i
Infosys
Filter interviews by
I applied via Campus Placement and was interviewed in Feb 2021. There were 3 interview rounds.
Information security refers to the practice of protecting digital information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves protecting data in various forms, including electronic and physical.
It includes implementing security measures such as firewalls, encryption, and access controls.
Information security also involves risk management, incident respons...
Information security is a broader term that includes cyber security as a subset.
Information security involves protecting all types of information, including physical and digital.
Cyber security specifically deals with protecting digital information from cyber threats.
Information security includes policies, procedures, and practices to ensure confidentiality, integrity, and availability of information.
Cyber security incl...
What people are saying about Infosys
posted on 20 Dec 2024
I applied via LinkedIn and was interviewed in Nov 2024. There were 2 interview rounds.
WAF stands for Web Application Firewall. It can operate in active or passive mode to protect web applications from attacks.
WAF is a security solution that monitors, filters, and blocks HTTP traffic to and from a web application.
In active mode, WAF actively inspects and filters traffic in real-time, blocking malicious requests before they reach the web application.
In passive mode, WAF monitors traffic but does not activ...
An attack based signature is created by analyzing patterns and behaviors of known attacks to detect and prevent similar attacks in the future.
Identify common patterns and behaviors of known attacks
Create rules or signatures based on these patterns
Regularly update and refine the signatures to adapt to new attack techniques
Client round, Its depend on your profile.
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
I came across a vulnerability in a web application that allowed for SQL injection attacks.
Identified lack of input validation in user inputs
Discovered that the application was directly executing user-supplied SQL queries
Suggested implementing parameterized queries to prevent SQL injection
Tested the vulnerability by attempting to inject SQL code through input fields
It depends on the specific use case and requirements.
TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.
UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.
Choose TCP for applications that require reliable data transmission, such as ...
Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.
Hashing is commonly used in password storage to securely store user passwords without storing the actual password.
Hashing is used in digital signatures to ensure the integrity of the signed data.
Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.
File integrity checks ...
posted on 18 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a comprehensive list of techniques used by attackers to compromise systems.
Techniques are categorized into tactics such as Initial Access, Execution, Persistence, etc.
Examples of techniques include Spearphishing Attachment, Command and Scripting Interpreter, and Registry Run Keys / S
posted on 29 May 2024
I applied via LinkedIn and was interviewed in Apr 2024. There were 2 interview rounds.
Very easy questions.And can be easily answered
posted on 25 Aug 2023
I applied via Naukri.com and was interviewed in Jul 2023. There were 4 interview rounds.
All aptitude related questions they asked like quantity aptitude reasoning English
All coding related questions from C and java language
TCP/IP model is a networking protocol suite that defines how data is transmitted over a network.
Consists of four layers: Application, Transport, Internet, Link
Each layer has specific functions and protocols
Example: TCP operates at the Transport layer, while IP operates at the Internet layer
posted on 16 Oct 2023
I applied via Walk-in and was interviewed in Apr 2023. There were 3 interview rounds.
2+2÷2=3 and for the RAMANUJAM ji for mathematics theorem he gives us most dynamic and excellent way to define time travel also
Team leading nice behavior give party to team member
Project of cloud game
posted on 11 May 2023
based on 11 reviews
Rating in categories
Technology Analyst
56.5k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
49.5k
salaries
| ₹2.8 L/yr - ₹8 L/yr |
System Engineer
38.9k
salaries
| ₹2.5 L/yr - ₹5.4 L/yr |
Technical Lead
30.7k
salaries
| ₹5.2 L/yr - ₹19.4 L/yr |
Senior Associate Consultant
27.1k
salaries
| ₹6.2 L/yr - ₹16.8 L/yr |
TCS
Wipro
Cognizant
Accenture