Filter interviews by
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Jun 2021. There were 5 interview rounds.
Post covid-19, cyber-security market will see an increase in demand due to remote work and online transactions.
Remote work and online transactions have increased the risk of cyber-attacks.
Organizations will invest more in cyber-security solutions to protect their data and systems.
Cloud-based security solutions will become more popular.
Customers will prioritize solutions that offer remote management and monitoring capab...
Checkpoint's unique differentiators are advanced threat prevention, unified security management, and cloud security solutions.
Advanced threat prevention: Checkpoint's SandBlast technology provides real-time protection against zero-day and advanced threats.
Unified security management: Checkpoint's Security Management Portal allows for centralized management of security policies across multiple environments.
Cloud securit...
The approach for making a cyber case varies based on the client's size and type.
For MSPs, focus on the benefits of outsourcing security and the cost savings compared to hiring an in-house team.
For large enterprises, emphasize the need for a comprehensive security strategy and the potential financial and reputational damage of a breach.
For government entities, highlight compliance requirements and the importance of prot...
Gartner recommends a zero-trust approach to secure remote workforces. Best practices include multi-factor authentication, VPNs, and endpoint protection.
Gartner recommends a zero-trust approach to security
Implement multi-factor authentication for all remote access
Use VPNs to secure remote connections
Ensure endpoint protection is up-to-date and includes firewalls and anti-virus software
Train employees on secure remote wo...
Yes, I have experience working with compliances like RBI, PCIDSS, GDPR, HIPAA.
I have worked with the Reserve Bank of India (RBI) guidelines to ensure compliance in financial product sales.
I am familiar with the Payment Card Industry Data Security Standard (PCIDSS) and have implemented necessary measures to protect customer data.
I have worked with the General Data Protection Regulation (GDPR) to ensure the privacy and s...
IOT security focuses on securing devices and data in the Internet of Things, while OT security focuses on securing operational technology systems.
IOT security involves securing devices and data in the Internet of Things, which includes sensors, smart devices, and other connected devices.
OT security involves securing operational technology systems, which includes industrial control systems, SCADA systems, and other syst...
Top trending discussions
I was interviewed in Aug 2024.
posted on 7 Feb 2025
I was interviewed in Jan 2025.
It is the HackerRank coding test.
posted on 2 Jan 2025
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
posted on 29 Nov 2024
I applied via Naukri.com and was interviewed in Oct 2024. There were 3 interview rounds.
SQL query to retrieve student department id.
Use SELECT statement to retrieve data
Specify the columns to be selected, including the department id column
Specify the table where the student data is stored
Use WHERE clause to filter the results based on student information
Code to find index of sub string in main string and duplicate the sub string
Use a loop to iterate through the main string and check for the sub string
If sub string is found, duplicate it and store the index
Return the index of the duplicated sub string
I applied via campus placement at Dayananda Sagar College of Engineering, Bangalore and was interviewed in Oct 2024. There were 4 interview rounds.
3 coding dsa question
Difficulty is On your luck
My friends got easy level
I got medium level
Some got hard questions as well
Ssh round , quant and logical
Tip: bring your calculator
I was interviewed in Sep 2024.
Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.
Create two dictionaries, one for cache data and one for dirty bit tracking.
Implement LRU flushing technique to remove least recently used data when cache is full.
Set dirty bit to mark data that has been modified and needs to be written back to main memory.
Update dirty bit when data is modified and track which data needs to...
Some of the top questions asked at the Check Point Software Technologies interview -
based on 2 interviews
Interview experience
based on 39 reviews
Rating in categories
Technical Support Engineer
21
salaries
| ₹5.5 L/yr - ₹19.1 L/yr |
TAC Engineer
19
salaries
| ₹6 L/yr - ₹15 L/yr |
Security Engineer
10
salaries
| ₹15 L/yr - ₹32 L/yr |
Network Security Engineer
9
salaries
| ₹6.3 L/yr - ₹21.5 L/yr |
Order Management Coordinator
7
salaries
| ₹6 L/yr - ₹8.2 L/yr |
Palo Alto Networks
Fortinet
Gen
McAfee