Filter interviews by
Clear (1)
SOC stands for Security Operations Center, a centralized unit that monitors and defends an organization's IT infrastructure.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor network traffic, logs, and events.
SOC analysts investigate alerts and incidents to determine the scope and impact of the threat.
They also work with other teams to dev...
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Cyber attacks in network are a major threat to organizations and can cause significant damage.
Cyber attacks can come in various forms such as malware, phishing, ransomware, and DDoS attacks.
Network security measures such as firewalls, intrusion detection systems, and antivirus software can help prevent cyber attacks.
Regular security audits and employee training can also help mitigate the risk of cyber attacks.
In the ev...
Application layers in cyber security refer to the different levels of software and protocols that make up an application.
Application layer is the topmost layer in the OSI model
It includes protocols like HTTP, SMTP, FTP, etc.
Security measures at this layer include firewalls, intrusion detection systems, and web application firewalls
Vulnerabilities at this layer include SQL injection, cross-site scripting, and session hi
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Naukri.com and was interviewed before Nov 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.
I applied via Company Website and was interviewed in Dec 2021. There were 8 interview rounds.
I'm attend the interview tomorrow
based on 1 review
Rating in categories
Software Engineer
312
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Support Engineer
148
salaries
| ₹0 L/yr - ₹0 L/yr |
System Analyst
144
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
140
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Enterprise Associate
133
salaries
| ₹0 L/yr - ₹0 L/yr |
IBM
Accenture
HCLTech
TCS