i
Softtek
Filter interviews by
I applied via Referral and was interviewed before Feb 2022. There were 4 interview rounds.
I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.
It was aptitude test with quantitative logical and coding sections
Confidentiality is the most important in CIA according to me.
Confidentiality ensures that sensitive information is protected from unauthorized access.
It involves implementing access controls, encryption, and secure communication channels.
Examples include securing user data, protecting trade secrets, and safeguarding classified information.
Confidentiality is crucial in maintaining trust, privacy, and preventing data bre
I was interviewed before Jun 2023.
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
Natting helps improve security by hiding internal IP addresses from external networks
Example: A company uses NAT to ...
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.
It was aptitude test with quantitative logical and coding sections
Confidentiality is the most important in CIA according to me.
Confidentiality ensures that sensitive information is protected from unauthorized access.
It involves implementing access controls, encryption, and secure communication channels.
Examples include securing user data, protecting trade secrets, and safeguarding classified information.
Confidentiality is crucial in maintaining trust, privacy, and preventing data bre
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
The event life cycle of a SIEM solution involves several stages from data collection to incident response.
Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.
Normalization: The collected data is normalized to a common format for easier analysis and correlation.
Aggregation: Events are grouped together based on common attributes to identify patterns and t...
The OSI model is a conceptual framework that defines the functions of a network protocol stack.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
The model helps in understanding how data is transmitted and received in a network.
For example, the Physical layer deals wi...
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
I was interviewed before Jun 2023.
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
Natting helps improve security by hiding internal IP addresses from external networks
Example: A company uses NAT to ...
I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.
Port numbers for different protocols
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
Steps to take after a phishing attack
Immediately disconnect from the internet
Change all passwords associated with the compromised account
Notify the appropriate parties (IT department, bank, etc.)
Run a virus scan on all devices used to access the compromised account
Educate yourself and others on how to identify and avoid phishing attacks
posted on 6 Apr 2024
I applied via LinkedIn and was interviewed before Apr 2023. There were 3 interview rounds.
Monitoring and analyzing security measures to protect an organization's computer systems and networks
Monitoring security measures to ensure they are effective
Analyzing security breaches to determine the cause and prevent future incidents
Implementing security protocols and procedures
Conducting regular security audits and risk assessments
Interview experience
based on 2 reviews
Rating in categories
Software Engineer
168
salaries
| ₹3.7 L/yr - ₹14.3 L/yr |
Senior Software Engineer
134
salaries
| ₹5 L/yr - ₹20.4 L/yr |
Technical Specialist
48
salaries
| ₹7.2 L/yr - ₹17 L/yr |
Software Specialist
38
salaries
| ₹9 L/yr - ₹26.3 L/yr |
Support Engineer
32
salaries
| ₹2.8 L/yr - ₹7.5 L/yr |
TCS
Wipro
Infosys
HCLTech