Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 3 interview rounds.
IPsec stands for Internet Protocol Security, a protocol suite used to secure Internet Protocol (IP) communications.
IPsec provides authentication, integrity, and confidentiality for data transmitted over a network.
It can be used to create Virtual Private Networks (VPNs) to securely connect remote offices or users.
IPsec operates at the network layer of the OSI model and can be implemented through various protocols such a...
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Firewalls act as a barrier between a trusted internal network and untrusted external networks.
They can be hardware-based or software-based.
Firewalls can filter traffic based on IP addresses, ports, protocols, and applications.
Examples of firewalls include Cisco ASA, Palo Alto Netwo
My notice period is currently 2 weeks.
My notice period is 2 weeks
I am required to give a 2-week notice before leaving my current position
I can start a new role after 2 weeks from the date of resignation
I applied via Campus Placement and was interviewed in Mar 2023. There were 5 interview rounds.
There were 3 coding questions to solve on paper and they will analyze and shortlist for the interview and discuss your answers.
Two common DSA problems - reversing a singly linked list and finding pairs in an array that sum to a given value.
To reverse a singly linked list, iterate through the list and change the direction of the pointers.
To find pairs in an array that sum to a given value, use a hash table to store the difference between the target sum and each element in the array, then check if any subsequent elements match the stored differe
Implement queue using stack & remove duplicates from linked list
To implement queue using stack, we need to maintain two stacks. One for enqueue operation and another for dequeue operation.
To remove duplicates from a linked list, we can use a hash table to keep track of visited nodes and remove duplicates as we traverse the list.
Alternatively, we can use two pointers to compare each node with all subsequent nodes and re
I applied via Recruitment Consulltant and was interviewed before Feb 2023. There was 1 interview round.
Vulnerability management involves identifying, evaluating, and mitigating security vulnerabilities. Vulnerability scanners scan systems for known vulnerabilities. OWASP top 10 lists common web application security risks. SQL injection and XSS are common attack types. MITRE framework provides a structured approach to cybersecurity. Cyber-kill chain outlines the stages of a cyber attack. Malware analysis involves examini...
I applied via LinkedIn and was interviewed in Oct 2021. There were 3 interview rounds.
Cumulus Systems interview questions for popular designations
I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a database-driven application.
SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate or extract data from the database.
It can lead to unauthorized access, data breaches, data manipulation, or even complete system compromise.
To mitigate SQL injection, use parameterized queries ...
OWASP top 10 vulnerabilities are the most critical web application security risks.
Injection flaws (SQL, NoSQL, OS)
Broken authentication and session management
Cross-site scripting (XSS)
Broken access control
Security misconfiguration
Insecure cryptographic storage
Insufficient logging and monitoring
Insecure communication
Using components with known vulnerabilities
Insufficient attack protection
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing an action on another website without their knowledge or consent.
CSRF attacks exploit the trust that a website has in a user's browser
Attackers can use CSRF to perform actions such as changing a user's password or making unauthorized purchases
Preventing CSRF involves using techniques such as CSRF tokens a
EDR is a proactive approach to threat detection and response, while antivirus is a reactive approach to threat prevention.
EDR focuses on detecting and responding to threats in real-time, while antivirus focuses on preventing known threats from infecting a system.
EDR uses behavioral analysis and machine learning to identify suspicious activity, while antivirus relies on signature-based detection.
EDR provides more detail...
Port numbers for different protocols used in networking.
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be mitigated by input validation and output encoding.
Input validation involves checking user input for malicious code and rejecting it if found.
Output encoding involves converting special characters to their HTML entity equivalents to prevent ...
Top trending discussions
I applied via Newspaper Ad and was interviewed in Apr 2022. There were 2 interview rounds.
A DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
Translates domain names to IP addresses
Resolves queries from clients
Helps in navigating the internet by mapping domain names to IP addresses
The Qualys agent is a lightweight software installed on endpoints to collect security data and perform security assessments.
Qualys agent is a lightweight software installed on endpoints to collect security data.
It helps in performing security assessments by scanning for vulnerabilities and compliance issues.
The agent continuously monitors the endpoint for any security threats and sends the data to the Qualys Cloud Plat...
I am a dedicated Information Security Analyst with a strong background in cybersecurity and a passion for protecting data.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security breaches and responding effectively
Proficient in using security tools and technologies such as firewalls and encryption
Strong understanding of compliance regulations and best practices in i
I applied via Walk-in and was interviewed before Aug 2022. There were 3 interview rounds.
General Aptitude tests
General Group Discussion Topics like - How EVs will help in future transport
I applied via Campus Placement and was interviewed before Oct 2022. There were 4 interview rounds.
I applied via Job Portal and was interviewed in Dec 2021. There were 2 interview rounds.
Individual skills
Professional and programming
Some of the top questions asked at the Cumulus Systems interview -
based on 4 interviews
Interview experience
based on 34 reviews
Rating in categories
Software Engineer
52
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
21
salaries
| ₹0 L/yr - ₹0 L/yr |
Information Security Analyst
16
salaries
| ₹0 L/yr - ₹0 L/yr |
QA Engineer
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Software Engineer
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech