Filter interviews by
Be the first one to contribute and help others!
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.
SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.
Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...
I applied via Referral and was interviewed in Jul 2024. There was 1 interview round.
posted on 26 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.
STP elects a root bridge to serve as the central point in the network
Each switch determines the best path to the root bridge based on the lowest path cost
Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology
OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.
OWASP provides resources such as tools, documentation, and guidelines for web application security.
It publishes a list of the top 10 most critical web application security risks.
OWASP also offers training and conferences to educate professionals on security best practices.
I applied via Referral
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.
SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.
Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...
RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.
RSA is a public-key cryptosystem used for secure data transmission.
It involves generating a public key and a private key for encryption and decryption.
RSA encryption is based on the difficulty of factoring large prime numbers.
It is commonly used in secure communication protocols like HTTPS.
RSA can be used for digital signa
Basic principles of security management involve risk assessment, access control, incident response, and security awareness.
Risk assessment: Identifying and evaluating potential risks to the organization's security.
Access control: Implementing measures to control who has access to sensitive information or resources.
Incident response: Developing plans and procedures to respond to security incidents effectively.
Security a...
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
Teleperformance
FIS
Nagarro
Optum