i
Sequretek It Solutions
Filter interviews by
DNS port number is 53.
DNS port number is used for DNS queries and responses.
It is a well-known port number, which is 53.
DNS uses both TCP and UDP protocols on port 53.
SSH port number is 22.
SSH port number is used for secure communication over a network.
Default port number for SSH is 22.
Port number can be changed for security reasons.
Example: ssh user@hostname -p 2222
A brute force attack is a trial-and-error method used by hackers to crack passwords or encryption by systematically trying all possible combinations.
Brute force attacks are time-consuming but effective against weak passwords.
Hackers use automated tools to try all possible combinations until the correct one is found.
Examples include trying all possible 4-digit PIN codes or dictionary words as passwords.
Strong passwords ...
I applied via Naukri.com and was interviewed in Dec 2023. There were 3 interview rounds.
Mathematics and grammar
I applied via Walk-in and was interviewed in Nov 2023. There were 2 interview rounds.
It was a basic aptitude test with a technical topic essay
VAPT stands for Vulnerability Assessment and Penetration Testing, while Bug Bounty is a program that rewards individuals for finding and reporting bugs in a company's software.
Vulnerability Assessment involves identifying and assessing vulnerabilities in a system or network.
Penetration Testing involves simulating cyber attacks to identify security weaknesses that could be exploited by real attackers.
Bug Bounty programs...
Sequretek It Solutions interview questions for popular designations
LVM stands for Logical Volume Manager, a tool used to manage storage in Linux by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without downtime.
It provides features like snapshots, striping, mirroring, and thin provisioning.
Physical volumes are divided into physical extents, which are then grouped into volume groups.
Logical volumes are created from volume groups and c...
I applied via AmbitionBox and was interviewed in Dec 2022. There were 4 interview rounds.
Basic grammer, maths questions,
I am a software engineer with experience in developing and maintaining software applications.
Proficient in programming languages such as Java, C++, and Python
Experience in developing web applications using frameworks like Spring and Django
Strong problem-solving and analytical skills
Familiarity with version control systems like Git
Ability to work in a team and collaborate effectively
I am open to discussing salary based on the responsibilities and requirements of the position.
I am flexible and open to negotiation.
I am looking for a competitive salary based on my skills and experience.
I am interested in discussing the overall compensation package, including benefits and bonuses.
I am open to considering other forms of compensation, such as stock options or profit sharing.
I would like to learn more ab...
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
I was asked to write a program in C++ related to linked list and sorting algorithm
The question covers topics like C vs C++, OOPS concept, virtual mechanism, multi-threading, and security products.
C is a procedural programming language, while C++ is an extension of C with added features like classes and objects.
OOPS (Object-Oriented Programming) is a programming paradigm that focuses on objects and their interactions.
Virtual mechanism allows a derived class to override the implementation of a method ...
OOPS (Object-Oriented Programming) is a programming paradigm that uses objects to represent real-world entities and their interactions.
OOPS focuses on the concept of objects, which are instances of classes.
It emphasizes encapsulation, inheritance, and polymorphism.
Encapsulation ensures that data and methods are bundled together within an object.
Inheritance allows classes to inherit properties and behaviors from other c...
Virtual Mechanism is a technology that simulates real-world experiences or processes using computer-generated environments.
Virtual Mechanism uses computer-generated environments to replicate real-world experiences.
It typically involves the use of virtual reality (VR) or augmented reality (AR) technologies.
Virtual Mechanism can be used in various fields such as gaming, training, education, and simulations.
Examples inclu...
Security software protects computer systems and data from unauthorized access and threats.
Security software uses various techniques such as encryption, firewalls, and antivirus programs to safeguard computer systems.
It monitors network traffic and detects and blocks any suspicious or malicious activities.
Security software regularly updates its databases to stay up-to-date with the latest threats and vulnerabilities.
It ...
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
To troubleshoot a server or application outage, I would follow a systematic approach to identify and resolve the issue.
Check server logs for any error messages or warnings
Verify network connectivity and firewall settings
Check hardware components such as power supply, RAM, and hard drive
Restart services or reboot the server if necessary
If the issue persists, escalate to higher level support or vendor for assistance
For p...
I applied via Referral and was interviewed before Jan 2024. There were 3 interview rounds.
They gave us to write a short aptitude
Top trending discussions
I applied via Company Website and was interviewed in Oct 2024. There were 3 interview rounds.
Interview experience
based on 140 reviews
Rating in categories
Associate Consultant
204
salaries
| â‚ą1 L/yr - â‚ą7.3 L/yr |
Consultant
55
salaries
| â‚ą3.6 L/yr - â‚ą12 L/yr |
SOC Analyst
21
salaries
| â‚ą1.8 L/yr - â‚ą7.5 L/yr |
Linux Administrator
20
salaries
| â‚ą3 L/yr - â‚ą8.5 L/yr |
Project Manager
20
salaries
| â‚ą8 L/yr - â‚ą17.5 L/yr |
QUICK HEAL TECHNOLOGIES
Paladion Networks
Kratikal Tech Private Limited
TCS