Filter interviews by
I was interviewed before Mar 2020.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves various technologies, processes, and practices to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and access controls.
Cyber security threats can come from various sources, including hackers, malware, ...
DoS and DDoS are types of cyber attacks. DoS targets a single system, while DDoS targets multiple systems simultaneously.
DoS stands for Denial of Service, where an attacker overwhelms a target system with a flood of traffic or requests.
DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack.
DoS attacks can be carried out by a single attacker using a single device or network.
D...
SQL injection is a type of cyber attack. Splunk is a software platform used for searching, analyzing and visualizing machine-generated data.
SQL injection is a technique where malicious SQL statements are inserted into an entry field to execute unauthorized actions.
Splunk architecture consists of forwarders, indexers, and search heads.
Forwarders collect data from various sources and send it to indexers.
Indexers store an...
Black hat hackers are cyber criminals who exploit vulnerabilities for personal gain, while white hat hackers use their skills for ethical purposes.
Black hat hackers use their skills to steal data, spread malware, and commit other cyber crimes.
White hat hackers are hired by organizations to test their security systems and identify vulnerabilities.
Grey hat hackers fall somewhere in between, using their skills for both et...
Red Hat is a leading provider of open source software solutions, including the popular Red Hat Enterprise Linux operating system.
Red Hat is a software company that specializes in open source solutions.
They are known for their flagship product, Red Hat Enterprise Linux (RHEL).
Red Hat offers a range of software products and services for businesses.
Their solutions focus on security, reliability, and scalability.
Red Hat al...
Top trending discussions
posted on 30 Aug 2024
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems (AS).
BGP is used to exchange routing information and prefixes between different AS numbers.
BGP helps in determining the best path for data to travel between networks.
BGP operates on TCP port 179.
BGP uses attributes like AS path, next hop, and local preference to make routing decisions.
Example: B...
Conductor, capacitor, and resistor are basic components used in electronic circuits.
Conductor: Allows the flow of electric current. Example: Copper wire.
Capacitor: Stores and releases electrical energy. Example: Ceramic capacitor.
Resistor: Limits the flow of electric current. Example: Carbon film resistor.
I applied via LinkedIn and was interviewed in Jun 2024. There were 2 interview rounds.
It contained networking questions
A router is a networking device that forwards data packets between computer networks, while a switch is a networking device that connects devices within a network.
Router operates at the network layer of the OSI model
Switch operates at the data link layer of the OSI model
Router connects multiple networks together
Switch connects devices within the same network
Router uses IP addresses to route traffic
Switch uses MAC addre
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information between routers.
Static routin...
I applied via Naukri.com and was interviewed before Jan 2024. There were 5 interview rounds.
I applied via Campus Placement and was interviewed in Apr 2023. There were 4 interview rounds.
Aptitude questions from various topics
Two coding questions easy and medium
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
posted on 21 Sep 2023
I applied via LinkedIn and was interviewed in Aug 2023. There were 4 interview rounds.
Basic programs in c or c++, includes strings,
Associate
287
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Associate Engineer
278
salaries
| ₹3 L/yr - ₹6 L/yr |
Project Manager
264
salaries
| ₹6.6 L/yr - ₹26 L/yr |
Financial Analyst
206
salaries
| ₹7.9 L/yr - ₹25 L/yr |
Service Reliability Engineer
204
salaries
| ₹3 L/yr - ₹9.5 L/yr |
TCS
Wipro
Infosys
Tech Mahindra