Filter interviews by
I applied via Naukri.com and was interviewed before Jan 2022. There were 2 interview rounds.
Alert analysis involves reviewing and investigating security alerts generated by various security tools.
SOC analysts review alerts to determine if they are true positives or false positives.
They investigate the alerts to determine the root cause and severity of the threat.
They prioritize alerts based on the level of risk and potential impact to the organization.
Alert analysis helps identify potential security incidents...
Splunk architecture is a distributed system with multiple components for data ingestion, indexing, and search.
Splunk has forwarders to collect data from various sources
Data is indexed and stored in Splunk indexers
Search heads provide a user interface to search and analyze data
Deployment server manages configurations across the distributed system
Heavy forwarders can perform additional processing before sending data to i
A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.
Honeypots are used to detect and analyze cyber threats in a controlled environment.
They can be deployed within an organization's network to attract and monitor malicious activities.
Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...
I handle security incidents by following established incident response procedures and utilizing various security tools.
Immediately isolate affected systems to prevent further damage
Collect and analyze relevant data to determine the scope and impact of the incident
Contain the incident by blocking malicious activity and removing threats
Communicate with stakeholders to keep them informed of the situation
Document the incid...
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .
To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.
Analyze the attack vector to understand how the attack occurred
Contain the attack by isolating affected systems and limiting further damage
Investigate the root cause of the attack to prevent future incidents
Implement necessary se...
To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.
Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks
Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities
Implement security patches provided by soft...
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to mainta
The port number for RDP (Remote Desktop Protocol) is 3389.
Port number for RDP is 3389
RDP uses TCP protocol
Commonly used for remote desktop connections
I applied via Naukri.com and was interviewed in Jan 2021. There were 4 interview rounds.
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.
Symmetric encryption is faster and more efficient than asymmetric encryption.
Examples of symmetric encryption algorithms include AES and DES.
Asymmetric encryption is more secure as it uses a public key for encryption and a private key for decryption.
Examples of asymmetric encryption algorithms incl
TLS is the successor of SSL protocol, providing more secure communication over the internet.
TLS is the newer version of SSL.
TLS uses stronger encryption algorithms.
TLS supports more secure cipher suites.
TLS provides better authentication and key exchange mechanisms.
TLS is backward compatible with SSL, but SSL is not forward compatible with TLS.
Educating users about cybersecurity attacks is crucial for their protection.
Conduct regular cybersecurity awareness training sessions
Provide clear and concise guidelines on safe online practices
Share real-life examples of cyber attacks and their consequences
Encourage the use of strong and unique passwords
Promote the use of multi-factor authentication
Teach users how to identify phishing emails and suspicious links
Advise...
There are various types of attacks, including malware, phishing, DDoS, ransomware, and social engineering.
Malware attacks involve malicious software that can harm or exploit systems.
Phishing attacks aim to trick individuals into revealing sensitive information.
DDoS attacks overwhelm a network or website with excessive traffic, causing it to become unavailable.
Ransomware attacks encrypt files or systems and demand a ran...
Hash values can be used to determine if a file or data is malicious or not.
Hash values are unique identifiers generated from the content of a file or data.
Malicious files or data often have known hash values that can be used for detection.
Comparing hash values of files or data with known malicious hash values can help identify threats.
Hash values can be used in antivirus software, threat intelligence databases, and sec...
I was interviewed before Sep 2016.
I was interviewed in Jul 2017.
I was interviewed before May 2016.
I was interviewed in Sep 2016.
As a mechanical engineer, I choose corporate because it offers diverse opportunities, professional growth, and stability.
Corporate provides a wide range of industries and sectors to work in, allowing me to explore different areas of mechanical engineering.
Working in a corporate environment offers opportunities for professional growth through training programs, mentorship, and exposure to new technologies.
Corporate jobs...
I was interviewed in Mar 2017.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Software Engineer
77
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
56
salaries
| ₹0 L/yr - ₹0 L/yr |
Devops Engineer
33
salaries
| ₹0 L/yr - ₹0 L/yr |
Softwaretest Engineer
27
salaries
| ₹0 L/yr - ₹0 L/yr |
Salesforce Developer
17
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Accenture
Wipro
Cognizant