Filter interviews by
I was interviewed in Nov 2024.
Disadvantages of Zscaler proxy include potential latency issues, limited customization options, and reliance on a third-party service.
Potential latency issues due to traffic being routed through Zscaler's servers
Limited customization options compared to on-premises solutions
Reliance on a third-party service for network security, which may raise concerns about data privacy and security
IP Surrogate in Zscaler is a feature that allows users to access the internet using a virtual IP address instead of their actual IP address.
IP Surrogate helps to protect user privacy by masking their real IP address.
It can also help bypass geo-restrictions by appearing to be located in a different region.
Organizations can use IP Surrogate to enhance security and anonymity for their network traffic.
Example: A company us...
posted on 11 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
I applied via Referral and was interviewed in Jul 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
posted on 30 Nov 2024
I was interviewed in Oct 2024.
I was interviewed in Jul 2024.
posted on 22 Feb 2024
OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.
OWASP provides resources such as tools, documentation, and guidelines for web application security.
It publishes a list of the top 10 most critical web application security risks.
OWASP also offers training and conferences to educate professionals on security best practices.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
posted on 16 Jul 2023
I applied via Recruitment Consulltant and was interviewed before Jul 2022. There were 4 interview rounds.
based on 1 interview
Interview experience
Senior Software Engineer
2.8k
salaries
| ₹11 L/yr - ₹42 L/yr |
Software Engineer
1.7k
salaries
| ₹5.2 L/yr - ₹24 L/yr |
Lead Software Engineer
864
salaries
| ₹18 L/yr - ₹50 L/yr |
Senior Systems Engineer
317
salaries
| ₹12 L/yr - ₹38.8 L/yr |
Software Test Automation Engineer
262
salaries
| ₹6 L/yr - ₹20 L/yr |
TCS
Infosys
Wipro
HCLTech