Filter interviews by
I applied via Approached by Company and was interviewed before Mar 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.
Ransomware attacks encrypt files and demand payment for decryption.
Encrypts files and demands payment for decryption
May use social engineering tactics to trick victims into downloading malware
May spread through phishing emails, malicious websites, or infected software
Examples include WannaCry, Petya, and Locky
The port number of SMB is 445.
SMB stands for Server Message Block.
SMB is a protocol used for file sharing and printer sharing.
Port 445 is used for direct TCP/IP connection without NetBIOS.
Port 139 is also used for SMB over NetBIOS.
SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.
The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.
The attack can be carried out using tools like Responder or Metasploit.
The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.
An e...
posted on 7 Aug 2021
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
posted on 11 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
based on 2 reviews
Rating in categories
Security Analyst
40
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Information Security Analyst
31
salaries
| ₹2.7 L/yr - ₹10 L/yr |
Senior Network Engineer
19
salaries
| ₹5.2 L/yr - ₹20 L/yr |
Network Engineer
11
salaries
| ₹4 L/yr - ₹8.4 L/yr |
Senior Network Analyst
10
salaries
| ₹4.6 L/yr - ₹11 L/yr |
TCS
Infosys
Wipro
HCLTech