i
NTT Data
Filter interviews by
I applied via Naukri.com and was interviewed before Mar 2023. There was 1 interview round.
SIEM architecture involves collecting, correlating, and analyzing security data from various sources to detect and respond to threats.
SIEM collects logs and events from network devices, servers, applications, and security tools.
It correlates and analyzes the data to identify patterns and anomalies that may indicate security incidents.
SIEM provides real-time monitoring, alerting, and reporting capabilities to help secur...
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 2 interview rounds.
All the technical question.
Top trending discussions
I applied via Naukri.com and was interviewed in Sep 2022. There were 2 interview rounds.
The OSI model is a conceptual framework that defines the communication functions of a telecommunication or computing system.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the adjacent layers.
The model helps in understanding how data is transmitted over a network.
Example:...
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
I came across a vulnerability in a web application that allowed for SQL injection attacks.
Identified lack of input validation in user inputs
Discovered that the application was directly executing user-supplied SQL queries
Suggested implementing parameterized queries to prevent SQL injection
Tested the vulnerability by attempting to inject SQL code through input fields
It depends on the specific use case and requirements.
TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.
UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.
Choose TCP for applications that require reliable data transmission, such as ...
Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.
Hashing is commonly used in password storage to securely store user passwords without storing the actual password.
Hashing is used in digital signatures to ensure the integrity of the signed data.
Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.
File integrity checks ...
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
based on 2 reviews
Rating in categories
Software Engineer
932
salaries
| ₹2.8 L/yr - ₹11 L/yr |
Senior Associate
766
salaries
| ₹1.1 L/yr - ₹7.3 L/yr |
Network Engineer
647
salaries
| ₹1.8 L/yr - ₹10 L/yr |
Software Developer
615
salaries
| ₹2.5 L/yr - ₹13 L/yr |
Senior Software Engineer
512
salaries
| ₹6.5 L/yr - ₹24 L/yr |
Tata Communications
Bharti Airtel
Reliance Communications
Vodafone Idea