Filter interviews by
I was interviewed before Jan 2016.
I am a cyber security professional with expertise in network security and threat analysis.
I have experience in implementing and managing firewalls, intrusion detection systems, and other security measures.
I am skilled in conducting vulnerability assessments and penetration testing to identify potential security risks.
I stay up-to-date with the latest security trends and technologies to ensure the highest level of prote...
I can work on domains such as network security, application security, cloud security, and incident response.
Network security - securing network infrastructure, firewalls, VPNs, etc.
Application security - securing web and mobile applications, code review, etc.
Cloud security - securing cloud infrastructure, data protection, etc.
Incident response - responding to security incidents, investigating and mitigating threats, et
I implemented multiple authentication measures in my projects to ensure secure access.
Implemented password-based authentication with strong password policies
Utilized two-factor authentication for an added layer of security
Implemented biometric authentication using fingerprint or facial recognition
Used multi-factor authentication to combine multiple authentication methods
Implemented single sign-on (SSO) for seamless and...
Firewalls and application gateways are both security measures used to protect networks, but they differ in their approach.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Application gateways, also known as application-level gateways or application layer firewalls, operate at the application layer of the OSI model and can inspect...
HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP that encrypts data sent between a website and a user's browser.
HTTPS uses SSL/TLS encryption to protect data
It ensures that the website being accessed is authentic
It prevents eavesdropping and tampering of data
It is indicated by a padlock icon in the browser's address bar
Examples of websites that use HTTPS include banking sites, e-comme
Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.
Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.
Kill Chain helps organizations understand and defend against cyber attacks, whil...
Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.
Monitor computer networks for security breaches
Investigate security incidents and provide incident response
Implement security measures to protect against cyber attacks
Conduct security assessments and audits to identify vulnerabilities
Stay up-to-date on the latest cyber threats
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
Cloud is a virtual space that allows users to store, manage, and access data and applications remotely.
Cloud is a virtualized infrastructure that provides on-demand access to computing resources.
It allows users to store and access data and applications remotely over the internet.
Cloud services are typically categorized into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a...
DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.
DevOps is a cultural shift that promotes collaboration and communication between software developers and IT operations.
It aims to automate and streamline the software delivery process, from development to deployment and maintenance.
DevOps emphasizes continuous integration, continuous delivery...
CI/CD stands for Continuous Integration/Continuous Deployment. It is a DevOps practice that involves automating the process of building, testing, and deploying software.
CI/CD is a software development approach that aims to deliver code changes more frequently and reliably.
Continuous Integration involves merging code changes into a shared repository and running automated tests to detect integration issues early.
Continuo...
Implementing security in the cloud involves various measures to protect data and systems from cyber threats.
Use strong authentication and access controls to prevent unauthorized access
Encrypt data both in transit and at rest to ensure confidentiality
Implement network security measures like firewalls and intrusion detection systems
Regularly update and patch software to address vulnerabilities
Monitor and log activities t...
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
posted on 18 Jan 2022
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
Data Processing Analyst
694
salaries
| ₹3 L/yr - ₹4.7 L/yr |
Data Analyst
422
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
Data Processing Specialist
317
salaries
| ₹3 L/yr - ₹4.6 L/yr |
Software Engineer
227
salaries
| ₹8.8 L/yr - ₹21.7 L/yr |
Research Associate
179
salaries
| ₹2.9 L/yr - ₹5.5 L/yr |
Kantar
GfK MODE
Dun & Bradstreet
Euromonitor International