Filter interviews by
Top trending discussions
Cryptography is the practice and study of techniques for securing information and communication.
Cryptography is used to protect data from unauthorized access.
It involves techniques such as encryption and decryption.
Common encryption algorithms include DES, 3DES, AES, and RC4.
Asymmetric encryption uses different keys for encryption and decryption, while symmetric encryption uses the same key.
Cryptography is essential fo
Burp Suite is a web application security testing tool.
Burp Suite is used for manual and automated testing of web applications.
It includes various tools like a proxy, scanner, intruder, repeater, and sequencer.
The proxy tool allows intercepting and modifying HTTP/S traffic.
The scanner tool automatically identifies vulnerabilities in web applications.
The intruder tool can be used for brute-forcing, fuzzing, and payload t...
Nmap is a powerful network scanning tool used to discover hosts and services on a network.
Nmap can be used to scan specific hosts or entire networks.
It provides various scan types such as TCP, UDP, SYN, etc.
Nmap can detect open ports, running services, and operating systems.
It offers advanced features like OS fingerprinting, version detection, and script scanning.
Example: 'nmap -p 1-1000 -sS 192.168.0.1' scans ports 1
I applied via Walk-in and was interviewed in Aug 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed before Oct 2023. There were 3 interview rounds.
I am a dedicated Information Security Engineer with a strong background in cybersecurity and a passion for protecting data.
Experienced in implementing and managing security measures to protect networks and systems
Skilled in conducting security assessments and identifying vulnerabilities
Proficient in developing and implementing security policies and procedures
Strong knowledge of security tools and technologies such as f...
I have conducted penetration testing on critical infrastructure systems.
Identified vulnerabilities in network infrastructure
Performed penetration testing on industrial control systems
Tested security measures in place for critical infrastructure
Collaborated with IT and engineering teams to address security gaps
I want to join Intel because of their reputation for innovation and cutting-edge technology in the field of information security.
Intel is a leader in the technology industry, known for their advanced hardware and software solutions.
I am impressed by Intel's commitment to research and development, especially in the area of information security.
I believe that working at Intel will provide me with the opportunity to work ...
I applied via campus placement at Haldia Institute of Technology (HIT) and was interviewed before Nov 2023. There were 2 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates w...
I am passionate about cybersecurity and believe in the values and mission of your company.
I have a strong background in cybersecurity with experience in threat detection and prevention.
I am impressed by your company's reputation for innovative security solutions.
I am excited about the opportunity to work with a team of talented professionals in the field.
I believe that my skills and expertise align well with the challe
posted on 12 Jun 2024
I applied via Campus Placement and was interviewed before Jun 2023. There was 1 interview round.
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Authentication precedes authorization in the access control process.
Example: Logging into a system (authentication) ...
Cryptography is the practice and study of techniques for securing information and communication.
Cryptography is used to protect data from unauthorized access.
It involves techniques such as encryption and decryption.
Common encryption algorithms include DES, 3DES, AES, and RC4.
Asymmetric encryption uses different keys for encryption and decryption, while symmetric encryption uses the same key.
Cryptography is essential fo
Interview experience
Senior Engineer
1.2k
salaries
| ₹15.9 L/yr - ₹50 L/yr |
Software Engineer
976
salaries
| ₹10.5 L/yr - ₹40 L/yr |
Engineer
879
salaries
| ₹11.5 L/yr - ₹37 L/yr |
Senior Software Engineer
564
salaries
| ₹16.2 L/yr - ₹49.6 L/yr |
Senior Leader Engineer
425
salaries
| ₹20 L/yr - ₹72 L/yr |
Nvidia
Intel
Mercedes-Benz Research and Development India
Broadcom