Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed before Jul 2021. There was 1 interview round.
I applied via Approached by Company and was interviewed in Mar 2022. There were 2 interview rounds.
SOC stands for Security Operations Center. It is a centralized unit that monitors and manages an organization's security posture.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor the organization's network, systems, and applications.
SOC analysts investigate security alerts and incidents to determine their severity and impact.
They also dev...
posted on 25 Jun 2024
I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.
Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.
Developed by MIT in the 1980s
Uses symmetric key cryptography
Involves a Key Distribution Center (KDC)
Prevents eavesdropping and replay attacks
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.
Client sends a SYN (synchronize) packet to the server to initiate a connection
Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request
Client sends an ACK (acknowledgment) packet back to the server to confirm the connection
TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.
TLS encrypts data to ensure confidentiality during transmission.
It uses cryptographic algorithms to authenticate the parties involved in the communication.
TLS also provides mechanisms for data integrity to prevent tampering.
Handshake process involves negotiation of encryption algorithms and exchange o...
I applied via Job Portal
posted on 22 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.
OS, DBMS, DLD, Networking, and Cryptography
Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.
Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.
Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.
Other types include hashing algorithms like SHA-256 and digital signatures like DSA.
Cr...
I applied via Recruitment Consulltant and was interviewed before Mar 2022. There were 5 interview rounds.
posted on 6 Jan 2023
Time and distance
data interpotation
puzzle
Das
array
tree
map
binary tree
Questions on JavaScript concepts like hoisting, closure, arrays, string manipulation, and connecting dots.
Hoisting refers to the behavior of moving declarations to the top of the scope.
Closures are functions that have access to variables in their outer scope.
Arrays are used to store multiple values in a single variable.
To duplicate a string, use the 'repeat' method or concatenate the string with itself.
To add to a numb...
Two numbers can be manipulated using mathematical operations such as addition, subtraction, multiplication, and division.
Addition: add the two numbers together
Subtraction: subtract one number from the other
Multiplication: multiply the two numbers together
Division: divide one number by the other
Modulo: find the remainder when one number is divided by the other
To multiply two numbers, you can use the multiplication operator (*) in most programming languages.
In Python: num1 * num2
In Java: num1 * num2
In JavaScript: num1 * num2
In C++: num1 * num2
In Ruby: num1 * num2
I applied via Naukri.com and was interviewed before Aug 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Mar 2022. There were 2 interview rounds.
SOC stands for Security Operations Center. It is a centralized unit that monitors and manages an organization's security posture.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor the organization's network, systems, and applications.
SOC analysts investigate security alerts and incidents to determine their severity and impact.
They also dev...
Software Engineer
1.3k
salaries
| ₹20 L/yr - ₹80 L/yr |
Software Developer
772
salaries
| ₹30.7 L/yr - ₹70 L/yr |
Senior Software Engineer
588
salaries
| ₹22 L/yr - ₹94 L/yr |
Sde1
252
salaries
| ₹16 L/yr - ₹64 L/yr |
Data Scientist
232
salaries
| ₹12 L/yr - ₹50 L/yr |
Yahoo
Amazon
Microsoft Corporation