Filter interviews by
Be the first one to contribute and help others!
I applied via Walk-in and was interviewed in May 2020. There were 4 interview rounds.
posted on 16 Jul 2024
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Helps prevent unauthorized access and cyber attacks
Examples include Cisco ASA, Pal
Some trending security technologies include zero trust security, cloud security, and AI-driven security solutions.
Zero trust security: Focuses on verifying identity and enforcing least privilege access controls.
Cloud security: Addresses security concerns related to cloud computing and storage.
AI-driven security solutions: Utilize artificial intelligence and machine learning to detect and respond to security threats.
Blo...
I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.
EDR stands for Endpoint Detection and Response, a security solution that monitors and responds to endpoint threats.
EDR solutions provide real-time visibility into endpoint activity and behavior.
They use advanced analytics and machine learning to detect and respond to threats.
EDR solutions can also provide forensic analysis to investigate incidents and identify root causes.
Examples of EDR solutions include Carbon Black,...
EDR stands for Endpoint Detection and Response. It is a security solution that monitors and responds to endpoint threats.
EDR solutions use agents installed on endpoints to collect data and send it to a central server for analysis.
They use behavioral analysis and machine learning to detect and respond to threats in real-time.
EDR solutions can also provide forensic data to investigate incidents and improve security postu...
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
I was interviewed before Mar 2021.
There will be one round of coding
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Company Website and was interviewed before Jun 2021. There were 4 interview rounds.
I applied via LinkedIn and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2020. There was 1 interview round.
To create Changes only extra, identify existing changes and add new ones without modifying the existing ones.
Identify existing changes
Add new changes without modifying existing ones
Ensure new changes do not conflict with existing ones
Document all changes made
Secured View and Table are two different ways of presenting data.
Secured View is a restricted view of data that only shows certain information to certain users.
Table is a way of presenting data in a structured format with rows and columns.
Secured View is used to protect sensitive information from unauthorized access.
Table is used to organize and display data in a clear and concise manner.
Secured View can be customized ...
Balance groups can be created by analyzing usage patterns and grouping similar items together.
Analyze usage patterns to identify similar items
Group similar items together to create balance groups
Consider factors such as frequency of use and importance of items in the group
Examples include grouping similar products in a store or grouping tasks by priority in a to-do list
Extract is a process of retrieving data from a source system, while BIP is a tool used for creating and managing reports.
Extract involves pulling data from a source system and storing it in a separate location for analysis or reporting.
BIP is a tool used for creating and managing reports, which can be based on data extracted from a source system.
Extract is typically a one-time process, while BIP can be used to generate...
Senior Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Executive
3
salaries
| ₹0 L/yr - ₹0 L/yr |
KFintech
Link Intime
CAMS
Integrated Registry Management Services