i
Softtek
Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.
CyberArk is a privileged access management solution that includes components such as Password Vault, Privileged Session Manager, and Endpoint Privilege Manager.
Password Vault - stores and manages privileged account credentials
Privileged Session Manager - monitors and records privileged sessions for auditing purposes
Endpoint Privilege Manager - enforces least privilege policies on endpoints
Application Identity Manager -...
Our current company security architecture is based on Cyberark.
We use Cyberark to manage privileged access to critical systems and applications.
Cyberark helps us enforce least privilege access and monitor privileged activity.
We have integrated Cyberark with our SIEM solution for better visibility and threat detection.
We regularly review and update our Cyberark policies and configurations to ensure maximum security.
Over...
Change account modifies the account while reconcile and verify ensure accuracy of account information.
Change account involves modifying the account information
Reconcile account ensures that the account balance is accurate
Verify account ensures that the account information is correct
Change account is proactive while reconcile and verify are reactive
Example: Changing the account holder's name is a change account action w...
Top trending discussions
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via campus placement at Narsee Monjee Institute Of Management Studies (NMIMS) and was interviewed in Nov 2023. There were 3 interview rounds.
It was aptitude test with quantitative logical and coding sections
Confidentiality is the most important in CIA according to me.
Confidentiality ensures that sensitive information is protected from unauthorized access.
It involves implementing access controls, encryption, and secure communication channels.
Examples include securing user data, protecting trade secrets, and safeguarding classified information.
Confidentiality is crucial in maintaining trust, privacy, and preventing data bre
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
The event life cycle of a SIEM solution involves several stages from data collection to incident response.
Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.
Normalization: The collected data is normalized to a common format for easier analysis and correlation.
Aggregation: Events are grouped together based on common attributes to identify patterns and t...
The OSI model is a conceptual framework that defines the functions of a network protocol stack.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
The model helps in understanding how data is transmitted and received in a network.
For example, the Physical layer deals wi...
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
I was interviewed before Jun 2023.
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
Natting helps improve security by hiding internal IP addresses from external networks
Example: A company uses NAT to ...
I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.
Port numbers for different protocols
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
Steps to take after a phishing attack
Immediately disconnect from the internet
Change all passwords associated with the compromised account
Notify the appropriate parties (IT department, bank, etc.)
Run a virus scan on all devices used to access the compromised account
Educate yourself and others on how to identify and avoid phishing attacks
posted on 6 Apr 2024
I applied via LinkedIn and was interviewed before Apr 2023. There were 3 interview rounds.
Monitoring and analyzing security measures to protect an organization's computer systems and networks
Monitoring security measures to ensure they are effective
Analyzing security breaches to determine the cause and prevent future incidents
Implementing security protocols and procedures
Conducting regular security audits and risk assessments
based on 2 reviews
Rating in categories
Software Engineer
171
salaries
| ₹3.5 L/yr - ₹13 L/yr |
Senior Software Engineer
130
salaries
| ₹5 L/yr - ₹21 L/yr |
Technical Specialist
48
salaries
| ₹7.2 L/yr - ₹17 L/yr |
Software Specialist
38
salaries
| ₹9 L/yr - ₹26.3 L/yr |
Support Engineer
32
salaries
| ₹2.8 L/yr - ₹7.5 L/yr |
TCS
Wipro
Infosys
HCLTech