i
SecurView Systems
Filter interviews by
I applied via Referral and was interviewed in Jul 2024. There was 1 interview round.
I have over 10 years of experience in network security engineering, including designing and implementing secure networks.
10+ years of experience in network security engineering
Expertise in designing and implementing secure networks
Strong knowledge of firewalls, intrusion detection systems, and VPNs
Experience with network monitoring and incident response
Certifications such as CISSP or CCNP Security
Seeking new challenges and opportunities for growth in a different environment.
Looking for new challenges and opportunities for professional growth
Interested in working with cutting-edge technology or in a different industry
Seeking better work-life balance or career advancement
Company restructuring or changes in management impacting job stability
I applied via Job Portal
Reverse string in python program
Tuple list difference compares two lists of tuples and returns the elements that are unique to each list. Set frozenset difference compares two sets or frozensets and returns the elements that are unique to each set.
Tuple list difference: Use set operations like set() and symmetric_difference() to find unique elements in two lists of tuples.
Example: list1 = [(1, 2), (3, 4)], list2 = [(3, 4), (5, 6)]. Difference: [(1, 2...
I applied via Naukri.com and was interviewed before Apr 2023. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
Objective questions on Core Java. Questions were on functions in Java Library, output from a given code etc.
SecurView Systems interview questions for popular designations
HTTP smuggling is a technique used to bypass security measures by manipulating the way HTTP requests are interpreted by intermediaries.
HTTP smuggling involves sending specially crafted HTTP requests that can be interpreted differently by different components in the communication chain
It can be used to bypass firewalls, web application firewalls, and other security measures
One example of HTTP smuggling is HTTP request s...
SSRF is a server-side attack that allows an attacker to make requests from the server. CSRF is a client-side attack that tricks a user into performing an action on a website.
SSRF stands for Server-Side Request Forgery
It allows an attacker to send requests from the server to other servers
This can be used to access internal systems or perform actions on behalf of the server
CSRF stands for Cross-Site Request Forgery
It tri...
I applied via Referral and was interviewed before May 2023. There was 1 interview round.
Proxies can be deployed as forward, reverse, open, or closed proxies in a network.
Forward proxies are used by clients to access resources on the internet.
Reverse proxies are used by servers to provide access to resources on the internet.
Open proxies allow any internet user to connect through them.
Closed proxies restrict access to a specific group of users or IP addresses.
I was interviewed before Feb 2023.
I applied via Approached by Company and was interviewed in Sep 2021. There was 1 interview round.
Top trending discussions
based on 9 interviews
Interview experience
based on 65 reviews
Rating in categories
Security Consultant
92
salaries
| ₹5.1 L/yr - ₹18.5 L/yr |
Security Engineer
78
salaries
| ₹2.8 L/yr - ₹9 L/yr |
Associate Security Consultant
40
salaries
| ₹2.3 L/yr - ₹10 L/yr |
Security Analyst
39
salaries
| ₹3.5 L/yr - ₹10.2 L/yr |
Senior Security Engineer
34
salaries
| ₹4.2 L/yr - ₹12 L/yr |
Honeywell International India
Bosch Security Systems
Johnson Controls
Axis Communications