Filter interviews by
I applied via Walk-in and was interviewed in Jul 2023. There were 3 interview rounds.
Maths, reasoning, and it complicated
I applied via Walk-in and was interviewed in Oct 2022. There were 3 interview rounds.
There will be two set of papers one is Quantitative aptitude of 15 marks.
Technical aptitude based on cyber security.
HTTP uses port 80 and HTTPS uses port 443.
HTTP uses port 80 for communication between web servers and clients.
HTTPS uses port 443 for secure communication between web servers and clients.
Port numbers are used to identify specific processes running on a server.
Other common port numbers include 21 for FTP, 22 for SSH, and 25 for SMTP.
A vulnerability is a weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause damage.
Vulnerabilities can exist in software, hardware, or even human behavior.
Examples of vulnerabilities include unpatched software, weak passwords, and social engineering tactics.
Vulnerability assessments and penetration testing can help identify and mitigate vulnerabilities.
Regular updates and p...
A hacker or unauthorized user is someone who gains unauthorized access to a computer system or network.
Hackers can be individuals or groups with malicious intent or those who seek to expose vulnerabilities in a system for ethical reasons.
Unauthorized users can also include employees who abuse their access privileges or individuals who accidentally gain access to a system.
Examples of unauthorized access include phishing...
Top trending discussions
I applied via Campus Placement and was interviewed in Mar 2021. There were 4 interview rounds.
posted on 28 Jul 2021
I applied via Campus Placement and was interviewed before Jul 2020. There was 1 interview round.
Check if binary tree is balanced or not.
A balanced binary tree has the height of left and right subtrees differ by at most 1.
Recursively check the height of left and right subtrees and compare.
Use a helper function to calculate the height of a subtree.
Time complexity: O(nlogn) for a balanced tree, O(n^2) for a skewed tree.
Detect loops in a linked list.
Use two pointers, one moving at a faster pace than the other.
If there is a loop, the faster pointer will eventually catch up to the slower one.
To detect the start of the loop, reset one pointer to the head and move both pointers at the same pace.
I applied via Company Website and was interviewed in Jul 2021. There was 1 interview round.
Complex SQL scenarios and their results
Using subqueries to filter data
Joining multiple tables with complex conditions
Using window functions to calculate running totals
Pivoting data to transform rows into columns
Using recursive queries to traverse hierarchical data
I applied via Walk-in and was interviewed before Mar 2021. There were 3 interview rounds.
Aptitude test
Current affairs
posted on 15 Jul 2022
I applied via Referral and was interviewed before Jul 2021. There were 3 interview rounds.
If you are a fresher , then this is for you else almost no coding test for experienced candidates.
posted on 10 May 2020
I applied via Recruitment Consultant and was interviewed in Apr 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Apr 2021. There were 2 interview rounds.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Information Security Consultant
177
salaries
| ₹2 L/yr - ₹10 L/yr |
Associate Information Security Consultant
117
salaries
| ₹1 L/yr - ₹6.4 L/yr |
Security Consultant
19
salaries
| ₹4 L/yr - ₹8.5 L/yr |
Information Security Analyst
16
salaries
| ₹2.2 L/yr - ₹7.8 L/yr |
Associate Security Consultant
9
salaries
| ₹3.2 L/yr - ₹6.5 L/yr |
Maxgen Technologies
Cyfuture
Value Point Systems
JoulestoWatts Business Solutions