Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2022. There were 2 interview rounds.
TSL is a protocol used to secure communication over the internet. Three-way handshake is a method used to establish a connection. Cyber attacks are malicious activities aimed at disrupting or damaging computer systems.
TSL (Transport Layer Security) is a cryptographic protocol used to secure communication over the internet.
Three-way handshake is a method used to establish a connection between two devices. It involves th...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic.
It acts as a barrier between a trusted internal network and an untrusted external network.
It can be hardware, software, or a combination of both.
It can be configured to allow or block specific traffic based on predefined rules.
Examples include Cisco ASA, Fortinet FortiGate, and pfSense.
A proxy server acts as an intermediary between a client and a server, forwarding requests and responses.
It can be used to improve security and privacy by hiding the client's IP address.
It can also be used to bypass content filters or access geographically restricted content.
Examples include Squid, Nginx, and Apache.
Proxy servers can be configured to allow or block certain types of traffic.
Top trending discussions
posted on 6 Mar 2025
I applied via Company Website and was interviewed before Dec 2019. There were 3 interview rounds.
posted on 4 May 2019
I applied via Naukri.com and was interviewed in Oct 2018. There were 3 interview rounds.
posted on 15 Feb 2022
I applied via Campus Placement
In this round you have to clear Aptitude and Basic Coding
It is pure coding test which is conduct on hacker rank platform. You have to complete 4 question(1 easy + 2 medium + 1 hard)
posted on 24 Oct 2023
I applied via Approached by Company and was interviewed before Oct 2022. There were 3 interview rounds.
Find duplicate items in array of strings.
Iterate through array and store each item in a hash set.
If item already exists in hash set, it is a duplicate.
posted on 18 Mar 2025
I appeared for an interview before Mar 2024, where I was asked the following questions.
posted on 25 Aug 2021
posted on 19 Nov 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Check if a number is prime and optimize the code.
Start by checking if the number is less than 2, in which case it is not prime.
Iterate from 2 to the square root of the number and check if any of them divide the number evenly.
If a divisor is found, the number is not prime. Otherwise, it is prime.
To optimise API calls in React, use asynchronous functions and caching techniques.
Use async/await to handle API calls
Implement caching to reduce network requests
Use memoization to avoid unnecessary re-renders
Consider using a state management library like Redux
Use performance profiling tools like React DevTools
based on 1 interview
Interview experience
based on 7 reviews
Rating in categories
Cyber Security Analyst
19
salaries
| ₹2.7 L/yr - ₹4 L/yr |
Security Analyst
18
salaries
| ₹1.9 L/yr - ₹4.4 L/yr |
Network Security Analyst
14
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Junior Analyst
6
salaries
| ₹3 L/yr - ₹3 L/yr |
Information Security Analyst
6
salaries
| ₹2.6 L/yr - ₹3.6 L/yr |
Accel Frontline
Northcorp Software
Elentec Power India (EPI) Pvt. Ltd.
HyScaler