Filter interviews by
I applied via Newspaper Ad and was interviewed in Oct 2022. There were 3 interview rounds.
My name is padma and recently I have done my graduation and I have a good knowledge in cybersecurity,ethical hacking, SoC analyst.
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity aims to ensure the confidentiality, integrity, and availability of data and systems.
It includes various techniques such as encryption, firewalls, antivirus software, intrusio...
Pass the hash attack is a technique used by hackers to gain unauthorized access to a computer system by using hashed passwords.
In a pass the hash attack, the attacker captures the hashed password of a user and uses it to authenticate themselves without knowing the actual password.
This attack is possible because the Windows operating system stores hashed passwords in memory, allowing an attacker to extract and reuse the...
A dictionary attack is a method used to gain unauthorized access to a system by systematically trying all possible words or combinations from a pre-existing list.
Dictionary attack is a type of brute force attack.
It involves using a list of commonly used passwords or words from a dictionary to guess the password of a user or system.
The attacker tries each word in the list until a match is found or all possibilities are ...
A rainbow attack is a type of brute force attack that involves precomputing and storing the hash values of all possible passwords.
Rainbow attacks are used to crack password hashes by comparing them to precomputed hash values.
They are based on the idea of reducing the time and computational resources required for brute force attacks.
Rainbow tables are used to store precomputed hash values and their corresponding passwor...
Scanning is the process of systematically examining a network or system for vulnerabilities or potential security threats.
Scanning involves sending network requests to identify open ports, services, and potential vulnerabilities.
It helps in identifying weaknesses in the network or system that can be exploited by attackers.
Scanning can be performed using various tools like Nmap, Nessus, or OpenVAS.
Different types of sca...
Top trending discussions
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
There is simple asked, and most of the question we used in daily life
There is one topic that why female is good manager as compare to male
I applied via Company Website and was interviewed before Nov 2021. There were 4 interview rounds.
It was a 45-minute test where different topics like basic maths, pseudocode etc were discussed.
2 coding questions were there one was basic and another one was intermediate
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves implementing measures to prevent cyber attacks and data breaches
It includes protecting against viruses, malware, and other malicious software
Cyber security also involves educating users on safe online practices
Examples of cyber security measures include fi...
Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.
Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
It includes measures such as encryption, firewalls, access controls, and security policies
Security is important in all areas, including personal, b...
GIS Analyst
89
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior GIS Analyst
37
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
23
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
21
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
13
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech