i
Giesecke & Devrient
Filter interviews by
Qualys API allows for automated security assessments and reporting, and can be accessed using Python for scripting and automation.
Qualys API provides endpoints for scanning, reporting, asset management, and more.
Python can be used to interact with the Qualys API by sending HTTP requests and handling responses.
Examples of using Qualys API with Python include automating vulnerability scans, retrieving scan reports, and m
I primarily use the following Python libraries: requests, BeautifulSoup, pandas, numpy, scikit-learn, matplotlib.
requests: for making HTTP requests
BeautifulSoup: for web scraping
pandas: for data manipulation and analysis
numpy: for numerical computing
scikit-learn: for machine learning
matplotlib: for data visualization
Top trending discussions
I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.
It was aptitude test with quantitative logical and coding sections
Confidentiality is the most important in CIA according to me.
Confidentiality ensures that sensitive information is protected from unauthorized access.
It involves implementing access controls, encryption, and secure communication channels.
Examples include securing user data, protecting trade secrets, and safeguarding classified information.
Confidentiality is crucial in maintaining trust, privacy, and preventing data bre
I was interviewed before Jun 2023.
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
Natting helps improve security by hiding internal IP addresses from external networks
Example: A company uses NAT to ...
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.
Port numbers for different protocols
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
Steps to take after a phishing attack
Immediately disconnect from the internet
Change all passwords associated with the compromised account
Notify the appropriate parties (IT department, bank, etc.)
Run a virus scan on all devices used to access the compromised account
Educate yourself and others on how to identify and avoid phishing attacks
posted on 6 Apr 2024
I applied via LinkedIn and was interviewed before Apr 2023. There were 3 interview rounds.
Monitoring and analyzing security measures to protect an organization's computer systems and networks
Monitoring security measures to ensure they are effective
Analyzing security breaches to determine the cause and prevent future incidents
Implementing security protocols and procedures
Conducting regular security audits and risk assessments
posted on 22 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
Yes, I have experience in Penetration testing.
I have conducted penetration testing for various clients in different industries.
I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.
I have experience in both manual and automated penetration testing.
I have provided detailed reports on vulnerabilities found and recommendations for remediation.
I stay up-to-date...
Network segmentation can be implemented by creating separate subnetworks and controlling access between them.
Identify the different types of data and systems that need to be protected
Create separate subnetworks for each type of data/system
Use firewalls and access controls to control traffic between subnetworks
Regularly review and update the segmentation strategy
Example: separating guest Wi-Fi network from corporate net
Firewall is a network security system that monitors and controls incoming and outgoing network traffic.
Firewall acts as a barrier between a trusted internal network and untrusted external network
It can be used to block unauthorized access to a network
It can also be used to block outgoing traffic to prevent data leakage
Firewalls can be hardware or software-based
Examples of firewalls include Cisco ASA, Fortinet FortiGate
I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.
It was aptitude test with quantitative logical and coding sections
Confidentiality is the most important in CIA according to me.
Confidentiality ensures that sensitive information is protected from unauthorized access.
It involves implementing access controls, encryption, and secure communication channels.
Examples include securing user data, protecting trade secrets, and safeguarding classified information.
Confidentiality is crucial in maintaining trust, privacy, and preventing data bre
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
The event life cycle of a SIEM solution involves several stages from data collection to incident response.
Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.
Normalization: The collected data is normalized to a common format for easier analysis and correlation.
Aggregation: Events are grouped together based on common attributes to identify patterns and t...
The OSI model is a conceptual framework that defines the functions of a network protocol stack.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
The model helps in understanding how data is transmitted and received in a network.
For example, the Physical layer deals wi...
Interview experience
Software Engineer
100
salaries
| ₹2.9 L/yr - ₹9 L/yr |
Senior Software Engineer
98
salaries
| ₹7.9 L/yr - ₹31 L/yr |
Service Engineer
94
salaries
| ₹1.8 L/yr - ₹4.5 L/yr |
Lead Engineer
80
salaries
| ₹11.5 L/yr - ₹27.5 L/yr |
Assistant Engineer
70
salaries
| ₹1.8 L/yr - ₹4.1 L/yr |
Synechron
Movate
Sopra Steria
NCR Voyix