Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2023. There was 1 interview round.
Phishing analysis involves examining suspicious emails or websites to identify potential threats.
Check the sender's email address for any inconsistencies or misspellings
Look for urgent language or requests for personal information
Verify the legitimacy of any links by hovering over them before clicking
Check for poor grammar or spelling errors in the email content
Report any suspicious emails to the appropriate IT or secu
It was easy, anyone can crack it
Cryptography is the practice of secure communication in the presence of third parties.
It involves techniques for secure communication and data protection
Uses mathematical algorithms to encrypt and decrypt data
Examples include AES, RSA, and SHA
Cryptography is used in various fields such as finance, military, and healthcare
Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.
Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.
Hashing is irreversible while encryption is reversible.
Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...
I appeared for an interview in Dec 2022.
False positives in SIEM
Misconfigured rules triggering alerts
Legitimate traffic being flagged as malicious
Inaccurate threat intelligence data
Inadequate correlation rules
Outdated signatures or patterns
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The goal is to identify and disrupt the attack at an early stage.
For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...
SISA Information Security interview questions for popular designations
I applied via Approached by Company and was interviewed before May 2023. There were 3 interview rounds.
Verbal reasoning and logical reasoning
Explanation of Linq methods First, FirstOrDefault, Single, SingleOrDefault and converting generic list to non generic type.
First returns the first element of a sequence, throws an exception if sequence is empty.
FirstOrDefault returns the first element of a sequence or default value if sequence is empty.
Single returns the only element of a sequence, throws an exception if sequence has more than one element or is empty.
S...
I applied via Campus Placement and was interviewed before Sep 2019. There were 5 interview rounds.
C is a programming language used to create software and operating systems.
C is a low-level language that allows direct access to computer hardware.
It is used to create efficient and fast programs.
C is the foundation for many other programming languages such as C++, Java, and Python.
Examples of C programs include operating systems, device drivers, and video games.
My hobbies include hiking, photography, and cooking.
Hiking: I enjoy exploring nature trails and challenging myself physically.
Photography: I love capturing beautiful moments and landscapes through my camera lens.
Cooking: I find joy in experimenting with new recipes and creating delicious meals for my friends and family.
posted on 19 Oct 2021
I applied via Naukri.com and was interviewed before Oct 2020. There were 3 interview rounds.
I will use a combination of messaging systems, data replication, and versioning to ensure consistency and availability.
Use messaging systems like Kafka or RabbitMQ to ensure reliable communication between systems
Implement data replication to ensure that data is available on multiple nodes
Use versioning to ensure that all nodes are working with the same data
Implement conflict resolution strategies to handle conflicts th...
posted on 25 Aug 2022
I applied via Campus Placement and was interviewed before Aug 2021. There were 4 interview rounds.
Duration: 1hr
Topics: Array, LinkedList,Stack
Code for insertion in a binary tree
Create a new node with the given data
If the tree is empty, make the new node as root
Else, traverse the tree to find the appropriate position to insert the new node
If the data is less than the current node, go to the left subtree
If the data is greater than the current node, go to the right subtree
Repeat until an appropriate position is found
Set the new node as the child of the appropri
Quick sort is a divide-and-conquer algorithm that sorts an array by partitioning it into two sub-arrays.
Choose a pivot element from the array
Partition the array around the pivot element
Recursively apply quick sort to the left and right sub-arrays
Combine the sorted sub-arrays to get the final sorted array
based on 11 interviews
Interview experience
based on 112 reviews
Rating in categories
Associate Consultant
86
salaries
| ₹3.9 L/yr - ₹15.5 L/yr |
Security Analyst
59
salaries
| ₹2.5 L/yr - ₹8.4 L/yr |
Senior Security Analyst
23
salaries
| ₹4 L/yr - ₹14 L/yr |
Senior Associate Consultant
19
salaries
| ₹7 L/yr - ₹22.5 L/yr |
SOC Analyst
14
salaries
| ₹3 L/yr - ₹6.1 L/yr |
Subex
Innovatiview India Ltd
Watchyourhealth.com
Zeta