Filter interviews by
I applied via Recruitment Consulltant and was interviewed in May 2024. There were 2 interview rounds.
Malware are malicious software designed to harm or exploit computer systems. Types include viruses, worms, trojans, ransomware, and spyware. Prevention involves using antivirus software, keeping systems updated, and practicing safe browsing habits.
Types of malware include viruses, worms, trojans, ransomware, and spyware
Prevention methods include using antivirus software, keeping systems updated, and practicing safe bro...
I applied via Indeed and was interviewed in Apr 2024. There were 2 interview rounds.
Aptitude test and gd round
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a background in sociology and psychology, which has equipped me with the necessary skills to analyze social data.
I am proficient in using various research methods and tools to gather and interpret data.
I have experience working on projects that involve studying human behavior and societal norms.
I am a strong ...
I want to join your company because of its reputation for innovation and commitment to employee growth.
I am impressed by the company's track record of developing cutting-edge technologies.
I value the emphasis placed on professional development and growth opportunities for employees.
I believe that my skills and experience align well with the company's goals and values.
Find the first non-repeating character in a string.
Create a frequency map of characters in the string.
Iterate through the string and check the frequency of each character.
Return the first character with frequency 1.
SafeAeon interview questions for popular designations
I have worked on various software including Salesforce, Microsoft Dynamics, and Oracle CRM.
Salesforce
Microsoft Dynamics
Oracle CRM
I was interviewed in Nov 2022.
I applied via campus placement at Punjabi University, Patiala and was interviewed before May 2023. There were 2 interview rounds.
Basic of subjects taught in Bachelor's degree, Cryptography, Cybersecurity, Networking and operating System and English too
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
Layer 1 - Physical: Deals with physical connections and data transmission. Example: Ethernet cables
Layer 2 - Data Link: Manages data transfer between devices on the same network. Example: MAC addresses
Layer 3 - Network: Handles routing and forwarding of data packets. Example: IP addresses
...
Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys - public and private.
Symmetric encryption is faster and more efficient than asymmetric encryption.
Asymmetric encryption provides better security as the private key is never shared.
Examples of symmetric encryption algorithms include AES and DES.
Examples of asymmetric encryption algorithms include RS
Different types of malwares include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.
Viruses: Malicious software that can replicate itself and infect other files.
Worms: Self-replicating malware that spreads across networks.
Trojans: Malware disguised as legitimate software to trick users into installing it.
Ransomware: Malware that encrypts files and demands payment for decryption.
Spyware: Malware that ...
Man-in-the-middle attack is a form of cyber attack where the attacker intercepts communication between two parties without their knowledge.
Attacker intercepts communication between two parties
Attacker can eavesdrop on the communication or alter the messages
Commonly used in public Wi-Fi networks or compromised routers
I applied via Campus Placement and was interviewed in Jun 2022. There were 4 interview rounds.
There were simple aptitude and some technical questions related to computer networks and cybersecurity
Top trending discussions
I was interviewed in Jan 2025.
based on 8 interviews
Interview experience
based on 35 reviews
Rating in categories
SOC Analyst
44
salaries
| ₹4 L/yr - ₹6.1 L/yr |
Sales Executive
5
salaries
| ₹5.3 L/yr - ₹5.9 L/yr |
Soc Analyst 1
5
salaries
| ₹4.2 L/yr - ₹5 L/yr |
Quality Analyst
4
salaries
| ₹4 L/yr - ₹4.7 L/yr |
Accounts Manager
3
salaries
| ₹5.4 L/yr - ₹6.5 L/yr |
Sentinel Security Services
TCS
Accenture
Wipro