Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed before Aug 2023. There was 1 interview round.
Experienced team manager with a background in project management and leadership.
Over 5 years of experience leading teams in various industries
Strong communication and interpersonal skills
Proven track record of meeting project deadlines and exceeding goals
Certified in project management (PMP)
Previously managed a team of 15 employees at XYZ Company
Top trending discussions
posted on 24 Jan 2023
I applied via Naukri.com and was interviewed before Jan 2022. There were 2 interview rounds.
The OSI model consists of 7 layers that define the functions of a network communication system.
Physical layer - deals with physical connections and signals
Data link layer - handles error detection and correction
Network layer - responsible for routing and addressing
Transport layer - ensures reliable data transfer
Session layer - manages communication sessions
Presentation layer - translates data into a readable format
Appl
I applied via Approached by Company and was interviewed in Apr 2023. There was 1 interview round.
If clients are unable to prioritize work, the project manager can use various techniques to prioritize tasks.
Assess the impact and urgency of each task
Consider the project objectives and deliverables
Consult with the project team and stakeholders
Use prioritization techniques like the MoSCoW method or the Eisenhower Matrix
Allocate resources based on priority
Regularly review and adjust priorities as needed
MOSCOW is a prioritization technique used in project management to categorize requirements based on their importance.
MOSCOW stands for Must have, Should have, Could have, and Won't have
It helps in identifying the critical requirements and prioritizing them accordingly
Must have requirements are essential and cannot be compromised, while Won't have requirements are not necessary
For example, in a software development proj...
Invest is the act of allocating resources, usually money, with the expectation of generating an income or profit.
Investing involves taking risks in order to potentially earn a return on your investment.
There are many different types of investments, including stocks, bonds, real estate, and commodities.
Investing requires careful research and analysis to make informed decisions.
Diversification is important to minimize ri...
I applied via Campus Placement and was interviewed in Oct 2023. There were 2 interview rounds.
Case study based on previous work experience, mostly about market entry and situations
I applied via Naukri.com and was interviewed in Apr 2022. There was 1 interview round.
Retail Management in store involves overseeing the day-to-day operations of a retail establishment.
Managing inventory and stock levels
Ensuring customer satisfaction and resolving complaints
Hiring, training, and scheduling staff
Analyzing sales data and implementing strategies to increase revenue
Maintaining store appearance and cleanliness
I applied via Approached by Company and was interviewed in Jun 2022. There were 2 interview rounds.
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The framework helps organizations understand and defend against cyber attacks.
For example, if an attacker is in the reconnaissance stage, they are gathering information about the target.
By understandin...
Cyber kill chain and Mitre framework are both used for cyber threat intelligence, but the former focuses on attack stages while the latter provides a comprehensive framework for threat intelligence.
Cyber kill chain is a model that describes the stages of a cyber attack, from reconnaissance to exfiltration.
Mitre framework is a comprehensive framework for organizing and analyzing threat intelligence, including attack pat...
Password spraying is trying a few commonly used passwords on multiple accounts, while brute-force attack is trying all possible combinations of characters to crack a password.
Password spraying is a type of attack where a few commonly used passwords are tried on multiple accounts to gain unauthorized access.
Brute-force attack is a type of attack where all possible combinations of characters are tried to crack a password...
DNS exfiltration is a technique used to steal data by sending it out of a network via DNS queries.
It involves using DNS queries to send sensitive data outside of a network.
Attackers can use this technique to bypass firewalls and other security measures.
DNS exfiltration can be difficult to detect because DNS traffic is often allowed through firewalls.
Examples of data that can be exfiltrated via DNS include usernames, pa
We have created use cases for customer onboarding, order management, and inventory tracking.
Customer onboarding: designed a process for new customers to sign up and create an account
Order management: created a system for tracking orders from placement to delivery
Inventory tracking: developed a method for monitoring stock levels and reordering when necessary
Yes, I have created use cases with multiple devices.
I have experience creating use cases for mobile and desktop devices.
I have also created use cases for wearable devices and IoT devices.
One example is when I created use cases for a mobile app that could be used in conjunction with a smartwatch.
Another example is when I created use cases for a web application that could be accessed from both desktop and mobile devices.
Developed a use case for streamlining team communication and task management
Created a centralized platform for team members to communicate and collaborate on tasks
Implemented task tracking and progress monitoring features
Reduced miscommunication and increased productivity
Received positive feedback from team members and management
WAF use cases include protection against OWASP Top 10 vulnerabilities, DDoS attacks, and web application attacks.
Protection against SQL injection attacks
Prevention of cross-site scripting (XSS) attacks
Blocking of malicious bots and crawlers
Mitigation of distributed denial-of-service (DDoS) attacks
Enforcement of security policies and compliance regulations
Monitoring and logging of web traffic for threat detection and in
Daily activities for maintaining SIEM solution
Monitor SIEM alerts and investigate any potential security incidents
Review and update SIEM rules and policies
Ensure SIEM data sources are properly configured and updated
Perform regular backups and test disaster recovery procedures
Stay up-to-date with the latest security threats and trends
Collaborate with other teams to ensure proper integration with other security tools
Prov...
Use cases to prevent web attacks on various devices
Implementing firewalls and intrusion detection systems on servers
Using anti-virus and anti-malware software on client devices
Regularly updating software and security patches
Enforcing strong password policies and multi-factor authentication
Conducting regular security audits and penetration testing
Implementing HTTPS and SSL certificates on websites
Using content security ...
A use case to prevent SQL injection attacks
Implement input validation and sanitization
Use parameterized queries
Limit database user privileges
Regularly update and patch database software
The device that receives maximum EPS varies depending on the context and industry.
In the telecommunications industry, the device that receives maximum EPS is the base station.
In the automotive industry, the device that receives maximum EPS is the electronic control unit (ECU).
In the medical industry, the device that receives maximum EPS varies depending on the specific medical device.
EPS stands for events per second an...
I applied via Referral and was interviewed before Jul 2021. There was 1 interview round.
I applied via Approached by Company and was interviewed before Aug 2021. There was 1 interview round.
SIEM is used to detect zero day threats as it provides real-time monitoring and analysis of security events.
SIEM collects and analyzes data from various sources to identify potential threats
Zero day threats are unknown vulnerabilities that can be exploited by attackers
SIEM can detect zero day threats by analyzing patterns and anomalies in network traffic
SIEM can also use threat intelligence feeds to identify known zero...
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Associate Engineer
77
salaries
| ₹0 L/yr - ₹0 L/yr |
Shift Manager
65
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
60
salaries
| ₹0 L/yr - ₹0 L/yr |
Program Manager
51
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
50
salaries
| ₹0 L/yr - ₹0 L/yr |
Web Werks
Sify Technologies
Nxtgen Datacenter Cloud Technologies
STT Global Data Centres India