Filter interviews by
I applied via Approached by Company
Seeking new challenges and growth opportunities in a different environment.
Desire for new challenges and learning experiences
Opportunity for career advancement and growth
Seeking a change in work environment or company culture
Interest in exploring different industries or sectors
I view negative feedback as an opportunity for growth and improvement.
Listen actively and without defensiveness
Ask for specific examples to better understand the feedback
Reflect on the feedback and identify areas for improvement
Develop a plan to address the feedback and make necessary changes
Seek feedback from others to track progress and improvement
Top trending discussions
Create user stories out of a use-case and design workflow for it.
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
Online aptitude test have been coundected
I applied via Walk-in and was interviewed before Jul 2022. There were 3 interview rounds.
This was basic test it was easy
I applied via Referral and was interviewed in Aug 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2022. There were 3 interview rounds.
As a Business Analyst, my day-to-day tasks involve gathering and analyzing data, documenting requirements, conducting meetings, and providing recommendations.
Gathering and analyzing data from various sources
Documenting business requirements and user stories
Conducting meetings with stakeholders to gather information and clarify requirements
Creating process flow diagrams and wireframes
Analyzing and interpreting data to i...
I am a highly skilled Business Analyst with experience in data analysis and process improvement.
Experienced in conducting thorough data analysis to identify trends and insights
Proficient in using various tools and software for data visualization and reporting
Strong problem-solving skills to identify and address business challenges
Collaborative team player with excellent communication and presentation skills
Implemented ...
A problem statement was given and I had to write a user story for that with acceptance criteria.
based on 1 interview
Interview experience
Senior Analyst
25
salaries
| ₹8 L/yr - ₹17 L/yr |
IT System Administrator
18
salaries
| ₹17 L/yr - ₹23 L/yr |
Team Lead
17
salaries
| ₹9.3 L/yr - ₹27 L/yr |
Analyst
15
salaries
| ₹5.6 L/yr - ₹13 L/yr |
Senior Associate
13
salaries
| ₹4.1 L/yr - ₹7.5 L/yr |
Palo Alto Networks
Gen
Trend Micro
McAfee