Filter interviews by
I applied via Referral and was interviewed before Jun 2022. There were 3 interview rounds.
Security concepts in cyber security refer to fundamental principles and practices that help protect information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.
Integrity: Ensuring that information is accurate and has not been tampered with.
Availability: Ensuring that infor...
DoS attack targets a single system, while DDoS attack targets multiple systems simultaneously.
DoS stands for Denial of Service, where a single system is targeted with overwhelming traffic to make it unavailable to users.
DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack simultaneously.
DoS attacks can be carried out by a single attacker, while DDoS attacks require multipl...
Cyber Kill Chain is a framework used to describe the stages of a cyber attack, from initial reconnaissance to data exfiltration.
Cyber Kill Chain was developed by Lockheed Martin to help organizations understand and defend against cyber attacks.
The stages of Cyber Kill Chain include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
By understanding each s...
I expect a competitive salary based on my skills, experience, and industry standards for an Information Security Analyst.
Research industry standards: For example, Glassdoor or Payscale can provide insights into average salaries.
Consider my experience level: With 5 years in the field, I would expect a salary in the range of $80,000 to $100,000.
Location matters: Salaries can vary significantly based on geographic locatio...
Top trending discussions
I applied via Campus Placement and was interviewed before Nov 2019. There were 4 interview rounds.
I applied via Walk-in and was interviewed in Sep 2020. There was 1 interview round.
I applied via Walk-in and was interviewed before Oct 2019. There were 5 interview rounds.
I applied via Campus Placement and was interviewed in Mar 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Two types of diagrams used in business analysis are process flow diagrams and use case diagrams.
Process flow diagrams show the flow of activities and decisions in a process.
Use case diagrams show the interactions between actors and the system.
Both diagrams are used to analyze and improve business processes.
Process flow diagrams can be created using tools like Microsoft Visio.
Use case diagrams can be created using tools...
Extends is a keyword in object-oriented programming that allows a class to inherit properties and methods from another class.
Extends is used in inheritance to create a subclass that is a modified version of the parent class.
The subclass inherits all the properties and methods of the parent class and can also have its own unique properties and methods.
For example, a class Animal can be extended by a subclass Dog, which ...
Use case model is a visual representation of the interactions between users and a system.
Describes the steps a user takes to achieve a goal with a system
Identifies actors and their roles in the system
Shows the flow of events and possible alternate paths
Helps to identify requirements and potential issues
Example: Use case model for an online shopping system
Example: Use case model for a banking system
I applied via Company Website and was interviewed before Mar 2021. There was 1 interview round.
based on 1 interview experience
Difficulty level
Duration
Software Engineer
67
salaries
| ₹4 L/yr - ₹10 L/yr |
Devops Engineer
22
salaries
| ₹5.5 L/yr - ₹12 L/yr |
Software Developer
17
salaries
| ₹3.5 L/yr - ₹10 L/yr |
Salesforce Developer
16
salaries
| ₹5 L/yr - ₹10 L/yr |
Test Engineer
13
salaries
| ₹4.2 L/yr - ₹8.6 L/yr |
TCS
Accenture
Wipro
Cognizant