Filter interviews by
I applied via Approached by Company and was interviewed in Mar 2022. There were 2 interview rounds.
SOC stands for Security Operations Center. It is a centralized unit that monitors and manages an organization's security posture.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor the organization's network, systems, and applications.
SOC analysts investigate security alerts and incidents to determine their severity and impact.
They also dev...
Top trending discussions
I applied via Company Website and was interviewed before Jul 2021. There was 1 interview round.
posted on 20 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
posted on 22 Jul 2024
I applied via Job Portal
I applied via Recruitment Consulltant and was interviewed before Mar 2022. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.
Firewall is a security system that filters network traffic based on predetermined security rules.
Gateway is a node that acts as an entry and exit point for data between two networks.
Firewall can be a software program or a hardware device, while gateway is typical...
To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.
Implement firewalls to filter out malicious traffic
Use intrusion detection systems to detect and block suspicious activity
Implement rate limiting to prevent overwhelming the network with excessive requests
posted on 25 Jun 2024
I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.
Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.
Developed by MIT in the 1980s
Uses symmetric key cryptography
Involves a Key Distribution Center (KDC)
Prevents eavesdropping and replay attacks
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.
Client sends a SYN (synchronize) packet to the server to initiate a connection
Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request
Client sends an ACK (acknowledgment) packet back to the server to confirm the connection
TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.
TLS encrypts data to ensure confidentiality during transmission.
It uses cryptographic algorithms to authenticate the parties involved in the communication.
TLS also provides mechanisms for data integrity to prevent tampering.
Handshake process involves negotiation of encryption algorithms and exchange o...
I applied via Naukri.com and was interviewed before Aug 2020. There were 3 interview rounds.
based on 3 reviews
Rating in categories
Technical Support Engineer
923
salaries
| ₹12 L/yr - ₹25 L/yr |
Technical Consultant
324
salaries
| ₹13.8 L/yr - ₹32 L/yr |
Member Technical Staff
270
salaries
| ₹18.8 L/yr - ₹60 L/yr |
Senior Member of Technical Staff
249
salaries
| ₹30 L/yr - ₹100.4 L/yr |
Senior Technical Consultant
229
salaries
| ₹23 L/yr - ₹45 L/yr |
SAP
Zoho
Oracle
Adobe