i
Diamondpick
Filter interviews by
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers to provide end-to-end commun...
Top trending discussions
I applied via Walk-in and was interviewed before Nov 2022. There were 5 interview rounds.
I work good work in that company
posted on 24 Jul 2022
I applied via Approached by Company and was interviewed before Jul 2021. There were 3 interview rounds.
Basic terminologies in cyber security
Malware
Phishing
Firewall
Encryption
Vulnerability
Patch
Intrusion Detection System
Social Engineering
Two-Factor Authentication
The OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application
Each layer has a specific function and communicates with adjacent layers
The model helps ensure interoperability between different network devices and software
Example: HTTP operates at the Appli...
HTTP is unencrypted while HTTPS is encrypted. HTTPS provides secure communication over the internet.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure
HTTP is vulnerable to attacks like man-in-the-middle while HTTPS is secure
HTTPS uses SSL/TLS certificates to encrypt data while HTTP does not
HTTPS is used for secure online transactions like online banking, e-commerce, et...
The OWASP Top 10 is a list of the most critical web application security risks.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
Common cyber attacks include phishing, malware, ransomware, DDoS, and social engineering.
Phishing: fraudulent emails or websites that trick users into giving sensitive information
Malware: malicious software that can damage or control a computer system
Ransomware: malware that encrypts files and demands payment for their release
DDoS: Distributed Denial of Service attacks overwhelm a website or network with traffic
Social ...
Mitigating common cyber attacks involves implementing strong passwords, regular software updates, and employee training.
Use strong passwords and two-factor authentication
Regularly update software and operating systems
Train employees on how to identify and avoid phishing scams
Implement firewalls and antivirus software
Limit access to sensitive data and regularly backup important files
I applied via Naukri.com and was interviewed before Feb 2021. There were 3 interview rounds.
I applied via LinkedIn and was interviewed before Aug 2021. There were 2 interview rounds.
I was interviewed in Jan 2025.
Power project work& infra
I applied via Referral and was interviewed before Mar 2021. There was 1 interview round.
Exception with responsibility refers to handling unexpected situations while still being accountable for the outcome.
Acknowledge the issue and take ownership of finding a solution
Communicate effectively with stakeholders about the situation
Learn from the experience to prevent similar issues in the future
posted on 13 Jan 2024
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
About the designation and management.
Coding structure using GET,PUT,POST,DELETE etc.
I applied via Referral and was interviewed before Mar 2023. There was 1 interview round.
based on 1 interview
Interview experience
Information Technology Recruiter
134
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Executive
109
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Recruitment Executive
95
salaries
| ₹0 L/yr - ₹0 L/yr |
US IT Recruiter
89
salaries
| ₹0 L/yr - ₹0 L/yr |
Recruitment Executive
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lease
Innovsource Services
IMPACT Infotech
Teamware Solutions