Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Aug 2022. There were 3 interview rounds.
Top trending discussions
A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.
Honeypots are used to detect and analyze cyber threats in a controlled environment.
They can be deployed within an organization's network to attract and monitor malicious activities.
Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...
I handle security incidents by following established incident response procedures and utilizing various security tools.
Immediately isolate affected systems to prevent further damage
Collect and analyze relevant data to determine the scope and impact of the incident
Contain the incident by blocking malicious activity and removing threats
Communicate with stakeholders to keep them informed of the situation
Document the incid...
I applied via Naukri.com and was interviewed in Jan 2021. There were 4 interview rounds.
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.
Symmetric encryption is faster and more efficient than asymmetric encryption.
Examples of symmetric encryption algorithms include AES and DES.
Asymmetric encryption is more secure as it uses a public key for encryption and a private key for decryption.
Examples of asymmetric encryption algorithms incl
TLS is the successor of SSL protocol, providing more secure communication over the internet.
TLS is the newer version of SSL.
TLS uses stronger encryption algorithms.
TLS supports more secure cipher suites.
TLS provides better authentication and key exchange mechanisms.
TLS is backward compatible with SSL, but SSL is not forward compatible with TLS.
Educating users about cybersecurity attacks is crucial for their protection.
Conduct regular cybersecurity awareness training sessions
Provide clear and concise guidelines on safe online practices
Share real-life examples of cyber attacks and their consequences
Encourage the use of strong and unique passwords
Promote the use of multi-factor authentication
Teach users how to identify phishing emails and suspicious links
Advise...
There are various types of attacks, including malware, phishing, DDoS, ransomware, and social engineering.
Malware attacks involve malicious software that can harm or exploit systems.
Phishing attacks aim to trick individuals into revealing sensitive information.
DDoS attacks overwhelm a network or website with excessive traffic, causing it to become unavailable.
Ransomware attacks encrypt files or systems and demand a ran...
Hash values can be used to determine if a file or data is malicious or not.
Hash values are unique identifiers generated from the content of a file or data.
Malicious files or data often have known hash values that can be used for detection.
Comparing hash values of files or data with known malicious hash values can help identify threats.
Hash values can be used in antivirus software, threat intelligence databases, and sec...
I applied via Referral and was interviewed before Apr 2020. There were 5 interview rounds.
I applied via Approached by Company and was interviewed before May 2018. There were 6 interview rounds.
I am a dedicated and hardworking individual with a passion for learning and growth.
I have a Bachelor's degree in Business Administration from XYZ University.
I have 3 years of experience working in marketing and sales roles.
I am proficient in Microsoft Office Suite and have strong communication skills.
I am a team player and enjoy collaborating with others to achieve common goals.
TCS is a global leader in IT services with a strong reputation for innovation and client satisfaction.
TCS has a proven track record of delivering high-quality services to clients worldwide.
TCS offers a wide range of opportunities for career growth and development.
TCS values diversity and inclusion, creating a supportive work environment for employees.
TCS invests in cutting-edge technologies and training programs to kee
I have completed additional training in project management and have experience in multiple roles within the field.
Completed a project management certification course
Served as a project coordinator for a major client project
Managed a team of junior associates in a previous role
I enjoy the problem-solving aspect of my job the most. An interesting day at the office involves collaborating with colleagues to find creative solutions.
Collaborating with colleagues to brainstorm solutions
Using critical thinking skills to analyze complex problems
Implementing innovative solutions to improve processes
Celebrating successful outcomes with team members
I applied via Campus Placement and was interviewed before Jun 2021. There were 2 interview rounds.
It was general aptitude with numerical,reasoning and general such questions with coding MCQ
I applied via Referral and was interviewed in Dec 2020. There were 3 interview rounds.
I was interviewed before May 2020.
I am a highly motivated individual with a passion for learning and a strong work ethic.
I have a Bachelor's degree in Computer Science from XYZ University.
I have completed several internships in software development, including one at ABC Company where I worked on a team to develop a mobile app.
I am proficient in several programming languages, including Java, Python, and C++.
I am a quick learner and enjoy taking on new c...
I applied via Walk-in and was interviewed before May 2021. There were 3 interview rounds.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
QUICK HEAL TECHNOLOGIES
Seqrite
K7 Computing