Filter interviews by
I applied via Walk-in and was interviewed in Apr 2023. There was 1 interview round.
A vulnerability is a weakness in a system or network that can be exploited by attackers to compromise the security of the system.
Vulnerabilities can exist in software, hardware, or even human behavior.
Common examples of vulnerabilities include software bugs, misconfigurations, and weak passwords.
Attackers can exploit vulnerabilities to gain unauthorized access, steal data, or disrupt operations.
Vulnerabilities are typi...
IPv4 and IPv6 are internet protocol versions, TCP/IP is a suite of protocols, OSI model is a conceptual framework, 3-way handshake is a method of establishing a TCP connection.
IPv4 is the fourth version of the Internet Protocol, using 32-bit addresses.
IPv6 is the sixth version of the Internet Protocol, using 128-bit addresses.
TCP/IP is a suite of protocols that enable communication over the internet.
OSI model is a conc...
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication and authorization of users
Enables administrators to assign policies, deploy software, and apply updates
Example: Used in organizations to manage user accounts, group policies, and access
Cloud security refers to the practices and technologies used to protect data, applications, and infrastructure in the cloud.
Involves securing data, applications, and infrastructure stored in the cloud
Includes measures such as encryption, access control, and monitoring
Ensures data privacy, compliance with regulations, and protection against cyber threats
Examples of cloud security tools: firewalls, IAM (Identity and Acce
I applied via Naukri.com and was interviewed in Aug 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
I applied via Referral and was interviewed in Nov 2020. There were 4 interview rounds.
For loop is used for iterating over a range of values while for each loop is used for iterating over elements of an array.
For loop is used when the number of iterations is known beforehand.
For each loop is used when the number of iterations is not known beforehand.
For loop can be used with any iterable object.
For each loop can only be used with arrays and other iterable objects.
For loop uses an index variable to access...
I applied via Naukri.com and was interviewed in Sep 2020. There were 4 interview rounds.
Integration of sites involves identifying the systems to be integrated, defining the data flow, and implementing the integration process.
Identify the systems to be integrated
Define the data flow between the systems
Choose the appropriate integration method (API, ETL, etc.)
Develop and test the integration process
Deploy the integration process and monitor for errors
Ensure data security and compliance
Provide ongoing suppor
VLAN stands for Virtual Local Area Network and is used to logically separate a network into smaller segments.
VLANs are used to improve network performance and security.
They allow for better network management and easier troubleshooting.
VLANs can be configured on switches and routers.
Examples of VLANs include separating guest and employee networks or separating different departments within a company.
I appeared for an interview before Jun 2016.
I appeared for an interview before Aug 2016.
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Cyber Security Analyst
5
salaries
| ₹2.7 L/yr - ₹4.2 L/yr |
Marpu Foundation
Huawei Technologies
HCL Infosystems
Z X Learning