Filter interviews by
Top trending discussions
posted on 7 Jan 2025
Code DB Transactions like rollback
posted on 7 Aug 2024
I applied via Approached by Company and was interviewed in Feb 2024. There was 1 interview round.
posted on 12 Nov 2024
I applied via Approached by Company and was interviewed before Nov 2023. There was 1 interview round.
I was interviewed before May 2023.
Aptitude questions need to be clear
2 coding questions need to solve
Zone protection DoS is a feature that protects against DoS attacks by limiting traffic to specific zones, while DoS attack rule is a specific rule that detects and blocks DoS attacks.
Zone protection DoS limits traffic to specific zones to prevent DoS attacks
DoS attack rule detects and blocks DoS attacks based on specific rules
Zone protection DoS is a proactive measure while DoS attack rule is a reactive measure
Zone pro...
DoS zone protection and DoS attack rule are two different methods to prevent DoS attacks.
DoS zone protection is a feature that blocks traffic from a specific IP address or subnet if it exceeds a certain threshold.
DoS attack rule is a security policy that identifies and blocks traffic patterns that are indicative of a DoS attack.
DoS zone protection is a proactive measure that prevents traffic from reaching the target, w...
SP3 architecture is a security architecture designed to protect against malware attacks.
SP3 stands for Security Platform 3
It is a hardware-based security architecture
It is designed to protect against malware attacks by isolating critical system components
It is used in some Intel processors, such as the Intel Core i7
It provides a secure execution environment for sensitive applications
I was interviewed before Mar 2020.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves various technologies, processes, and practices to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and access controls.
Cyber security threats can come from various sources, including hackers, malware, ...
DoS and DDoS are types of cyber attacks. DoS targets a single system, while DDoS targets multiple systems simultaneously.
DoS stands for Denial of Service, where an attacker overwhelms a target system with a flood of traffic or requests.
DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack.
DoS attacks can be carried out by a single attacker using a single device or network.
D...
SQL injection is a type of cyber attack. Splunk is a software platform used for searching, analyzing and visualizing machine-generated data.
SQL injection is a technique where malicious SQL statements are inserted into an entry field to execute unauthorized actions.
Splunk architecture consists of forwarders, indexers, and search heads.
Forwarders collect data from various sources and send it to indexers.
Indexers store an...
Black hat hackers are cyber criminals who exploit vulnerabilities for personal gain, while white hat hackers use their skills for ethical purposes.
Black hat hackers use their skills to steal data, spread malware, and commit other cyber crimes.
White hat hackers are hired by organizations to test their security systems and identify vulnerabilities.
Grey hat hackers fall somewhere in between, using their skills for both et...
Red Hat is a leading provider of open source software solutions, including the popular Red Hat Enterprise Linux operating system.
Red Hat is a software company that specializes in open source solutions.
They are known for their flagship product, Red Hat Enterprise Linux (RHEL).
Red Hat offers a range of software products and services for businesses.
Their solutions focus on security, reliability, and scalability.
Red Hat al...
I applied via Recruitment Consultant and was interviewed before Oct 2020. There was 1 interview round.
based on 1 review
Rating in categories
Security Analyst
110
salaries
| ₹2.4 L/yr - ₹10 L/yr |
Senior Security Analyst
67
salaries
| ₹4.8 L/yr - ₹11.3 L/yr |
Information Security Analyst
58
salaries
| ₹3 L/yr - ₹10.6 L/yr |
Cyber Security Analyst
29
salaries
| ₹2.4 L/yr - ₹8 L/yr |
Software Engineer
25
salaries
| ₹2 L/yr - ₹7.8 L/yr |
QUICK HEAL TECHNOLOGIES
TCS
Wipro
HCLTech