Filter interviews by
Clear (1)
I applied via AmbitionBox and was interviewed in Dec 2022. There were 2 interview rounds.
Public Key Infrastructure (PKI) is a system used to manage digital certificates and public-private key pairs for secure communication.
PKI involves a Certificate Authority (CA) that issues digital certificates to verify the identity of users or devices.
It uses asymmetric encryption where a public key is used for encryption and a private key is used for decryption.
PKI ensures secure communication by enabling encryption, ...
A bastion server is a highly secured server that acts as a gateway between internal network and external network.
Bastion server is used to securely access and manage servers in a private network from an external network.
It is typically placed in a DMZ (demilitarized zone) to provide an additional layer of security.
Access to the bastion server is tightly controlled and monitored to prevent unauthorized access.
It often r...
Top trending discussions
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in May 2023. There were 4 interview rounds.
Assignment in cyber security analyst
Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.
Monitor computer networks for security breaches
Investigate security incidents and provide incident response
Implement security measures to protect against cyber attacks
Conduct security assessments and audits to identify vulnerabilities
Stay up-to-date on the latest cyber threats
posted on 16 Jul 2024
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Helps prevent unauthorized access and cyber attacks
Examples include Cisco ASA, Pal
Some trending security technologies include zero trust security, cloud security, and AI-driven security solutions.
Zero trust security: Focuses on verifying identity and enforcing least privilege access controls.
Cloud security: Addresses security concerns related to cloud computing and storage.
AI-driven security solutions: Utilize artificial intelligence and machine learning to detect and respond to security threats.
Blo...
I applied via LinkedIn and was interviewed before Aug 2023. There was 1 interview round.
I applied via Campus Placement and was interviewed before Nov 2021. There were 3 interview rounds.
It was abasic MBA leven quat and reasoning questions
based on 1 interview
Interview experience
Senior NON Commissioned Officer
239
salaries
| ₹0 L/yr - ₹0 L/yr |
Sergeant
236
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Warrant Officer
227
salaries
| ₹0 L/yr - ₹0 L/yr |
Warrant Officer
109
salaries
| ₹0 L/yr - ₹0 L/yr |
Indian AIR Force
102
salaries
| ₹0 L/yr - ₹0 L/yr |
Indian Army
Indian Navy
Border Security Force
Central Reserve Police Force