Filter interviews by
I applied via Walk-in and was interviewed in Jul 2023. There were 3 interview rounds.
Maths, reasoning, and it complicated
I applied via Walk-in and was interviewed in Oct 2022. There were 3 interview rounds.
There will be two set of papers one is Quantitative aptitude of 15 marks.
Technical aptitude based on cyber security.
HTTP uses port 80 and HTTPS uses port 443.
HTTP uses port 80 for communication between web servers and clients.
HTTPS uses port 443 for secure communication between web servers and clients.
Port numbers are used to identify specific processes running on a server.
Other common port numbers include 21 for FTP, 22 for SSH, and 25 for SMTP.
A vulnerability is a weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause damage.
Vulnerabilities can exist in software, hardware, or even human behavior.
Examples of vulnerabilities include unpatched software, weak passwords, and social engineering tactics.
Vulnerability assessments and penetration testing can help identify and mitigate vulnerabilities.
Regular updates and p...
A hacker or unauthorized user is someone who gains unauthorized access to a computer system or network.
Hackers can be individuals or groups with malicious intent or those who seek to expose vulnerabilities in a system for ethical reasons.
Unauthorized users can also include employees who abuse their access privileges or individuals who accidentally gain access to a system.
Examples of unauthorized access include phishing...
Top trending discussions
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Information Security Consultant
154
salaries
| ₹1 L/yr - ₹9.5 L/yr |
Associate Information Security Consultant
113
salaries
| ₹1.4 L/yr - ₹6.5 L/yr |
Security Consultant
19
salaries
| ₹4 L/yr - ₹8.5 L/yr |
Information Security Analyst
15
salaries
| ₹2.2 L/yr - ₹8.1 L/yr |
Senior Information Security Consultant
9
salaries
| ₹6 L/yr - ₹13.5 L/yr |
TCS
Infosys
Wipro
HCLTech