i
Tata Electronics
Filter interviews by
I was interviewed in Jul 2023.
Top trending discussions
Burp Suite is a web application security testing tool.
Burp Suite is used for manual and automated testing of web applications.
It includes various tools like a proxy, scanner, intruder, repeater, and sequencer.
The proxy tool allows intercepting and modifying HTTP/S traffic.
The scanner tool automatically identifies vulnerabilities in web applications.
The intruder tool can be used for brute-forcing, fuzzing, and payload t...
Nmap is a powerful network scanning tool used to discover hosts and services on a network.
Nmap can be used to scan specific hosts or entire networks.
It provides various scan types such as TCP, UDP, SYN, etc.
Nmap can detect open ports, running services, and operating systems.
It offers advanced features like OS fingerprinting, version detection, and script scanning.
Example: 'nmap -p 1-1000 -sS 192.168.0.1' scans ports 1
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing measures to prevent unauthorized access to sensitive information or areas
It includes physical security measures such as locks, alarms, and security guards
Cybersecurity is also a crucial aspect of security, involving protection of digital information and systems
Security protocols...
Fire is a rapid chemical reaction that releases heat, light, and various gases.
Fire is a rapid oxidation process that releases energy in the form of heat and light
It requires fuel, oxygen, and heat to sustain itself
Common examples of fuel for fire include wood, paper, gasoline, and natural gas
A fire hydrant is a connection point by which firefighters can tap into a water supply to extinguish fires.
Fire hydrants are typically located along streets and in public areas for easy access in case of emergencies
They are connected to a pressurized water source underground
Firefighters use special tools to open the hydrant and connect hoses to it
The water flow from a fire hydrant can vary depending on the size of the
Types of fire extinguishers include water, foam, CO2, dry powder, and wet chemical.
Water extinguishers are suitable for Class A fires involving solid materials like wood or paper.
Foam extinguishers are effective for Class A and B fires, involving flammable liquids like petrol or oil.
CO2 extinguishers are suitable for electrical fires and Class B fires.
Dry powder extinguishers are versatile and can be used on Class A, B...
Types of CCTV cameras include dome cameras, bullet cameras, PTZ cameras, and thermal cameras.
Dome cameras are discreet and suitable for indoor use.
Bullet cameras are weatherproof and ideal for outdoor surveillance.
PTZ cameras can pan, tilt, and zoom for flexible monitoring.
Thermal cameras detect heat signatures for night vision or detecting intruders.
I applied via Walk-in and was interviewed in Aug 2023. There was 1 interview round.
I applied via campus placement at Haldia Institute of Technology (HIT) and was interviewed before Nov 2023. There were 2 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates w...
I am passionate about cybersecurity and believe in the values and mission of your company.
I have a strong background in cybersecurity with experience in threat detection and prevention.
I am impressed by your company's reputation for innovative security solutions.
I am excited about the opportunity to work with a team of talented professionals in the field.
I believe that my skills and expertise align well with the challe
Cryptography is the practice and study of techniques for securing information and communication.
Cryptography is used to protect data from unauthorized access.
It involves techniques such as encryption and decryption.
Common encryption algorithms include DES, 3DES, AES, and RC4.
Asymmetric encryption uses different keys for encryption and decryption, while symmetric encryption uses the same key.
Cryptography is essential fo
based on 1 interview
Interview experience
Senior Engineer
754
salaries
| ₹3 L/yr - ₹10.6 L/yr |
Engineer
424
salaries
| ₹3 L/yr - ₹7.2 L/yr |
L2 Engineer
345
salaries
| ₹3 L/yr - ₹8.2 L/yr |
Assistant Manager
298
salaries
| ₹5 L/yr - ₹15 L/yr |
Engineer 1
238
salaries
| ₹3 L/yr - ₹6.5 L/yr |
Samsung
LG Electronics
Sony
Panasonic Avionics Corporation