Filter interviews by
I was interviewed before Feb 2023.
Gray box testing is a combination of black box and white box testing, where the tester has limited knowledge of the system.
Gray box testing involves having partial knowledge of the internal workings of the system being tested.
Testers use a combination of black box and white box techniques to identify vulnerabilities.
Gray box testing can be used to simulate an attacker with limited knowledge of the system.
Examples of gr...
Top trending discussions
I applied via Approached by Company and was interviewed in Mar 2022. There were 2 interview rounds.
SOC stands for Security Operations Center. It is a centralized unit that monitors and manages an organization's security posture.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor the organization's network, systems, and applications.
SOC analysts investigate security alerts and incidents to determine their severity and impact.
They also dev...
I applied via Company Website and was interviewed before Jul 2021. There was 1 interview round.
posted on 20 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
I applied via Job Portal
posted on 19 Apr 2022
I applied via Recruitment Consulltant and was interviewed before Mar 2022. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.
Firewall is a security system that filters network traffic based on predetermined security rules.
Gateway is a node that acts as an entry and exit point for data between two networks.
Firewall can be a software program or a hardware device, while gateway is typical...
To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.
Implement firewalls to filter out malicious traffic
Use intrusion detection systems to detect and block suspicious activity
Implement rate limiting to prevent overwhelming the network with excessive requests
posted on 25 Jun 2024
I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.
Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.
Developed by MIT in the 1980s
Uses symmetric key cryptography
Involves a Key Distribution Center (KDC)
Prevents eavesdropping and replay attacks
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.
Client sends a SYN (synchronize) packet to the server to initiate a connection
Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request
Client sends an ACK (acknowledgment) packet back to the server to confirm the connection
TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.
TLS encrypts data to ensure confidentiality during transmission.
It uses cryptographic algorithms to authenticate the parties involved in the communication.
TLS also provides mechanisms for data integrity to prevent tampering.
Handshake process involves negotiation of encryption algorithms and exchange o...
Interview experience
Cyber Security Consultant
19
salaries
| ₹2.6 L/yr - ₹5.5 L/yr |
Senior Cyber Security Consultant
9
salaries
| ₹4.8 L/yr - ₹7 L/yr |
Security Consultant
9
salaries
| ₹4 L/yr - ₹6 L/yr |
Senior Consultant
7
salaries
| ₹5 L/yr - ₹9 L/yr |
Software Developer
5
salaries
| ₹2.7 L/yr - ₹3.5 L/yr |
TCS
Infosys
Wipro
HCLTech