Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Aug 2023. There were 3 interview rounds.
General knowledge, General Maths
Change management is the process of planning, implementing, and controlling changes to systems or processes in an organization.
Involves identifying the need for change
Planning and implementing the change
Communicating the change to stakeholders
Managing resistance to change
Evaluating the impact of the change
Service Level Agreement is a contract between a service provider and a customer that outlines the level of service expected.
Defines the services to be provided
Specifies the responsibilities of both parties
Outlines the metrics used to measure performance
Includes penalties for not meeting agreed-upon service levels
Can cover aspects like uptime, response time, and resolution time
Example: An SLA between a cloud service pro
My expectation is to utilize my skills and knowledge to effectively analyze security threats and vulnerabilities, and implement measures to protect the organization's assets.
Expectation to continuously monitor and analyze security threats
Ability to identify vulnerabilities and recommend solutions
Implementing security measures to protect assets
Collaborating with team members to enhance security posture
I am passionate about cybersecurity and believe in the mission and values of your organization.
I have a strong background in cybersecurity and am eager to apply my skills in a challenging environment.
I admire the innovative approach your organization takes towards security and want to be a part of that.
I have heard great things about the team culture and professional development opportunities here.
Top trending discussions
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed in May 2022. There were 5 interview rounds.
Written exam on Scenario based ethical hacking questions and coding.
posted on 30 Sep 2021
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
The phases of site-to-site VPN are the steps involved in establishing and maintaining a secure connection between two networks.
Phase 1: Authentication and key exchange
Phase 2: Data encryption and tunnel establishment
Phase 3: Traffic protection and monitoring
Each phase has its own set of protocols and processes
For example, in Phase 1, the VPN peers authenticate each other using methods like pre-shared keys or digital ce
NAT stands for Network Address Translation. It is a technique used to map a public IP address to a private IP address.
NAT is used to conserve public IP addresses.
It allows multiple devices to share a single public IP address.
NAT can be implemented using hardware or software.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
BGP stands for Border Gateway Protocol, a routing protocol used to exchange routing information between different networks.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that selects the best path for data to travel based on various attributes.
BGP is used by internet service providers (ISPs) to exchange routing information with each other.
It is a complex protocol t...
Senior Engineer
32
salaries
| ₹3.6 L/yr - ₹9.7 L/yr |
Engineer
26
salaries
| ₹3.6 L/yr - ₹7.5 L/yr |
SQL Developer
25
salaries
| ₹2.7 L/yr - ₹5.5 L/yr |
Team Lead
21
salaries
| ₹6.2 L/yr - ₹16.5 L/yr |
Software Developer
15
salaries
| ₹2.4 L/yr - ₹8 L/yr |
TCS
Wipro
Infosys
HCLTech