Filter interviews by
I applied via Walk-in and was interviewed in Apr 2023. There was 1 interview round.
A vulnerability is a weakness in a system or network that can be exploited by attackers to compromise the security of the system.
Vulnerabilities can exist in software, hardware, or even human behavior.
Common examples of vulnerabilities include software bugs, misconfigurations, and weak passwords.
Attackers can exploit vulnerabilities to gain unauthorized access, steal data, or disrupt operations.
Vulnerabilities are typi...
IPv4 and IPv6 are internet protocol versions, TCP/IP is a suite of protocols, OSI model is a conceptual framework, 3-way handshake is a method of establishing a TCP connection.
IPv4 is the fourth version of the Internet Protocol, using 32-bit addresses.
IPv6 is the sixth version of the Internet Protocol, using 128-bit addresses.
TCP/IP is a suite of protocols that enable communication over the internet.
OSI model is a conc...
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication and authorization of users
Enables administrators to assign policies, deploy software, and apply updates
Example: Used in organizations to manage user accounts, group policies, and access
Cloud security refers to the practices and technologies used to protect data, applications, and infrastructure in the cloud.
Involves securing data, applications, and infrastructure stored in the cloud
Includes measures such as encryption, access control, and monitoring
Ensures data privacy, compliance with regulations, and protection against cyber threats
Examples of cloud security tools: firewalls, IAM (Identity and Acce
Top trending discussions
based on 1 review
Rating in categories
Cyber Security Analyst
4
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
TCS
Wipro
Infosys
Tech Mahindra