i
Inspira Enterprise India Limited
Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2022. There were 3 interview rounds.
Basic aptitude test on mercer mettl platform. Limited time.
3 question on splunk.
Private IP addresses are used within a local network, while public IP addresses are used to identify a network on the internet.
Private IP addresses are not unique on the internet and are used within a local network to identify devices.
Public IP addresses are unique on the internet and are used to identify a network on the internet.
Private IP addresses are in the range of 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31...
There are 256 hosts in a class C IP address.
Class C IP addresses have a subnet mask of 255.255.255.0
The first three octets are used for network identification
The last octet is used for host identification
The range of IP addresses in a class C network is from 192.0.0.0 to 223.255.255.255
Each octet has 8 bits, so the last octet can have 2^8 (256) possible values
Vulnerable ports are those that are commonly targeted by attackers to gain unauthorized access to a system.
Port 21 (FTP)
Port 23 (Telnet)
Port 25 (SMTP)
Port 80 (HTTP)
Port 443 (HTTPS)
Port 3389 (Remote Desktop Protocol)
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.
Allows attackers to access sensitive data or execute unauthorized actions
Occurs when user input is not properly sanitized
Can be prevented by using parameterized queries and input validation
Example: Entering ' OR 1=1;--' into a login form to bypass authentication
The most recent vulnerability is the PrintNightmare vulnerability in Windows Print Spooler service.
The vulnerability allows attackers to remotely execute code with system-level privileges.
It affects all versions of Windows and has a CVSS score of 8.8.
Microsoft has released patches for the vulnerability, but some experts suggest disabling the Print Spooler service as a temporary fix.
Top trending discussions
I applied via Naukri.com and was interviewed before Nov 2019. There were 4 interview rounds.
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as S...
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Exam...
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Et
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway setting...
I applied via Naukri.com and was interviewed before Sep 2020. There were 4 interview rounds.
I applied via Recruitment Consultant and was interviewed in Jul 2020. There were 3 interview rounds.
I appeared for an interview in Sep 2017.
posted on 3 Sep 2017
I appeared for an interview in Sep 2017.
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular wait, where each process is waiting for a resource held by another process.
Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Example: Process A holds resource X a...
I have experience with various technologies including Java, Python, HTML/CSS, JavaScript, and SQL.
Java
Python
HTML/CSS
JavaScript
SQL
I am looking for a change to explore new opportunities and challenges. My notice period is 30 days.
Seeking new opportunities and challenges
Want to learn and grow in a different environment
Exploring better career prospects
Seeking a company with a better work-life balance
Notice period is 30 days
posted on 3 Mar 2022
I applied via Campus Placement and was interviewed before Mar 2021. There were 2 interview rounds.
It was easy with basic ques and then pymetrics tesy
Coding test had basic questions on Java core
posted on 20 Apr 2021
I applied via Walk-in and was interviewed before Apr 2020. There were 4 interview rounds.
based on 1 review
Rating in categories
Security Analyst
357
salaries
| ₹3 L/yr - ₹12 L/yr |
Senior Security Analyst
226
salaries
| ₹4.6 L/yr - ₹18.5 L/yr |
Network Engineer
182
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Cyber Security Analyst
130
salaries
| ₹2.8 L/yr - ₹10 L/yr |
SOC Analyst
96
salaries
| ₹3.3 L/yr - ₹10 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland