked out
Common reasons for event 4625 include mistyped passwords, expired accounts, or disabled accounts
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Mitigating DDoS attacks involves implementing various strategies to protect against overwhelming traffic.
Implementing a strong firewall to filter out malicious traffic
Utilizing a content delivery network (CDN) to distribute traffic and reduce strain on servers
Using DDoS mitigation services or tools to detect and block attacks
Configuring network devices to limit the impact of attacks
Regularly monitoring network traffic
Approach RDP connection during analysis by examining logs, network traffic, and user activity.
Review RDP logs for any suspicious activity or unauthorized access.
Analyze network traffic for any anomalies or unusual patterns related to RDP connections.
Monitor user activity to identify any unauthorized or suspicious RDP sessions.
Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.
Look for faile...
1 Interview rounds
based on 3 reviews
Rating in categories
Associate Consultant
5.2k
salaries
| ₹3 L/yr - ₹11.8 L/yr |
Consultant
3.8k
salaries
| ₹6.9 L/yr - ₹27 L/yr |
Senior Consultant
1.9k
salaries
| ₹10.8 L/yr - ₹35.5 L/yr |
System Engineer
916
salaries
| ₹2 L/yr - ₹6.3 L/yr |
Software Engineer
772
salaries
| ₹2.4 L/yr - ₹10 L/yr |
TCS
Infosys
Wipro
HCLTech