Filter interviews by
Basic question cyber security mcq
Top trending discussions
I applied via campus placement at Narula Institute of Technology, Kolkata and was interviewed before Nov 2020. There were 5 interview rounds.
Answering questions on Java code for Fibonacci series, inheritance, polymorphism, and OOP concepts.
Fibonacci series code in Java can be written using recursion or iteration.
Inheritance is a mechanism in OOP where a class inherits properties and methods from another class.
Polymorphism is the ability of an object to take on multiple forms.
OOP concepts include encapsulation, abstraction, inheritance, and polymorphism.
I applied via LinkedIn and was interviewed in Nov 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Mar 2021. There were 2 interview rounds.
Packet flow in HTTP, DNS, TCP, daily work, specific products, VPNs, and Load balancers.
HTTP packets contain request and response headers and data
DNS packets contain queries and responses for domain name resolution
TCP packets establish and maintain connections between hosts
Daily work involves monitoring network traffic and identifying security threats
Specific products may include firewalls, intrusion detection systems, ...
I applied via AmbitionBox and was interviewed before Mar 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed in Sep 2021. There were 2 interview rounds.
posted on 22 Mar 2022
I applied via Referral and was interviewed in Feb 2022. There were 4 interview rounds.
Firewall works as a barrier between internal and external networks. OSI layer is a model for network communication.
Firewall filters incoming and outgoing traffic based on predefined rules.
OSI layer has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has its own set of protocols and functions.
Firewalls operate at the network and transport layers of the OSI model.
Firew...
Quants and Reasoning
Threat is a potential danger that can exploit a vulnerability, Risk is the likelihood of a threat occurring and causing harm, and VM stands for Vulnerability Management.
Threat: potential danger that can exploit a vulnerability
Risk: likelihood of a threat occurring and causing harm
VM: Vulnerability Management
Threats can be external or internal
Risk can be calculated by assessing the likelihood and impact of a threat
VM in...
posted on 26 Mar 2022
I applied via Naukri.com and was interviewed before Mar 2021. There were 4 interview rounds.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Associate Security Consultant
7
salaries
| ₹3.8 L/yr - ₹4.8 L/yr |
Security Consultant
6
salaries
| ₹2.8 L/yr - ₹7.6 L/yr |
Associate Security Engineer
5
salaries
| ₹2.5 L/yr - ₹3.2 L/yr |
Senior Security Consultant
4
salaries
| ₹8 L/yr - ₹8.7 L/yr |
Intern
3
salaries
| ₹0.9 L/yr - ₹3 L/yr |
Infosys
TCS
Wipro
HCLTech