i
LTIMindtree
Filter interviews by
Clear (1)
I applied via Indeed and was interviewed in May 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jan 2021. There were 4 interview rounds.
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.
Symmetric encryption is faster and more efficient than asymmetric encryption.
Examples of symmetric encryption algorithms include AES and DES.
Asymmetric encryption is more secure as it uses a public key for encryption and a private key for decryption.
Examples of asymmetric encryption algorithms incl
TLS is the successor of SSL protocol, providing more secure communication over the internet.
TLS is the newer version of SSL.
TLS uses stronger encryption algorithms.
TLS supports more secure cipher suites.
TLS provides better authentication and key exchange mechanisms.
TLS is backward compatible with SSL, but SSL is not forward compatible with TLS.
Educating users about cybersecurity attacks is crucial for their protection.
Conduct regular cybersecurity awareness training sessions
Provide clear and concise guidelines on safe online practices
Share real-life examples of cyber attacks and their consequences
Encourage the use of strong and unique passwords
Promote the use of multi-factor authentication
Teach users how to identify phishing emails and suspicious links
Advise...
There are various types of attacks, including malware, phishing, DDoS, ransomware, and social engineering.
Malware attacks involve malicious software that can harm or exploit systems.
Phishing attacks aim to trick individuals into revealing sensitive information.
DDoS attacks overwhelm a network or website with excessive traffic, causing it to become unavailable.
Ransomware attacks encrypt files or systems and demand a ran...
Hash values can be used to determine if a file or data is malicious or not.
Hash values are unique identifiers generated from the content of a file or data.
Malicious files or data often have known hash values that can be used for detection.
Comparing hash values of files or data with known malicious hash values can help identify threats.
Hash values can be used in antivirus software, threat intelligence databases, and sec...
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
I appeared for an interview before Jun 2016.
I applied via Naukri.com and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Recruitment Consultant and was interviewed before Jun 2020. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Mar 2020. There were 4 interview rounds.
based on 10 reviews
Rating in categories
Senior Software Engineer
21.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
16.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
6.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Module Lead
5.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
4.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Cognizant
Capgemini
Accenture
TCS