Filter interviews by
CEH stands for Certified Ethical Hacker. CCNA stands for Cisco Certified Network Associate.
CEH is a certification for professionals who want to work as ethical hackers and penetration testers.
CCNA is a certification for professionals who want to work with Cisco networking technologies.
CEH covers topics such as footprinting and reconnaissance, scanning networks, enumeration, system hacking, and more.
CCNA covers topics s...
Top companies in cyber security are those that provide innovative and effective solutions to protect against cyber threats.
Top companies invest heavily in research and development to stay ahead of emerging threats
They offer a range of services including threat intelligence, incident response, and vulnerability assessments
Examples of top companies include Symantec, McAfee, and Cisco
These companies have a strong reputati...
The question is unclear and lacks context.
Please provide more information or clarify the question.
Without context, it is impossible to provide a meaningful answer.
Low can refer to many things in cyber security, such as low-level attacks or low-risk vulnerabilities.
Working in cyber security involves analyzing and mitigating risks to protect systems and data.
It is important to stay up-to-date on the latest threats and se...
Top trending discussions
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
posted on 22 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.
OS, DBMS, DLD, Networking, and Cryptography
Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.
Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.
Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.
Other types include hashing algorithms like SHA-256 and digital signatures like DSA.
Cr...
posted on 23 Jun 2022
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
posted on 21 Aug 2024
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.
DNS servers store records of domain names and their corresponding IP addresses, allowing for effi...
DHCP stands for Dynamic Host Configuration Protocol, used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It assigns IP addresses dynamically, allowing for efficient use of available addresses
DHCP servers lease IP addresses to devices for a specific period of time
DHCP also provides other network configuration information, such as su...
RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.
RSA is a public-key cryptosystem used for secure data transmission.
It involves generating a public key and a private key for encryption and decryption.
RSA encryption is based on the difficulty of factoring large prime numbers.
It is commonly used in secure communication protocols like HTTPS.
RSA can be used for digital signa
Basic principles of security management involve risk assessment, access control, incident response, and security awareness.
Risk assessment: Identifying and evaluating potential risks to the organization's security.
Access control: Implementing measures to control who has access to sensitive information or resources.
Incident response: Developing plans and procedures to respond to security incidents effectively.
Security a...
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.
Coding test contains 2 questions
based on 1 interview
Interview experience
Software Developer
19
salaries
| ₹4.5 L/yr - ₹10.5 L/yr |
Software Engineer
15
salaries
| ₹4.5 L/yr - ₹12.5 L/yr |
Consultant2
9
salaries
| ₹8 L/yr - ₹10.5 L/yr |
Senior Software Engineer
9
salaries
| ₹10 L/yr - ₹25 L/yr |
Associate 1
6
salaries
| ₹8 L/yr - ₹14.5 L/yr |
TCS
Infosys
Wipro
HCLTech