Filter interviews by
Developed a robust automation framework using Selenium and TestNG for efficient testing of web applications.
Utilized Selenium WebDriver for browser automation, enabling cross-browser testing.
Implemented TestNG for test case management, allowing parallel execution and better reporting.
Integrated Page Object Model (POM) to enhance code maintainability and reusability.
Incorporated Maven for dependency management and ...
DORA is a process in networking that stands for Discover, Offer, Request, and Acknowledge, used in DHCP for IP address assignment.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP servers respond with a DHCP Offer message containing an IP address and configuration details.
Request: The client sends a DHCP Request message to the chosen server to request the offered IP add...
EDR stands for Endpoint Detection and Response, a cybersecurity technology that continuously monitors and responds to potential threats on endpoints.
EDR solutions collect and analyze endpoint data to detect suspicious activities and potential threats.
They provide real-time visibility into endpoint activities and allow for quick response to incidents.
Measures of EDR include threat detection, incident response, endp...
VPN stands for Virtual Private Network, a secure connection that allows users to access the internet privately and securely.
VPN encrypts data to ensure privacy and security
It masks the user's IP address to protect their identity
VPN can be used to access region-restricted websites or services
Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2
DHCP assigns IP addresses to devices on a network. Relay agent forwards DHCP messages between subnets.
DHCP (Dynamic Host Configuration Protocol) assigns IP addresses, subnet masks, default gateways, and DNS servers to devices on a network.
DHCP server listens for DHCP requests from clients and responds with an IP address lease.
Relay agent is used when DHCP server and client are on different subnets. It forwards DHC...
ARP is a protocol used to map an IP address to a MAC address. It detects different networks by comparing the IP address and subnet mask.
ARP stands for Address Resolution Protocol
It maps an IP address to a MAC address
It works by broadcasting an ARP request to all devices on the network
The device with the matching IP address responds with its MAC address
If the destination device is in a different network, ARP compar...
Abstract class is a class that cannot be instantiated and can have both abstract and non-abstract methods. Interface is a collection of abstract methods.
Abstract class can have constructors while interface cannot
A class can implement multiple interfaces but can only inherit from one abstract class
Abstract class can have instance variables while interface cannot
Abstract class is used when we want to provide a commo...
SSL handshake is a process of establishing a secure connection between a client and a server.
Client sends a request to the server to initiate the SSL handshake
Server responds with its SSL certificate
Client verifies the certificate and generates a symmetric key
Client sends a message encrypted with the symmetric key to the server
Server decrypts the message and sends a confirmation to the client
The SSL handshake is c...
Phase 1 is for establishing a secure channel and Phase 2 is for negotiating IPSec SAs.
IKEv1 is a protocol used for VPN tunneling
Phase 1 negotiates the parameters for the secure channel
Phase 2 negotiates the IPSec SAs for data transmission
Phase 1 uses Diffie-Hellman for key exchange
Phase 2 uses either AH or ESP for data encryption and authentication
SSL Inspection is a process of intercepting and decrypting SSL/TLS traffic to inspect it for security purposes.
SSL Inspection intercepts SSL/TLS traffic and decrypts it
It allows inspection of encrypted traffic for security threats
It requires a trusted root certificate to be installed on the device
It can cause issues with end-to-end encryption and privacy concerns
I applied via Campus Placement and was interviewed in Aug 2024. There were 3 interview rounds.
Penetration testing involves simulating various types of cyber attacks to identify vulnerabilities in a system.
Types of attacks include phishing, malware, denial of service, and SQL injection.
Penetration testing helps organizations identify weaknesses in their security measures.
Examples of penetration testing tools include Metasploit, Nmap, and Burp Suite.
posted on 19 Sep 2024
I applied via Company Website and was interviewed in Aug 2024. There were 2 interview rounds.
DORA is a process in networking that stands for Discover, Offer, Request, and Acknowledge, used in DHCP for IP address assignment.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP servers respond with a DHCP Offer message containing an IP address and configuration details.
Request: The client sends a DHCP Request message to the chosen server to request the offered IP address.
...
I applied via Campus Placement and was interviewed in Jul 2024. There was 1 interview round.
VPN stands for Virtual Private Network, a secure connection that allows users to access the internet privately and securely.
VPN encrypts data to ensure privacy and security
It masks the user's IP address to protect their identity
VPN can be used to access region-restricted websites or services
Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2
EDR stands for Endpoint Detection and Response, a cybersecurity technology that continuously monitors and responds to potential threats on endpoints.
EDR solutions collect and analyze endpoint data to detect suspicious activities and potential threats.
They provide real-time visibility into endpoint activities and allow for quick response to incidents.
Measures of EDR include threat detection, incident response, endpoint ...
Trojan is a type of malware disguised as legitimate software, while worm is a self-replicating malware that spreads through networks.
Trojan is a non-self-replicating malware that requires user interaction to spread.
Worm is a self-replicating malware that spreads through networks without user interaction.
Trojans often appear as legitimate software or files to trick users into downloading and executing them.
Worms exploit...
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
Seeking new challenges and growth opportunities in a more innovative and dynamic work environment.
Desire for career advancement
Seeking new challenges
Looking for a more innovative work environment
I have over 5 years of experience in retail management, leading teams to achieve sales targets and providing excellent customer service.
Managed a team of 15 sales associates at XYZ Retail Store
Increased sales by 20% through implementing new sales strategies
Trained new employees on product knowledge and customer service
Handled customer complaints and resolved issues effectively
I appeared for an interview before Feb 2024.
Presentations on Stakeholder management
Scenario based presentation
40 mins, 30 questions
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
I was a Technical Support Specialist at a software company.
Provided technical assistance to customers via phone, email, or chat
Troubleshooted software issues and resolved them in a timely manner
Documented customer interactions and solutions for future reference
I appeared for an interview before Feb 2024.
Top trending discussions
The duration of Sophos Technologies interview process can vary, but typically it takes about 2-4 weeks to complete.
based on 20 interview experiences
Difficulty level
Duration
based on 222 reviews
Rating in categories
Technical Support Engineer
100
salaries
| ₹4.3 L/yr - ₹11 L/yr |
Senior Software Engineer
79
salaries
| ₹12.7 L/yr - ₹40 L/yr |
Network Security Engineer
67
salaries
| ₹4.7 L/yr - ₹13 L/yr |
Software Engineer
55
salaries
| ₹6.3 L/yr - ₹22.9 L/yr |
Software Engineer2
52
salaries
| ₹8.5 L/yr - ₹24 L/yr |
Thomson Reuters
Oracle Cerner
Chetu
R Systems International