Filter interviews by
I appeared for an interview in Apr 2024.
Tell about yourself and what is your achievements
I applied via Naukri.com and was interviewed before Mar 2021. There were 2 interview rounds.
Modification of behavior is a process of changing one's actions or reactions to certain stimuli.
Behavior modification involves identifying the target behavior, setting goals, and implementing a plan to change the behavior.
Positive reinforcement is often used to encourage desired behavior, while negative reinforcement is used to discourage undesired behavior.
Examples of behavior modification include training a dog to si...
I appeared for an interview in Aug 2024.
Dev raj ram peyare yadav
In an emergency, I can remain calm, assess the situation, and take appropriate action to ensure the safety and security of individuals.
Remain calm and composed to think clearly
Assess the situation quickly to determine the best course of action
Follow emergency protocols and procedures
Communicate effectively with others involved in the emergency
Provide assistance and support to those in need
A supervisor is a person who oversees and manages a team or group of individuals.
Supervisors are responsible for delegating tasks and ensuring they are completed efficiently.
They provide guidance and support to their team members.
They are accountable for the performance and productivity of their team.
They communicate effectively with their team and higher-ups.
Examples include a retail store manager, a construction site
I applied via Job Portal and was interviewed in Feb 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.
SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.
XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.
SIEM is focused ...
PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.
PAM is a security solution that manages and monitors privileged access to critical systems and data.
PIM is a security solution that manages and secures privileged identities, such as administrator accounts.
Both PAM and PIM are important for protecting against insider threats and external attacks.
Examples of PAM and PIM solutio
based on 1 interview
Interview experience
Assistant Manager
4
salaries
| ₹4.5 L/yr - ₹4.5 L/yr |
Engineer
4
salaries
| ₹7 L/yr - ₹8 L/yr |
Electrical Maintenance Engineer
3
salaries
| ₹0.2 L/yr - ₹0.2 L/yr |
TCS
Infosys
Wipro
HCLTech