i
Sequretek It Solutions
Filter interviews by
I applied via Walk-in and was interviewed in Nov 2023. There were 2 interview rounds.
It was a basic aptitude test with a technical topic essay
VAPT stands for Vulnerability Assessment and Penetration Testing, while Bug Bounty is a program that rewards individuals for finding and reporting bugs in a company's software.
Vulnerability Assessment involves identifying and assessing vulnerabilities in a system or network.
Penetration Testing involves simulating cyber attacks to identify security weaknesses that could be exploited by real attackers.
Bug Bounty programs...
Top trending discussions
posted on 28 Apr 2023
Cryptography is the practice of secure communication in the presence of third parties.
It involves techniques for secure communication and data protection
Uses mathematical algorithms to encrypt and decrypt data
Examples include AES, RSA, and SHA
Cryptography is used in various fields such as finance, military, and healthcare
Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.
Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.
Hashing is irreversible while encryption is reversible.
Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...
posted on 28 Apr 2023
Cryptography is the practice of secure communication in the presence of third parties.
It involves techniques for secure communication and data protection
Uses mathematical algorithms to encrypt and decrypt data
Examples include AES, RSA, and SHA
Cryptography is used in various fields such as finance, military, and healthcare
Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.
Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.
Hashing is irreversible while encryption is reversible.
Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...
posted on 19 Jan 2023
I was interviewed in Dec 2022.
False positives in SIEM
Misconfigured rules triggering alerts
Legitimate traffic being flagged as malicious
Inaccurate threat intelligence data
Inadequate correlation rules
Outdated signatures or patterns
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The goal is to identify and disrupt the attack at an early stage.
For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...
Interview experience
Associate Consultant
215
salaries
| ₹1 L/yr - ₹7.3 L/yr |
Consultant
52
salaries
| ₹3.6 L/yr - ₹12 L/yr |
SOC Analyst
23
salaries
| ₹1.8 L/yr - ₹8.2 L/yr |
Project Manager
21
salaries
| ₹8 L/yr - ₹17.5 L/yr |
Linux Administrator
20
salaries
| ₹3 L/yr - ₹8.5 L/yr |
QUICK HEAL TECHNOLOGIES
Paladion Networks
Kratikal Tech Private Limited
TCS