Filter interviews by
I applied via Newspaper Ad and was interviewed in Oct 2022. There were 3 interview rounds.
My name is padma and recently I have done my graduation and I have a good knowledge in cybersecurity,ethical hacking, SoC analyst.
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity aims to ensure the confidentiality, integrity, and availability of data and systems.
It includes various techniques such as encryption, firewalls, antivirus software, intrusio...
Pass the hash attack is a technique used by hackers to gain unauthorized access to a computer system by using hashed passwords.
In a pass the hash attack, the attacker captures the hashed password of a user and uses it to authenticate themselves without knowing the actual password.
This attack is possible because the Windows operating system stores hashed passwords in memory, allowing an attacker to extract and reuse the...
A dictionary attack is a method used to gain unauthorized access to a system by systematically trying all possible words or combinations from a pre-existing list.
Dictionary attack is a type of brute force attack.
It involves using a list of commonly used passwords or words from a dictionary to guess the password of a user or system.
The attacker tries each word in the list until a match is found or all possibilities are ...
A rainbow attack is a type of brute force attack that involves precomputing and storing the hash values of all possible passwords.
Rainbow attacks are used to crack password hashes by comparing them to precomputed hash values.
They are based on the idea of reducing the time and computational resources required for brute force attacks.
Rainbow tables are used to store precomputed hash values and their corresponding passwor...
Scanning is the process of systematically examining a network or system for vulnerabilities or potential security threats.
Scanning involves sending network requests to identify open ports, services, and potential vulnerabilities.
It helps in identifying weaknesses in the network or system that can be exploited by attackers.
Scanning can be performed using various tools like Nmap, Nessus, or OpenVAS.
Different types of sca...
Top trending discussions
GIS Analyst
88
salaries
| ₹2.5 L/yr - ₹10 L/yr |
Senior GIS Analyst
42
salaries
| ₹3.8 L/yr - ₹8.5 L/yr |
Software Engineer
32
salaries
| ₹4.4 L/yr - ₹15.4 L/yr |
Senior Software Engineer
23
salaries
| ₹10 L/yr - ₹23.5 L/yr |
System Administrator
13
salaries
| ₹7.5 L/yr - ₹13 L/yr |
Infosys
TCS
Wipro
HCLTech