i
SwiftSafe
Filter interviews by
I have 5 years of experience in cyber security, including threat detection, incident response, and vulnerability management.
5 years of experience in cyber security
Skilled in threat detection
Proficient in incident response
Experienced in vulnerability management
Top trending discussions
posted on 20 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
About a rat that can exfoliate the system and also mirte attack
Assembly language with little python
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
posted on 21 Aug 2024
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
posted on 3 Jul 2024
It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty
Consultants provide expert advice and guidance to clients in a specific field or industry.
Consultants analyze client needs and provide tailored solutions
They offer recommendations based on industry best practices
Consultants may also assist with implementation and training
They often work on a project basis or provide ongoing support
Examples: Cyber Security Consultants help organizations improve their security posture, I
posted on 26 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.
STP elects a root bridge to serve as the central point in the network
Each switch determines the best path to the root bridge based on the lowest path cost
Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology
posted on 20 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
I applied via Referral and was interviewed in Jan 2024. There was 1 interview round.
Different ports are used for communication in networking. UDP port 53 is used for DNS.
Ports are used to identify different services or processes on a network
UDP port 53 is used for DNS (Domain Name System)
Other common UDP ports include 67 (DHCP), 161 (SNMP), and 123 (NTP)
Interview experience
based on 2 reviews
Rating in categories
Cognizant
Teleperformance
Reliance Retail
iEnergizer