Filter interviews by
Clear (1)
I applied via Referral and was interviewed in Jun 2023. There were 4 interview rounds.
Top trending discussions
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.
Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.
Kill Chain helps organizations understand and defend against cyber attacks, whil...
I applied via Referral and was interviewed before Oct 2023. There was 1 interview round.
DNS (Domain Name System) is a protocol used to translate domain names into IP addresses.
DNS is essential for translating human-readable domain names (like google.com) into machine-readable IP addresses (like 172.217.3.206)
DNS operates using a client-server architecture, where the client (usually a web browser) sends a DNS query to a DNS server to resolve a domain name
DNS uses various protocols such as UDP (User Datagra...
CSRF is a type of attack where the attacker tricks the user into performing actions on a website without their knowledge, while SSRF is a vulnerability that allows an attacker to send crafted requests from a vulnerable server.
CSRF (Cross-Site Request Forgery) is an attack where the attacker tricks a user into performing actions on a website without their knowledge.
SSRF (Server-Side Request Forgery) is a vulnerability t...
I was interviewed in Jun 2024.
I am a dedicated Cyber Security Analyst with a strong background in network security and threat detection.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security incidents and responding to cyber threats
Proficient in using security tools such as SIEM, IDS/IPS, and endpoint protection
Certified in relevant cybersecurity certifications like CISSP or CEH
Seeking new challenges and opportunities for growth in the field of cyber security.
Desire to work on more advanced projects
Opportunity to learn new technologies and techniques
Seeking a more challenging and dynamic work environment
I was interviewed in Jul 2024.
It was all related to maths and some brain storming questions
Yes, I am comfortable working night shifts as needed for the role of Cyber Security Analyst.
I am flexible with my work schedule and can adapt to working night shifts
I understand the importance of 24/7 monitoring and response in the field of cyber security
I have previous experience working night shifts in a similar role, such as incident response or network monitoring
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Technical Support Engineer
182
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
117
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
91
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Support Specialist
66
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
57
salaries
| ₹0 L/yr - ₹0 L/yr |
Zoho
Freshworks
TCS
HCLTech