Filter interviews by
I applied via Job Fair and was interviewed before Mar 2022. There were 2 interview rounds.
Privacy policy outlines how an organization collects, uses, and protects personal information, while privacy notice is a brief statement about the organization's privacy practices.
Privacy policy is a comprehensive document that outlines an organization's privacy practices, including how personal information is collected, used, and protected.
Privacy notice is a brief statement that informs individuals about an organizat...
Sensitive data access is restricted through various methods.
Access control lists (ACLs) are used to restrict access to sensitive data.
Encryption is used to protect sensitive data from unauthorized access.
Two-factor authentication is used to ensure only authorized personnel can access sensitive data.
Regular audits are conducted to ensure access to sensitive data is limited to only those who need it.
Physical security mea...
Top trending discussions
posted on 6 May 2024
I applied via Company Website and was interviewed in Apr 2024. There were 2 interview rounds.
Basics compliance-related questions and case study.
posted on 1 Jul 2023
I applied via Walk-in and was interviewed in Jan 2023. There were 2 interview rounds.
Security is the state of being free from danger or threat.
Security involves measures taken to protect people, property, and information from harm or damage.
Examples of security measures include surveillance cameras, access control systems, and fire alarms.
Security can be physical, such as locks on doors, or digital, such as encryption of data.
Security is important in many industries, including finance, healthcare, and ...
posted on 16 Jun 2024
I applied via Referral and was interviewed before Jun 2023. There was 1 interview round.
SIEM tools are security information and event management tools used to collect, analyze, and manage security data.
SIEM tools collect security data from various sources such as network devices, servers, and applications.
They analyze the collected data to detect security incidents and threats in real-time.
SIEM tools provide centralized monitoring and reporting capabilities for security events.
They help in compliance mana...
DHCP is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP server assigns IP addresses to devices on a network
DHCP client requests an IP address from the DHCP server
DHCP lease time determines how long an IP address is valid for
DHCP uses UDP port 67 for server and port 68 for client communication
0.0.0.0 is a special IP address used to represent a non-routable meta-address.
0.0.0.0 is often used in network programming to indicate an invalid, unknown, or non-applicable target
It is typically used in routing tables or as a placeholder address
It can also be used by servers to listen on all available network interfaces
To prevent malware attacks, organisations can implement strong cybersecurity measures such as regular software updates, employee training, network segmentation, and endpoint protection.
Regularly update software and security patches to address vulnerabilities that could be exploited by malware.
Educate employees on safe browsing habits, email phishing awareness, and the importance of not clicking on suspicious links or d...
TCP flags are control bits in the TCP header used to indicate the status of a TCP connection.
TCP flags include SYN, ACK, FIN, RST, PSH, URG, and ECE.
SYN flag is used to initiate a connection.
ACK flag is used to acknowledge receipt of data.
FIN flag is used to terminate a connection.
RST flag is used to reset a connection.
PSH flag is used to push data to the application layer.
URG flag is used to indicate urgent data.
ECE f...
Antivirus works by scanning files and programs on a computer for known patterns of malicious code.
Antivirus software uses a database of known virus signatures to identify and remove malicious code.
It scans files, emails, and programs in real-time to detect and prevent malware infections.
Some antivirus programs also use heuristic analysis to identify new and unknown threats based on behavior.
Antivirus software can quara...
posted on 10 Jan 2023
I applied via Campus Placement and was interviewed before Jan 2022. There were 5 interview rounds.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Types of firewalls include packet filtering firewalls, stateful inspection firewalls, proxy firewalls, and next-generation firewalls.
Packet filtering firewalls examine packets of data and decide whether to forward or discard them based on predetermined criteria.
Stateful inspection ...
Stateful firewalls track the state of active connections, while stateless firewalls filter packets based on predetermined rules.
Stateful firewalls maintain context about active connections, allowing them to make more informed decisions about which packets to allow or block.
Stateless firewalls filter packets based on static rules, without considering the state of the connection.
Stateful firewalls are more secure as they...
ISO 27001 is the international standard for information security management systems, while 27001 is a typographical error.
ISO 27001 is the correct international standard for information security management systems.
27001 is a typographical error and does not refer to any specific standard.
Organizations should aim for ISO 27001 certification to demonstrate their commitment to information security.
ISO 27001 provides a fra...
Various compliance standards are regulations that organizations must follow to protect sensitive data and ensure cybersecurity.
Compliance standards include GDPR, HIPAA, PCI DSS, and ISO 27001
GDPR (General Data Protection Regulation) is a European Union regulation that governs data protection and privacy for individuals within the EU
HIPAA (Health Insurance Portability and Accountability Act) sets the standard for protec...
posted on 31 Mar 2024
I applied via Campus Placement and was interviewed before Mar 2023. There were 2 interview rounds.
Distance education is better or not
posted on 23 Feb 2022
posted on 25 Nov 2021
I applied via Referral and was interviewed in Oct 2021. There were 3 interview rounds.
DLP stands for Data Loss Prevention. It is a security strategy to prevent unauthorized access and transmission of sensitive data.
DLP is used to protect sensitive data from being accessed, used, or transmitted by unauthorized users.
It involves monitoring and controlling data in motion, data at rest, and data in use.
DLP solutions can be implemented through software, hardware, or a combination of both.
Examples of sensitiv...
posted on 23 Feb 2022
I applied via Naukri.com and was interviewed in Aug 2021. There was 1 interview round.
based on 1 review
Rating in categories
Security Analyst
12
salaries
| ₹3 L/yr - ₹6.5 L/yr |
Associate Security Consultant
9
salaries
| ₹4 L/yr - ₹8.1 L/yr |
Security Consultant
6
salaries
| ₹3.7 L/yr - ₹5 L/yr |
Associate Consultant
4
salaries
| ₹3.8 L/yr - ₹7 L/yr |
Associate Software Developer
4
salaries
| ₹4 L/yr - ₹5.1 L/yr |
TCS
Wipro
Infosys
HCLTech