Filter interviews by
I have worked on various software including Salesforce, Microsoft Dynamics, and Oracle CRM.
Salesforce
Microsoft Dynamics
Oracle CRM
Top trending discussions
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .
To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.
Analyze the attack vector to understand how the attack occurred
Contain the attack by isolating affected systems and limiting further damage
Investigate the root cause of the attack to prevent future incidents
Implement necessary se...
To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.
Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks
Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities
Implement security patches provided by soft...
A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.
Honeypots are used to detect and analyze cyber threats in a controlled environment.
They can be deployed within an organization's network to attract and monitor malicious activities.
Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...
I handle security incidents by following established incident response procedures and utilizing various security tools.
Immediately isolate affected systems to prevent further damage
Collect and analyze relevant data to determine the scope and impact of the incident
Contain the incident by blocking malicious activity and removing threats
Communicate with stakeholders to keep them informed of the situation
Document the incid...
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model helps in understanding how data is transmitted over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of OSI layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application la
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a degree in Sociology with a focus on research methods
I have experience conducting surveys and interviews to gather data
I am proficient in data analysis software such as SPSS and Excel
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Basic aptitude topics
Scenario based questions
A SOC analyst's day-to-day activities involve monitoring and analyzing security events, investigating incidents, and responding to threats.
Monitoring security events and alerts from various sources
Analyzing and investigating potential security incidents
Responding to and mitigating security threats
Performing vulnerability assessments and penetration testing
Creating and maintaining security incident reports
Collaborating ...
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
based on 1 interview
Interview experience
SOC Analyst
44
salaries
| ₹0 L/yr - ₹0 L/yr |
Sales Executive
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Soc Analyst 1
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Quality Analyst
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Accounts Manager
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Sentinel Security Services
TCS
Accenture
Wipro