Filter interviews by
I appeared for an interview before Mar 2020.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves various technologies, processes, and practices to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and access controls.
Cyber security threats can come from various sources, including hackers, malware, ...
DoS and DDoS are types of cyber attacks. DoS targets a single system, while DDoS targets multiple systems simultaneously.
DoS stands for Denial of Service, where an attacker overwhelms a target system with a flood of traffic or requests.
DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack.
DoS attacks can be carried out by a single attacker using a single device or network.
D...
SQL injection is a type of cyber attack. Splunk is a software platform used for searching, analyzing and visualizing machine-generated data.
SQL injection is a technique where malicious SQL statements are inserted into an entry field to execute unauthorized actions.
Splunk architecture consists of forwarders, indexers, and search heads.
Forwarders collect data from various sources and send it to indexers.
Indexers store an...
Black hat hackers are cyber criminals who exploit vulnerabilities for personal gain, while white hat hackers use their skills for ethical purposes.
Black hat hackers use their skills to steal data, spread malware, and commit other cyber crimes.
White hat hackers are hired by organizations to test their security systems and identify vulnerabilities.
Grey hat hackers fall somewhere in between, using their skills for both et...
Red Hat is a leading provider of open source software solutions, including the popular Red Hat Enterprise Linux operating system.
Red Hat is a software company that specializes in open source solutions.
They are known for their flagship product, Red Hat Enterprise Linux (RHEL).
Red Hat offers a range of software products and services for businesses.
Their solutions focus on security, reliability, and scalability.
Red Hat al...
Top trending discussions
posted on 4 Mar 2025
I have over three years of experience in cybersecurity, focusing on threat analysis, incident response, and vulnerability management.
Conducted regular security assessments and vulnerability scans, identifying and mitigating risks in network infrastructure.
Managed incident response for security breaches, leading a team to investigate and remediate threats effectively.
Developed and implemented security policies and proce...
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
90 mins , 3 coding questions
posted on 7 Jan 2025
Code DB Transactions like rollback
I applied via LinkedIn and was interviewed before Nov 2021. There were 4 interview rounds.
Written test based on mathematical..analytical
posted on 4 Dec 2023
I applied via Referral and was interviewed in Sep 2023. There were 5 interview rounds.
Aptitude questions/English test
posted on 6 Jul 2023
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
They send you a link to take an aptitude test.. after that they will send you your result.
Ther were 3 other after behavior test , there were 3 games .. math, puzzle and a memory test game
I applied via Job Portal
I applied via Referral and was interviewed before Nov 2021. There were 2 interview rounds.
Inventory turnover ratio formula is Cost of Goods Sold divided by Average Inventory.
Inventory turnover ratio measures how quickly a company sells its inventory.
It indicates the efficiency of a company's inventory management.
A higher ratio is better as it means the company is selling its inventory quickly.
Formula: Inventory turnover ratio = Cost of Goods Sold / Average Inventory
Example: If a company has a COGS of $500,0...
Associate Engineer
285
salaries
| ₹3 L/yr - ₹6 L/yr |
Associate
284
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Project Manager
263
salaries
| ₹6.9 L/yr - ₹29.2 L/yr |
Financial Analyst
225
salaries
| ₹8.5 L/yr - ₹23 L/yr |
Service Reliability Engineer
222
salaries
| ₹3 L/yr - ₹10 L/yr |
Sterlite Technologies
Indus Towers
Cisco
Lumen Technologies