i
TCS
Filter interviews by
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model helps in understanding how data is transmitted over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of OSI layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application la
A SOC analyst's day-to-day activities involve monitoring and analyzing security events, investigating incidents, and responding to threats.
Monitoring security events and alerts from various sources
Analyzing and investigating potential security incidents
Responding to and mitigating security threats
Performing vulnerability assessments and penetration testing
Creating and maintaining security incident reports
Collaborating ...
What people are saying about TCS
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
TCS interview questions for designations
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
Logical reasoning and verbal ability.
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
based on 6 interviews
Interview experience
based on 16 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
66.9k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51.4k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.8k
salaries
| ₹2.2 L/yr - ₹5.7 L/yr |
Associate Consultant
29.3k
salaries
| ₹9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture