i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.
Handling escalations involves prompt communication, prioritization, and collaboration with stakeholders.
Acknowledge the escalation and gather all relevant information
Assess the severity and prioritize based on impact
Communicate with stakeholders and provide regular updates
Collaborate with cross-functional teams to resolve the issue
Document the escalation and resolution process for future reference
I was interviewed in Mar 2024.
Onboarding JDBC apps in Sailpoint involves configuring JDBC connectors and creating application definitions.
Configure JDBC connectors in Sailpoint IdentityNow
Create application definitions for the JDBC apps
Map the necessary attributes for provisioning and reconciliation
Test the connectivity and functionality of the JDBC apps
Developing and deploying rules in Sailpoint IDN involves creating custom rules in the IdentityNow platform and deploying them to enforce access controls.
Create custom rules using the IdentityNow Rule Editor
Test the rules in a non-production environment before deploying
Deploy the rules to the production environment to enforce access controls
Monitor and review the effectiveness of the rules regularly
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2023. There were 2 interview rounds.
posted on 16 Jul 2023
I applied via Recruitment Consulltant and was interviewed before Jul 2022. There were 4 interview rounds.
I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.
posted on 24 Nov 2021
I applied via Recruitment Consultant and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.
To make an offline Symantec agent communicate back to SEPM, use a heartbeat mechanism and configure a communication schedule.
Implement a heartbeat mechanism to regularly check the agent's status
Configure the agent to communicate with SEPM at specific intervals
Use a communication schedule to define when the agent should attempt to connect
Ensure the agent has access to necessary network resources and ports
Consider using ...
I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.
Ransomware attacks encrypt files and demand payment for decryption.
Encrypts files and demands payment for decryption
May use social engineering tactics to trick victims into downloading malware
May spread through phishing emails, malicious websites, or infected software
Examples include WannaCry, Petya, and Locky
The port number of SMB is 445.
SMB stands for Server Message Block.
SMB is a protocol used for file sharing and printer sharing.
Port 445 is used for direct TCP/IP connection without NetBIOS.
Port 139 is also used for SMB over NetBIOS.
SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.
The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.
The attack can be carried out using tools like Responder or Metasploit.
The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.
An e...
based on 6 reviews
Rating in categories
Application Developer
11.7k
salaries
| ₹5.5 L/yr - ₹24 L/yr |
Software Engineer
5.5k
salaries
| ₹5.6 L/yr - ₹22.2 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.4 L/yr - ₹26 L/yr |
Senior Software Engineer
4.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Senior Systems Engineer
4.5k
salaries
| ₹5.7 L/yr - ₹20.5 L/yr |
Oracle
TCS
Cognizant
Accenture