i
Computacenter
Filter interviews by
Clear (1)
I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.
Port numbers for different protocols
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
Steps to take after a phishing attack
Immediately disconnect from the internet
Change all passwords associated with the compromised account
Notify the appropriate parties (IT department, bank, etc.)
Run a virus scan on all devices used to access the compromised account
Educate yourself and others on how to identify and avoid phishing attacks
Top trending discussions
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
There is simple asked, and most of the question we used in daily life
There is one topic that why female is good manager as compare to male
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Sep 2021. There were 4 interview rounds.
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.
Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves implementing measures to prevent cyber attacks and data breaches
It includes protecting against viruses, malware, and other malicious software
Cyber security also involves educating users on safe online practices
Examples of cyber security measures include fi...
Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.
Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
It includes measures such as encryption, firewalls, access controls, and security policies
Security is important in all areas, including personal, b...
Technical Analyst
291
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Technical Analyst
272
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Analyst
101
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Project Manager
67
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Consultant
58
salaries
| ₹0 L/yr - ₹0 L/yr |
Wipro
HCLTech
Tech Mahindra
TCS