Filter interviews by
I was interviewed before Feb 2024.
Presentations on Stakeholder management
Scenario based presentation
I applied via campus placement at SRM Institute of Science & Technology, Chennai and was interviewed in Aug 2024. There were 3 interview rounds.
Penetration testing involves simulating various types of cyber attacks to identify vulnerabilities in a system.
Types of attacks include phishing, malware, denial of service, and SQL injection.
Penetration testing helps organizations identify weaknesses in their security measures.
Examples of penetration testing tools include Metasploit, Nmap, and Burp Suite.
posted on 19 Sep 2024
I applied via Company Website and was interviewed in Aug 2024. There were 2 interview rounds.
I was interviewed before Feb 2024.
Sophos Technologies interview questions for popular designations
I applied via campus placement at SRM university (SRMU) and was interviewed in Jul 2024. There was 1 interview round.
VPN stands for Virtual Private Network, a secure connection that allows users to access the internet privately and securely.
VPN encrypts data to ensure privacy and security
It masks the user's IP address to protect their identity
VPN can be used to access region-restricted websites or services
Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2
EDR stands for Endpoint Detection and Response, a cybersecurity technology that continuously monitors and responds to potential threats on endpoints.
EDR solutions collect and analyze endpoint data to detect suspicious activities and potential threats.
They provide real-time visibility into endpoint activities and allow for quick response to incidents.
Measures of EDR include threat detection, incident response, endpoint ...
Trojan is a type of malware disguised as legitimate software, while worm is a self-replicating malware that spreads through networks.
Trojan is a non-self-replicating malware that requires user interaction to spread.
Worm is a self-replicating malware that spreads through networks without user interaction.
Trojans often appear as legitimate software or files to trick users into downloading and executing them.
Worms exploit...
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
Seeking new challenges and growth opportunities in a more innovative and dynamic work environment.
Desire for career advancement
Seeking new challenges
Looking for a more innovative work environment
I was interviewed before Feb 2024.
40 mins, 30 questions
I applied via campus placement at SRM Institute of Science & Technology, Chennai and was interviewed in Sep 2023. There were 3 interview rounds.
I was a Technical Support Specialist at a software company.
Provided technical assistance to customers via phone, email, or chat
Troubleshooted software issues and resolved them in a timely manner
Documented customer interactions and solutions for future reference
Top trending discussions
The duration of Sophos Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 18 interviews
Interview experience
based on 204 reviews
Rating in categories
Technical Support Engineer
104
salaries
| ₹3.5 L/yr - ₹11 L/yr |
Senior Software Engineer
87
salaries
| ₹14.8 L/yr - ₹42 L/yr |
Network Security Engineer
68
salaries
| ₹4.7 L/yr - ₹16.4 L/yr |
Software Engineer
41
salaries
| ₹6.3 L/yr - ₹22.5 L/yr |
Software Engineer III
33
salaries
| ₹11.8 L/yr - ₹30 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen