Filter interviews by
Investigating email phishing involves analyzing email headers, links, and content to identify signs of phishing.
Examine email headers to look for inconsistencies or suspicious domains
Hover over links to check the actual URL before clicking
Analyze email content for spelling errors, urgent language, or requests for personal information
Check for generic greetings or unfamiliar sender addresses
Network protocols are rules and conventions for communication between devices on a network. Network concepts include IP addressing, routing, and security.
Network protocols are rules that govern communication between devices on a network, such as TCP/IP, HTTP, and FTP.
Network concepts include IP addressing, which assigns unique addresses to devices on a network, routing which determines the path data takes between devic...
Cyber kill chain is a framework used to describe the stages of a cyber attack from initial reconnaissance to data exfiltration.
The cyber kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
Each stage represents a step in the attacker's process of infiltrating a target network and achieving their goals.
By unde...
Cyber attacks are malicious attempts to disrupt, damage, or gain unauthorized access to computer systems or networks.
Cyber attacks can include malware, phishing, ransomware, DDoS attacks, and social engineering.
Attackers may target individuals, organizations, or governments for financial gain, espionage, or sabotage.
Examples of cyber attacks include the WannaCry ransomware attack, the Equifax data breach, and the Solar
TCP/IP and OSI are two different networking models used to understand and standardize communication protocols.
TCP/IP model is a simpler model with 4 layers: Application, Transport, Internet, and Network Access.
OSI model is a more detailed model with 7 layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
TCP/IP model is used in the actual implementation of the internet, while OSI model...
Language and communication test exam conducted in pearson procotored AI software.
Presentation on Specific network Topics.
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
Logic Apps is a cloud service that helps you automate and orchestrate tasks, business processes, and workflows.
Logic Apps allow you to create workflows that integrate with various services and applications.
They provide a visual designer to create workflows using pre-built connectors and triggers.
Logic Apps can automate repetitive tasks, streamline processes, and improve efficiency.
Examples of Logic Apps include sending...
I applied via Walk-in and was interviewed in Jul 2024. There was 1 interview round.
I have performed analysis activities in the security space including threat intelligence, vulnerability assessments, and incident response.
Conducted threat intelligence analysis to identify potential risks and threats to the organization
Performed vulnerability assessments to identify weaknesses in systems and applications
Participated in incident response activities to investigate and mitigate security incidents
Utilized...
CyberProof interview questions for popular designations
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to mainta
Phishing emails can be identified by checking for suspicious sender addresses, links, attachments, and requests for personal information.
Check the sender's email address for any misspellings or unusual domain names
Hover over links to see the actual URL before clicking on them
Be cautious of emails requesting personal information or urgent action
Look for poor grammar or spelling errors in the email content
Avoid opening a
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
CIA stands for Confidentiality, Integrity, and Availability. Splunk and IBM QRadar are both security information and event management (SIEM) tools.
CIA is a security model that focuses on protecting information by ensuring its confidentiality, integrity, and availability.
Splunk is a SIEM tool that collects, indexes, and analyzes machine data to provide insights into security events and threats.
IBM QRadar is another SIEM...
I appeared for an interview in Feb 2025.
AAA in cybersecurity stands for Authentication, Authorization, and Accounting, crucial for securing systems.
Authentication verifies user identity (e.g., passwords, biometrics).
Authorization determines user permissions (e.g., access to files).
Accounting tracks user activities (e.g., logging access times).
Example: A user logs in (Authentication), accesses a file (Authorization), and their actions are logged (Accounting).
IDS detects intrusions, while IPS actively prevents them, enhancing network security.
IDS (Intrusion Detection System) monitors network traffic for suspicious activity.
IPS (Intrusion Prevention System) not only detects but also blocks potential threats.
Example of IDS: Snort, which analyzes traffic and alerts administrators.
Example of IPS: Cisco Firepower, which can block malicious traffic in real-time.
IDS is typically p...
I enjoy hiking, reading, and photography, which help me relax and explore my creativity.
Hiking: I love exploring nature trails and discovering new landscapes, often going on weekend hikes with friends.
Reading: I read a variety of genres, from fiction to non-fiction, and recently finished a book on cybersecurity.
Photography: I enjoy capturing moments during my hikes, focusing on landscapes and wildlife, and I often shar
Logical reasoning and verbal ability.
I applied via Naukri.com and was interviewed before Mar 2023. There were 4 interview rounds.
based on 5 interviews
Interview experience
based on 17 reviews
Rating in categories
SOC Analyst
36
salaries
| ₹3.5 L/yr - ₹10 L/yr |
Soc Analyst 1
15
salaries
| ₹3.5 L/yr - ₹5.8 L/yr |
Soc Analyst 2
13
salaries
| ₹5.2 L/yr - ₹9.5 L/yr |
Security Analyst
5
salaries
| ₹5 L/yr - ₹9 L/yr |
Cyber Security Analyst
5
salaries
| ₹5 L/yr - ₹11.2 L/yr |
TCS
Accenture
Wipro
Cognizant