i
Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Jul 2022. There were 4 interview rounds.
Top trending discussions
I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.
Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...
I have extensive experience in network security and have successfully implemented various security measures in my previous roles.
I have a strong background in network security protocols and technologies
I have experience in implementing firewalls, intrusion detection systems, and VPNs
I have successfully managed security incidents and conducted security audits
I have a track record of staying up-to-date with the latest se
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
posted on 4 Oct 2021
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
posted on 11 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Mar 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.
Ransomware attacks encrypt files and demand payment for decryption.
Encrypts files and demands payment for decryption
May use social engineering tactics to trick victims into downloading malware
May spread through phishing emails, malicious websites, or infected software
Examples include WannaCry, Petya, and Locky
The port number of SMB is 445.
SMB stands for Server Message Block.
SMB is a protocol used for file sharing and printer sharing.
Port 445 is used for direct TCP/IP connection without NetBIOS.
Port 139 is also used for SMB over NetBIOS.
SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.
The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.
The attack can be carried out using tools like Responder or Metasploit.
The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.
An e...
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
based on 3 reviews
Rating in categories
Senior Associate
467
salaries
| ₹1.6 L/yr - ₹8 L/yr |
Software Development Senior Analyst
434
salaries
| ₹4.5 L/yr - ₹16 L/yr |
Software Development Analyst
396
salaries
| ₹3.5 L/yr - ₹11.5 L/yr |
Software Development Specialist
322
salaries
| ₹6.8 L/yr - ₹18.5 L/yr |
Software Engineer
301
salaries
| ₹2.8 L/yr - ₹11.3 L/yr |
Accenture
TCS
Infosys
Wipro