Filter interviews by
Top trending discussions
I was interviewed before Jan 2016.
I am a cyber security professional with expertise in network security and threat analysis.
I have experience in implementing and managing firewalls, intrusion detection systems, and other security measures.
I am skilled in conducting vulnerability assessments and penetration testing to identify potential security risks.
I stay up-to-date with the latest security trends and technologies to ensure the highest level of prote...
Yes, I am open to relocation for the right opportunity.
I am open to relocation for career growth and new experiences.
I have relocated in the past for job opportunities and have found it to be a positive experience.
I am willing to consider relocation if it aligns with my long-term goals and aspirations.
Cyber Security is the practice of protecting systems, networks, and data from cyber attacks.
Cyber Security involves protecting computers, servers, mobile devices, networks, and data from malicious attacks.
It includes implementing security measures such as firewalls, antivirus software, encryption, and intrusion detection systems.
Cyber Security professionals work to prevent, detect, and respond to cyber threats to ensur...
I am passionate about protecting sensitive information and preventing cyber attacks.
Passion for technology and problem-solving
Interest in staying ahead of cyber threats
Desire to make a positive impact by securing data and systems
I can work on domains such as network security, application security, cloud security, and incident response.
Network security - securing network infrastructure, firewalls, VPNs, etc.
Application security - securing web and mobile applications, code review, etc.
Cloud security - securing cloud infrastructure, data protection, etc.
Incident response - responding to security incidents, investigating and mitigating threats, et
I implemented multiple authentication measures in my projects to ensure secure access.
Implemented password-based authentication with strong password policies
Utilized two-factor authentication for an added layer of security
Implemented biometric authentication using fingerprint or facial recognition
Used multi-factor authentication to combine multiple authentication methods
Implemented single sign-on (SSO) for seamless and...
Firewalls and application gateways are both security measures used to protect networks, but they differ in their approach.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Application gateways, also known as application-level gateways or application layer firewalls, operate at the application layer of the OSI model and can inspect...
HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP that encrypts data sent between a website and a user's browser.
HTTPS uses SSL/TLS encryption to protect data
It ensures that the website being accessed is authentic
It prevents eavesdropping and tampering of data
It is indicated by a padlock icon in the browser's address bar
Examples of websites that use HTTPS include banking sites, e-comme
I applied via Company Website and was interviewed in Oct 2020. There were 3 interview rounds.
Recursion is a process in which a function calls itself. Inheritance is a mechanism in OOP where a class inherits properties of another class. Heap is a region of memory used for dynamic memory allocation.
Recursion can be used to solve problems that can be broken down into smaller sub-problems.
Inheritance allows for code reuse and helps in creating a hierarchy of classes.
Heap is used for dynamic memory allocation in la...
There are three types of machine learning: supervised, unsupervised, and reinforcement learning.
Supervised learning involves labeled data and predicting outcomes based on that data.
Unsupervised learning involves finding patterns in unlabeled data.
Reinforcement learning involves an agent learning to make decisions based on rewards and punishments.
Examples of supervised learning include image classification and spam filt...
OOPs stands for Object-Oriented Programming. It is a programming paradigm that uses objects to design applications.
OOPs is based on the concept of classes and objects
It focuses on encapsulation, inheritance, and polymorphism
It helps in creating modular, reusable, and maintainable code
Examples of OOPs languages are Java, C++, Python, etc.
SDLC stands for Software Development Life Cycle, a process used to design, develop, and maintain software.
SDLC is a structured approach to software development
It involves several phases such as planning, analysis, design, implementation, testing, and maintenance
Each phase has its own set of activities and deliverables
SDLC helps ensure that software is developed efficiently, on time, and within budget
Examples of SDLC mo
I applied via Company Website and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Company Website and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2021. There were 4 interview rounds.
I applied via Job Fair and was interviewed before May 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2021. There were 3 interview rounds.
Swap two numbers with and without temporary variable
Without temporary variable: Use addition and subtraction
With temporary variable: Use a third variable to store the value of one of the numbers
Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;
Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;
System Expert
222
salaries
| ₹0 L/yr - ₹0 L/yr |
System Engineer
215
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator
59
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Engineer
53
salaries
| ₹0 L/yr - ₹0 L/yr |
Desktop Support Engineer
50
salaries
| ₹0 L/yr - ₹0 L/yr |
HCLTech
TCS
Infosys
Wipro