Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.
Ransomware attacks encrypt files and demand payment for decryption.
Encrypts files and demands payment for decryption
May use social engineering tactics to trick victims into downloading malware
May spread through phishing emails, malicious websites, or infected software
Examples include WannaCry, Petya, and Locky
The port number of SMB is 445.
SMB stands for Server Message Block.
SMB is a protocol used for file sharing and printer sharing.
Port 445 is used for direct TCP/IP connection without NetBIOS.
Port 139 is also used for SMB over NetBIOS.
SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.
The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.
The attack can be carried out using tools like Responder or Metasploit.
The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.
An e...
Top trending discussions
I applied via Walk-in and was interviewed in May 2020. There were 4 interview rounds.
I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.
EDR stands for Endpoint Detection and Response, a security solution that monitors and responds to endpoint threats.
EDR solutions provide real-time visibility into endpoint activity and behavior.
They use advanced analytics and machine learning to detect and respond to threats.
EDR solutions can also provide forensic analysis to investigate incidents and identify root causes.
Examples of EDR solutions include Carbon Black,...
EDR stands for Endpoint Detection and Response. It is a security solution that monitors and responds to endpoint threats.
EDR solutions use agents installed on endpoints to collect data and send it to a central server for analysis.
They use behavioral analysis and machine learning to detect and respond to threats in real-time.
EDR solutions can also provide forensic data to investigate incidents and improve security postu...
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jan 2020. There were 3 interview rounds.
Depreciation is necessary to allocate the cost of an asset over its useful life.
Depreciation helps in matching the cost of an asset with the revenue it generates.
It allows for the recognition of the wear and tear, obsolescence, and loss of value of assets over time.
Depreciation expense reduces taxable income, resulting in tax savings for companies.
It helps in determining the true profitability and financial position of...
I applied via Recruitment Consulltant and was interviewed before Jun 2021. There was 1 interview round.
BigInteger is used for mathematical operations involving very large integers in Java.
BigInteger is used when the range of values supported by primitive data types like int and long is not sufficient.
It is commonly used in cryptography and security applications.
It provides methods for arithmetic, bitwise, and logical operations on large integers.
Example: calculating factorial of a large number, generating large prime nu
Merge Sort Algo code in java
Divide the array into two halves
Recursively sort the two halves
Merge the sorted halves
Time complexity: O(n log n)
I applied via Approached by Company and was interviewed before Sep 2021. There were 2 interview rounds.
They give some MCQ question from c#, .net,SQL, angular. Fizz Buzz type coding.
based on 1 interview
Interview experience
based on 10 reviews
Rating in categories
Associate Consultant
5.2k
salaries
| ₹3 L/yr - ₹11.5 L/yr |
Consultant
4k
salaries
| ₹7 L/yr - ₹27 L/yr |
Senior Consultant
2k
salaries
| ₹10.6 L/yr - ₹36 L/yr |
System Engineer
934
salaries
| ₹2 L/yr - ₹6.3 L/yr |
Software Engineer
847
salaries
| ₹2.4 L/yr - ₹11 L/yr |
Accenture
Wipro
Cognizant
Capgemini