Filter interviews by
Be the first one to contribute and help others!
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.
RSA is a public-key cryptosystem used for secure data transmission.
It involves generating a public key and a private key for encryption and decryption.
RSA encryption is based on the difficulty of factoring large prime numbers.
It is commonly used in secure communication protocols like HTTPS.
RSA can be used for digital signa
Basic principles of security management involve risk assessment, access control, incident response, and security awareness.
Risk assessment: Identifying and evaluating potential risks to the organization's security.
Access control: Implementing measures to control who has access to sensitive information or resources.
Incident response: Developing plans and procedures to respond to security incidents effectively.
Security a...
I was interviewed in Jul 2024.
posted on 26 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.
STP elects a root bridge to serve as the central point in the network
Each switch determines the best path to the root bridge based on the lowest path cost
Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology
GoodL1 Service Desk Technical Support (JL2A & Jl3A)/Voice+Chat (NO 2B)
European client - WFO/WF client location Pune
24/7 weekly shift roaster/International call handling experience,5 days working.
Trouble shooting lists – VPN, BSOD, Bit locker, MS teams, Password reset, Active directory, Printer, Outlook/webmail/Add ins/PST/DST/, BIOS, Drivers & Installation
Ping command
Difference between service request & incidents.
Aware about the SLA/Metrics handled.
Situational Questions (looking at presence of mind)
I applied via Approached by Company and was interviewed before Oct 2022. There were 3 interview rounds.
They are all application layer protocols used for communication over a network.
They all operate at the application layer of the OSI model.
They all use client-server architecture for communication.
They all transmit data over a network.
Examples: HTTP is used for web browsing, FTP for file transfer, and Telnet for remote access.
My favorite go-to tool for security investigation is Wireshark.
Wireshark is a powerful network protocol analyzer used for troubleshooting, analysis, development, and education.
It allows me to capture and interactively browse the traffic running on a computer network.
I can use Wireshark to analyze network traffic, identify security vulnerabilities, and troubleshoot network issues.
Wireshark supports hundreds of protocols...
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.
Coding test contains 2 questions
I applied via Referral
Teleperformance
FIS
Nagarro
Optum