Filter interviews by
I appeared for an interview before Mar 2020.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves various technologies, processes, and practices to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and access controls.
Cyber security threats can come from various sources, including hackers, malware, ...
DoS and DDoS are types of cyber attacks. DoS targets a single system, while DDoS targets multiple systems simultaneously.
DoS stands for Denial of Service, where an attacker overwhelms a target system with a flood of traffic or requests.
DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack.
DoS attacks can be carried out by a single attacker using a single device or network.
D...
SQL injection is a type of cyber attack. Splunk is a software platform used for searching, analyzing and visualizing machine-generated data.
SQL injection is a technique where malicious SQL statements are inserted into an entry field to execute unauthorized actions.
Splunk architecture consists of forwarders, indexers, and search heads.
Forwarders collect data from various sources and send it to indexers.
Indexers store an...
Black hat hackers are cyber criminals who exploit vulnerabilities for personal gain, while white hat hackers use their skills for ethical purposes.
Black hat hackers use their skills to steal data, spread malware, and commit other cyber crimes.
White hat hackers are hired by organizations to test their security systems and identify vulnerabilities.
Grey hat hackers fall somewhere in between, using their skills for both et...
Red Hat is a leading provider of open source software solutions, including the popular Red Hat Enterprise Linux operating system.
Red Hat is a software company that specializes in open source solutions.
They are known for their flagship product, Red Hat Enterprise Linux (RHEL).
Red Hat offers a range of software products and services for businesses.
Their solutions focus on security, reliability, and scalability.
Red Hat al...
posted on 4 Mar 2025
I have over three years of experience in cybersecurity, focusing on threat analysis, incident response, and vulnerability management.
Conducted regular security assessments and vulnerability scans, identifying and mitigating risks in network infrastructure.
Managed incident response for security breaches, leading a team to investigate and remediate threats effectively.
Developed and implemented security policies and proce...
posted on 7 Jan 2025
Code DB Transactions like rollback
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
90 mins , 3 coding questions
I applied via Referral and was interviewed before Nov 2021. There were 2 interview rounds.
Inventory turnover ratio formula is Cost of Goods Sold divided by Average Inventory.
Inventory turnover ratio measures how quickly a company sells its inventory.
It indicates the efficiency of a company's inventory management.
A higher ratio is better as it means the company is selling its inventory quickly.
Formula: Inventory turnover ratio = Cost of Goods Sold / Average Inventory
Example: If a company has a COGS of $500,0...
I applied via LinkedIn and was interviewed before Nov 2021. There were 4 interview rounds.
Written test based on mathematical..analytical
I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed before Aug 2023. There were 4 interview rounds.
Tough questions were asked
I have a strong understanding of the responsibilities and requirements of a Financial Analyst.
I am familiar with financial modeling and forecasting techniques.
I have experience analyzing financial data and creating reports for management.
I understand how to interpret financial statements and make recommendations based on the analysis.
I am proficient in using financial software and tools such as Excel, Bloomberg, and SA...
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
Associate Engineer
284
salaries
| ₹3 L/yr - ₹6 L/yr |
Associate
284
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Project Manager
264
salaries
| ₹6.9 L/yr - ₹29.2 L/yr |
Service Reliability Engineer
206
salaries
| ₹3 L/yr - ₹10 L/yr |
Financial Analyst
202
salaries
| ₹7.4 L/yr - ₹23 L/yr |
Sterlite Technologies
Indus Towers
Cisco
Lumen Technologies