i
Ingram Micro
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
Yes, I have experience in Penetration testing.
I have conducted penetration testing for various clients in different industries.
I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.
I have experience in both manual and automated penetration testing.
I have provided detailed reports on vulnerabilities found and recommendations for remediation.
I stay up-to-date...
Network segmentation can be implemented by creating separate subnetworks and controlling access between them.
Identify the different types of data and systems that need to be protected
Create separate subnetworks for each type of data/system
Use firewalls and access controls to control traffic between subnetworks
Regularly review and update the segmentation strategy
Example: separating guest Wi-Fi network from corporate net
Firewall is a network security system that monitors and controls incoming and outgoing network traffic.
Firewall acts as a barrier between a trusted internal network and untrusted external network
It can be used to block unauthorized access to a network
It can also be used to block outgoing traffic to prevent data leakage
Firewalls can be hardware or software-based
Examples of firewalls include Cisco ASA, Fortinet FortiGate
Top trending discussions
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
The event life cycle of a SIEM solution involves several stages from data collection to incident response.
Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.
Normalization: The collected data is normalized to a common format for easier analysis and correlation.
Aggregation: Events are grouped together based on common attributes to identify patterns and t...
The OSI model is a conceptual framework that defines the functions of a network protocol stack.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
The model helps in understanding how data is transmitted and received in a network.
For example, the Physical layer deals wi...
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.
Port numbers for different protocols
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
Steps to take after a phishing attack
Immediately disconnect from the internet
Change all passwords associated with the compromised account
Notify the appropriate parties (IT department, bank, etc.)
Run a virus scan on all devices used to access the compromised account
Educate yourself and others on how to identify and avoid phishing attacks
posted on 31 Jan 2023
They test your coding skills how much you can code
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
SOC stands for Security Operations Center, a centralized unit that monitors and defends an organization's IT infrastructure.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor network traffic, logs, and events.
SOC analysts investigate alerts and incidents to determine the scope and impact of the threat.
They also work with other teams to dev...
based on 1 review
Rating in categories
Software Engineer
142
salaries
| ₹3 L/yr - ₹13.3 L/yr |
Senior Software Engineer
124
salaries
| ₹6 L/yr - ₹20 L/yr |
DEP Manager, Sales
103
salaries
| ₹5 L/yr - ₹13 L/yr |
Product Manager
72
salaries
| ₹7.1 L/yr - ₹25 L/yr |
Senior Associate
57
salaries
| ₹3 L/yr - ₹7.3 L/yr |
Tech Data
Redington
Tech Data Corporation
SYNNEX Corporation