Filter interviews by
SOC stands for Security Operations Center, a centralized unit that monitors and defends an organization's IT infrastructure.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor network traffic, logs, and events.
SOC analysts investigate alerts and incidents to determine the scope and impact of the threat.
They also work with other teams to dev...
Top trending discussions
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.
Port numbers for different protocols
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
Steps to take after a phishing attack
Immediately disconnect from the internet
Change all passwords associated with the compromised account
Notify the appropriate parties (IT department, bank, etc.)
Run a virus scan on all devices used to access the compromised account
Educate yourself and others on how to identify and avoid phishing attacks
I applied via campus placement at Madras University and was interviewed before Jun 2023. There were 4 interview rounds.
1st round online aptitude test
posted on 22 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
Yes, I have experience in Penetration testing.
I have conducted penetration testing for various clients in different industries.
I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.
I have experience in both manual and automated penetration testing.
I have provided detailed reports on vulnerabilities found and recommendations for remediation.
I stay up-to-date...
Network segmentation can be implemented by creating separate subnetworks and controlling access between them.
Identify the different types of data and systems that need to be protected
Create separate subnetworks for each type of data/system
Use firewalls and access controls to control traffic between subnetworks
Regularly review and update the segmentation strategy
Example: separating guest Wi-Fi network from corporate net
Firewall is a network security system that monitors and controls incoming and outgoing network traffic.
Firewall acts as a barrier between a trusted internal network and untrusted external network
It can be used to block unauthorized access to a network
It can also be used to block outgoing traffic to prevent data leakage
Firewalls can be hardware or software-based
Examples of firewalls include Cisco ASA, Fortinet FortiGate
Software Engineer
316
salaries
| ₹3.6 L/yr - ₹16 L/yr |
Technical Support Engineer
149
salaries
| ₹2.7 L/yr - ₹7.5 L/yr |
System Analyst
146
salaries
| ₹4.6 L/yr - ₹16.3 L/yr |
Senior Software Engineer
143
salaries
| ₹6.8 L/yr - ₹27.2 L/yr |
Senior Enterprise Associate
129
salaries
| ₹4.5 L/yr - ₹11.6 L/yr |
IBM
Accenture
HCLTech
TCS