Filter interviews by
I applied via Walk-in and was interviewed in Feb 2023. There were 3 interview rounds.
What ever you want u ask me. Security related queries handling Arms
To make a cocktail, mix alcohol, juice, and other ingredients in a shaker with ice, strain into a glass, and garnish.
Choose your alcohol and mixers based on the type of cocktail you want to make
Measure ingredients carefully to ensure a balanced flavor
Shake or stir the ingredients with ice to chill and mix them
Strain the mixture into a glass and add garnishes like fruit or herbs
Examples: Margarita (tequila, lime juice, ...
Top trending discussions
posted on 4 Jan 2025
I applied via Company Website and was interviewed in Dec 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 3 interview rounds.
Language and knowledge security responsibility duty
English summary and hindi reading test
RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.
RSA is a public-key cryptosystem used for secure data transmission.
It involves generating a public key and a private key for encryption and decryption.
RSA encryption is based on the difficulty of factoring large prime numbers.
It is commonly used in secure communication protocols like HTTPS.
RSA can be used for digital signa
Basic principles of security management involve risk assessment, access control, incident response, and security awareness.
Risk assessment: Identifying and evaluating potential risks to the organization's security.
Access control: Implementing measures to control who has access to sensitive information or resources.
Incident response: Developing plans and procedures to respond to security incidents effectively.
Security a...
I applied via Campus Placement and was interviewed in Jul 2023. There was 1 interview round.
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
I applied via Approached by Company and was interviewed before Oct 2022. There were 3 interview rounds.
They are all application layer protocols used for communication over a network.
They all operate at the application layer of the OSI model.
They all use client-server architecture for communication.
They all transmit data over a network.
Examples: HTTP is used for web browsing, FTP for file transfer, and Telnet for remote access.
My favorite go-to tool for security investigation is Wireshark.
Wireshark is a powerful network protocol analyzer used for troubleshooting, analysis, development, and education.
It allows me to capture and interactively browse the traffic running on a computer network.
I can use Wireshark to analyze network traffic, identify security vulnerabilities, and troubleshoot network issues.
Wireshark supports hundreds of protocols...
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
Experience refers to the knowledge and skills gained through practical involvement in a particular field or activity.
Experience is gained through practical involvement in a particular field or activity
It involves learning from mistakes and successes
Experience helps in developing skills and knowledge
It is an important factor in career growth and success
For example, a security officer with years of experience will have d...
I applied via Naukri.com and was interviewed in Jul 2022. There were 4 interview rounds.
I applied via Walk-in and was interviewed before Jan 2020. There was 1 interview round.
Interview experience
Assistant Pharmacist
4
salaries
| ₹8.5 L/yr - ₹12 L/yr |
Registered Nurse
3
salaries
| ₹5.1 L/yr - ₹14 L/yr |
FIS
Vivo
UST
Hyundai Motor India Limited