Filter interviews by
Clear (1)
I applied via Campus Placement and was interviewed in Jul 2024. There was 1 interview round.
VPN stands for Virtual Private Network, a secure connection that allows users to access the internet privately and securely.
VPN encrypts data to ensure privacy and security
It masks the user's IP address to protect their identity
VPN can be used to access region-restricted websites or services
Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2
EDR stands for Endpoint Detection and Response, a cybersecurity technology that continuously monitors and responds to potential threats on endpoints.
EDR solutions collect and analyze endpoint data to detect suspicious activities and potential threats.
They provide real-time visibility into endpoint activities and allow for quick response to incidents.
Measures of EDR include threat detection, incident response, endpoint ...
Trojan is a type of malware disguised as legitimate software, while worm is a self-replicating malware that spreads through networks.
Trojan is a non-self-replicating malware that requires user interaction to spread.
Worm is a self-replicating malware that spreads through networks without user interaction.
Trojans often appear as legitimate software or files to trick users into downloading and executing them.
Worms exploit...
40 mins, 30 questions
Quantitative aptitude questions and some microprocessor related questions also and 6 coding string based questions
I am a highly skilled threat analyst with a passion for cybersecurity. I am excited about the opportunity to join this company because of its reputation for cutting-edge technology and commitment to protecting against cyber threats.
I have extensive experience in threat analysis and have successfully identified and mitigated numerous cyber threats.
I am constantly staying updated on the latest trends and techniques in cy...
Top trending discussions
I applied via Referral and was interviewed before Apr 2021. There was 1 interview round.
I was interviewed in Nov 2021.
Payment methods and per transaction cost for income processing.
Payment methods include credit/debit cards, bank transfers, and digital wallets.
Per transaction cost varies depending on the payment method and the service provider.
For example, credit card transactions may have a higher cost compared to bank transfers.
It is important to consider the cost and convenience of each payment method when choosing a service provid
It was moderate and give 2 coding questions to solve.
Gave some scenario based questions
Case study walkthrough
I applied via LinkedIn and was interviewed in May 2021. There were 3 interview rounds.
Handled a critical situation with a customer
Identified the issue and its impact on the customer
Communicated effectively with the customer to understand their concerns
Collaborated with the team to find a solution
Implemented the solution and ensured customer satisfaction
Followed up with the customer to ensure the issue was resolved
NGFw stands for Next-Generation Firewall and it has advanced features compared to traditional firewalls.
NGFw can identify and block advanced threats like malware, ransomware, and phishing attacks.
It can perform deep packet inspection to analyze network traffic and detect anomalies.
NGFw can also provide application-level visibility and control to manage network traffic based on application usage.
It can integrate with ot...
SSL handshake and IPsec negotiation are both security protocols used to establish secure communication channels.
SSL handshake is used to establish secure communication between a client and a server over the internet.
IPsec negotiation is used to establish secure communication between two network devices.
SSL handshake uses a combination of public and private keys to encrypt and decrypt data.
IPsec negotiation uses a combi...
posted on 5 Feb 2023
I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 2 interview rounds.
To reset a password protected BIOS configuration, you can use various methods such as removing the CMOS battery, using a BIOS reset jumper, or using manufacturer-specific software.
Remove the CMOS battery from the motherboard for a few minutes to reset the BIOS settings.
Locate the BIOS reset jumper on the motherboard and move it to the reset position for a few seconds.
Use manufacturer-specific software or tools to reset...
DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
DNS stands for Domain Name System.
It translates domain names into IP addresses.
DNS servers help in resolving domain names to their corresponding IP addresses.
They play a crucial role in the functioning of the internet.
DNS servers use a hierarchical structure for efficient name resolution.
They use different typ...
XSS attack is a type of web vulnerability where attackers inject malicious scripts into trusted websites to steal sensitive information or perform unauthorized actions.
XSS stands for Cross-Site Scripting.
Attackers exploit vulnerabilities in web applications to inject malicious scripts.
These scripts are then executed by unsuspecting users visiting the compromised website.
XSS attacks can be classified into three types: s...
The type of data stored in OSI Model Data Link Layer is the frame or packet.
The Data Link Layer is responsible for the physical transmission of data between network nodes.
It encapsulates the network layer packet into a frame with additional control information.
Examples of data stored in this layer include Ethernet frames, MAC addresses, and error detection codes.
MITM Attack is a type of cyber attack where an attacker intercepts communication between two parties to gain unauthorized access or steal information.
MITM stands for Man-in-the-Middle.
The attacker positions themselves between the sender and receiver to intercept and manipulate the communication.
Disadvantages of MITM attacks include unauthorized access to sensitive information, data theft, and potential for further expl...
SSL and TLS are cryptographic protocols used to secure communication over the internet.
SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.
SSL is the predecessor of TLS.
Both protocols provide encryption and authentication for secure communication.
TLS is considered more secure than SSL.
SSL uses a combination of symmetric and asymmetric encryption, while TLS primarily uses symmetric encryption...
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
based on 3 interviews
Interview experience
based on 2 reviews
Rating in categories
Technical Support Engineer
105
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
33
salaries
| ₹0 L/yr - ₹0 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen