i
BT
Group
Work with us
Filter interviews by
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to mai...
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code revie...
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing,...
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services...
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
Reasoning in Aptitude
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services incl...
I applied via Campus Placement and was interviewed in Jan 2022. There were 5 interview rounds.
As per JD, i was being offered for a security Intern role and for this job description we have following in aptitude test:
20 questions in Problem Solving assesment and included topics were : Profit and Loss, HCM and LCM, simple interest, compound interest, Number system, Time & Work, Time, speed & distance, Ratio Analysis, Set theory, Profit & Loss, Percentages and Algebra.
30 questions from Technical topics like programming, coding, security and DBMS and oops.
And 10 questions from English Proficiency and communication .
There were 2 questions from security and management and questions were related to brute force, CTF and sort of simple concepts in LINUX.
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to maintain...
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code reviews an...
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing, web ...
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
Top trending discussions
I applied via Recruitment Consultant and was interviewed before Apr 2020. There were 5 interview rounds.
I appeared for an interview before May 2016.
I appeared for an interview in Mar 2017.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find the number of red fishes.
Subtract the number of red fishes from 200 to find the number of non-red fishes.
Calculate 2% of the total number of fishes to find the desired number of red fishes.
Subtract the desired number of red fishes from the current number of red fishes to find the number of fishes to be removed.
posted on 28 Jun 2017
I appeared for an interview in Mar 2017.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find out how many fishes represent 1%.
Multiply the result by 2 to find out how many fishes represent 2%.
Subtract the result from 200 to find out how many fishes represent 98%.
I appeared for an interview in Mar 2017.
I have the technical skills, experience, and passion to deliver high-quality software solutions.
I have a strong background in programming languages such as Java, Python, and C++.
I have experience working on complex software projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in software development.
I am a quick learner and have a strong...
Ericsson is a global leader in telecommunications technology with a strong focus on innovation and career development.
Global leader in telecommunications technology
Strong focus on innovation
Opportunities for career development
Using Applied Electronics to prevent train accidents in IRCTC
Implement sensors to detect obstacles on tracks
Use GPS and communication systems to alert train drivers of potential dangers
Install automatic braking systems in case of emergency
Regular maintenance and inspection of tracks and trains
Train and educate staff on safety protocols and emergency procedures
IC 555 timer is a versatile timer IC used in various applications like oscillators, timers, and flip-flops.
IC 555 timer has three modes of operation: monostable, astable, and bistable.
In monostable mode, the output is high for a fixed duration when triggered.
In astable mode, the output oscillates between high and low states.
In bistable mode, the output remains in either high or low state until triggered.
IC 555 timer ca...
The internet is a global network of interconnected devices that communicate using standardized protocols.
The internet is based on the TCP/IP protocol suite.
Data is transmitted in packets across the network.
The network model consists of layers, including the physical, data link, network, transport, and application layers.
Routing protocols are used to direct packets to their destination.
Examples of internet applications ...
I am a software engineer with experience in developing web and mobile applications using various programming languages and frameworks.
Proficient in Java, Python, and JavaScript
Experience with React, Angular, and Node.js
Strong understanding of database management systems
Passionate about learning new technologies and solving complex problems
based on 1 interview experience
based on 3 reviews
Rating in categories
Associate Engineer
328
salaries
| ₹2.8 L/yr - ₹8 L/yr |
Associate
296
salaries
| ₹2.3 L/yr - ₹6.3 L/yr |
Financial Analyst
271
salaries
| ₹12.6 L/yr - ₹23 L/yr |
Project Manager
222
salaries
| ₹9.3 L/yr - ₹20 L/yr |
Service Reliability Engineer
177
salaries
| ₹3.7 L/yr - ₹8.2 L/yr |
Jio
Vodafone Idea
Bharti Airtel
Ericsson