Filter interviews by
Aptitude test and gd round
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a background in sociology and psychology, which has equipped me with the necessary skills to analyze social data.
I am proficient in using various research methods and tools to gather and interpret data.
I have experience working on projects that involve studying human behavior and societal norms.
I am a strong ...
I want to join your company because of its reputation for innovation and commitment to employee growth.
I am impressed by the company's track record of developing cutting-edge technologies.
I value the emphasis placed on professional development and growth opportunities for employees.
I believe that my skills and experience align well with the company's goals and values.
Find the first non-repeating character in a string.
Create a frequency map of characters in the string.
Iterate through the string and check the frequency of each character.
Return the first character with frequency 1.
I appeared for an interview in Nov 2022.
I applied via Campus Placement and was interviewed in Jun 2022. There were 4 interview rounds.
There were simple aptitude and some technical questions related to computer networks and cybersecurity
SafeAeon interview questions for designations
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
CIA stands for Confidentiality, Integrity, and Availability. Splunk and IBM QRadar are both security information and event management (SIEM) tools.
CIA is a security model that focuses on protecting information by ensuring its confidentiality, integrity, and availability.
Splunk is a SIEM tool that collects, indexes, and analyzes machine data to provide insights into security events and threats.
IBM QRadar is another SIEM...
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
Logical reasoning and verbal ability.
I appeared for an interview in Feb 2025.
AAA in cybersecurity stands for Authentication, Authorization, and Accounting, crucial for securing systems.
Authentication verifies user identity (e.g., passwords, biometrics).
Authorization determines user permissions (e.g., access to files).
Accounting tracks user activities (e.g., logging access times).
Example: A user logs in (Authentication), accesses a file (Authorization), and their actions are logged (Accounting).
IDS detects intrusions, while IPS actively prevents them, enhancing network security.
IDS (Intrusion Detection System) monitors network traffic for suspicious activity.
IPS (Intrusion Prevention System) not only detects but also blocks potential threats.
Example of IDS: Snort, which analyzes traffic and alerts administrators.
Example of IPS: Cisco Firepower, which can block malicious traffic in real-time.
IDS is typically p...
I enjoy hiking, reading, and photography, which help me relax and explore my creativity.
Hiking: I love exploring nature trails and discovering new landscapes, often going on weekend hikes with friends.
Reading: I read a variety of genres, from fiction to non-fiction, and recently finished a book on cybersecurity.
Photography: I enjoy capturing moments during my hikes, focusing on landscapes and wildlife, and I often shar
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a degree in Sociology with a focus on research methods
I have experience conducting surveys and interviews to gather data
I am proficient in data analysis software such as SPSS and Excel
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
based on 3 interviews
Interview experience
based on 6 reviews
Rating in categories
SOC Analyst
48
salaries
| ₹4 L/yr - ₹6 L/yr |
Sales Executive
5
salaries
| ₹5.3 L/yr - ₹5.9 L/yr |
Soc Analyst 1
5
salaries
| ₹4.2 L/yr - ₹5 L/yr |
Quality Analyst
4
salaries
| ₹4 L/yr - ₹4.7 L/yr |
Accounts Manager
3
salaries
| ₹5.4 L/yr - ₹6.5 L/yr |
TCS
Accenture
Wipro
Cognizant