Filter interviews by
I applied via Approached by Company and was interviewed before Mar 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
posted on 22 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.
OS, DBMS, DLD, Networking, and Cryptography
Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.
Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.
Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.
Other types include hashing algorithms like SHA-256 and digital signatures like DSA.
Cr...
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
Basic aptitude test at a moderate level
Understand the coding proficiency of the candidate
I applied via campus placement at Uttar Pradesh Technical University (UPTU) and was interviewed in Aug 2021. There were 3 interview rounds.
A virus is a self-replicating program that spreads by infecting other programs, while a Trojan is a program that appears harmless but actually has malicious intent.
Viruses attach themselves to clean files and spread when the infected file is executed.
Trojans are often disguised as legitimate software and trick users into installing them.
Viruses can cause damage to files and systems, while Trojans can steal data or give...
Interview experience
based on 2 reviews
Rating in categories
Security Analyst
40
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Information Security Analyst
31
salaries
| ₹2.7 L/yr - ₹10 L/yr |
Senior Network Engineer
19
salaries
| ₹5.2 L/yr - ₹20 L/yr |
Network Engineer
11
salaries
| ₹4 L/yr - ₹8.4 L/yr |
Senior Network Analyst
10
salaries
| ₹4.6 L/yr - ₹11 L/yr |
TCS
Infosys
Wipro
HCLTech