i
Virtual Employee
Filter interviews by
I applied via Approached by Company and was interviewed before Jul 2021. There were 3 interview rounds.
Basic terminologies in cyber security
Malware
Phishing
Firewall
Encryption
Vulnerability
Patch
Intrusion Detection System
Social Engineering
Two-Factor Authentication
The OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application
Each layer has a specific function and communicates with adjacent layers
The model helps ensure interoperability between different network devices and software
Example: HTTP operates at the Appli...
HTTP is unencrypted while HTTPS is encrypted. HTTPS provides secure communication over the internet.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure
HTTP is vulnerable to attacks like man-in-the-middle while HTTPS is secure
HTTPS uses SSL/TLS certificates to encrypt data while HTTP does not
HTTPS is used for secure online transactions like online banking, e-commerce, et...
The OWASP Top 10 is a list of the most critical web application security risks.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
Common cyber attacks include phishing, malware, ransomware, DDoS, and social engineering.
Phishing: fraudulent emails or websites that trick users into giving sensitive information
Malware: malicious software that can damage or control a computer system
Ransomware: malware that encrypts files and demands payment for their release
DDoS: Distributed Denial of Service attacks overwhelm a website or network with traffic
Social ...
Mitigating common cyber attacks involves implementing strong passwords, regular software updates, and employee training.
Use strong passwords and two-factor authentication
Regularly update software and operating systems
Train employees on how to identify and avoid phishing scams
Implement firewalls and antivirus software
Limit access to sensitive data and regularly backup important files
Top trending discussions
I applied via Naukri.com
I applied via Naukri.com and was interviewed in Feb 2022. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
To get daily updated data to your email, you can use automated scripts or tools that fetch the data and send it to your email address.
Use a programming language like Python to write a script that fetches the data from a source and sends it to your email using SMTP.
Utilize APIs provided by the data source to retrieve the data and then use an email service's API to send it to your email address.
Use third-party tools like...
I applied via Walk-in and was interviewed in Mar 2021. There was 1 interview round.
C is a general-purpose programming language known for its efficiency and low-level control.
C was developed by Dennis Ritchie at Bell Labs in the 1970s.
It is widely used for system programming, embedded systems, and developing operating systems.
C is known for its simplicity, allowing direct memory manipulation and efficient code execution.
It influenced the development of many other programming languages, such as C++, Ja
Java is a high-level programming language known for its platform independence and object-oriented approach.
Java is widely used for developing desktop, web, and mobile applications.
It is known for its write once, run anywhere (WORA) principle.
Java programs are compiled into bytecode and executed on a Java Virtual Machine (JVM).
It supports multithreading, exception handling, and automatic memory management.
Popular framew...
Lambda is a function that allows you to write and use small, anonymous functions in programming languages.
Lambda functions are often used in functional programming languages.
They are anonymous, meaning they don't have a name.
Lambdas can be used as arguments to higher-order functions.
They are commonly used for tasks that require a short, one-time function.
Lambda functions can be written in various programming languages,
I applied via Walk-in and was interviewed before Aug 2023. There were 2 interview rounds.
I have 5 years of experience in marketing and sales roles, including managing social media campaigns and client relationships.
Managed social media campaigns to increase brand awareness
Developed and maintained relationships with clients to drive sales
Analyzed market trends to identify opportunities for growth
I am looking for a competitive salary based on my experience and skills.
Research industry standards for similar positions
Consider cost of living in the area
Factor in your level of experience and skills
Be prepared to negotiate based on benefits offered
To join as an Associate, you can apply through the company's website or through a referral.
Apply online through the company's career portal
Reach out to current employees for a referral
Attend networking events or job fairs to connect with recruiters
posted on 12 Jun 2022
I applied via Approached by Company and was interviewed before Dec 2021. There were 2 interview rounds.
based on 5 reviews
Rating in categories
Software Engineer
238
salaries
| ₹3.6 L/yr - ₹14 L/yr |
Software Developer
136
salaries
| ₹3 L/yr - ₹11.6 L/yr |
Senior Software Engineer
117
salaries
| ₹6 L/yr - ₹18.3 L/yr |
Senior Executive
68
salaries
| ₹2.8 L/yr - ₹9 L/yr |
Digital Marketing Expert
53
salaries
| ₹4.2 L/yr - ₹9.5 L/yr |
Randstad
Team Lease
Innovsource Services
IMPACT Infotech