Faster and better experience!
i
Filter interviews by
Cross site scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Cross site scripting (XSS) occurs when an attacker injects malicious scripts into web pages viewed by other users.
Lateral movement in an attack scenario involves an attacker moving horizontally across a network to gain access to different systems.
Attackers can use lateral movem...
I applied via Campus Placement
Cant share for confidential reasons
Cant share for confidential reasons sorry
Optiv Security India Private Limited interview questions for popular designations
Nat behavior while accessing Google is to search for information, browse websites, and possibly interact with ads.
Typing search queries in the search bar
Clicking on search results to visit websites
Interacting with ads displayed on the search results page
Cyber attack kill chain is a framework that describes the stages of a successful cyber attack.
The kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
Each stage represents a step in the attacker's process and can be used to identify and prevent attacks.
For example, in the reconnaissance stage, attackers gathe...
Mitre attack is a framework for identifying and categorizing common attack techniques used by adversaries.
Mitre attack provides a standardized way of describing and communicating about cyber threats.
It includes a list of tactics and techniques used by attackers, as well as examples of real-world attacks.
The framework is used by security professionals to assess their organization's security posture and identify areas fo...
I applied via Naukri.com and was interviewed before Jan 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed before Oct 2022. There were 4 interview rounds.
I applied via LinkedIn and was interviewed before May 2022. There were 4 interview rounds.
I am excited to work for your company because of its reputation for innovation and commitment to excellence.
I have researched your company and am impressed by the innovative solutions you provide to clients.
I am excited about the opportunity to work with a team of professionals who are committed to excellence.
I believe that my skills and experience align well with the needs of your organization.
I am looking for a chall...
I faced problems related to data analysis and communication, and I resolved them by improving my skills and seeking feedback.
I struggled with analyzing complex data sets, but I took courses and practiced using software like Excel and Tableau to improve my skills.
I had difficulty communicating technical information to non-technical stakeholders, so I sought feedback and adjusted my approach to be more clear and concise.
...
Service-oriented solutions focus on continuous monitoring and response, while product-oriented solutions rely on implementing security measures through hardware and software.
Service-oriented solutions involve ongoing monitoring of systems and networks to detect and respond to threats in real-time.
Examples of service-oriented solutions include managed security services, threat intelligence platforms, and security inform...
Key man problem in cybersecurity refers to the risk of a single person having too much access or knowledge, making them a single point of failure.
Key man problem arises when a single person has access to critical systems or information
If that person leaves or is unavailable, it can cause significant disruption or security breaches
This can be mitigated by implementing proper access controls and knowledge sharing among t...
Top trending discussions
Interview experience
based on 59 reviews
Rating in categories
3-5 Yrs
₹ 12-15 LPA
4-7 Yrs
₹ 12-20 LPA
4-6 Yrs
₹ 12-15 LPA
Threat Analyst
31
salaries
| ₹6 L/yr - ₹16.8 L/yr |
Security Analyst
19
salaries
| ₹4.5 L/yr - ₹15.1 L/yr |
Senior Engineer
17
salaries
| ₹15 L/yr - ₹24.2 L/yr |
Senior Threat Analyst
15
salaries
| ₹8 L/yr - ₹26 L/yr |
Senior Consultant
13
salaries
| ₹15.7 L/yr - ₹26 L/yr |
NortonLifeLock's
IBM
Accenture
FireEye