i
Virtual Employee
Filter interviews by
I applied via Approached by Company and was interviewed before Jul 2021. There were 3 interview rounds.
Basic terminologies in cyber security
Malware
Phishing
Firewall
Encryption
Vulnerability
Patch
Intrusion Detection System
Social Engineering
Two-Factor Authentication
The OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application
Each layer has a specific function and communicates with adjacent layers
The model helps ensure interoperability between different network devices and software
Example: HTTP operates at the Appli...
HTTP is unencrypted while HTTPS is encrypted. HTTPS provides secure communication over the internet.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure
HTTP is vulnerable to attacks like man-in-the-middle while HTTPS is secure
HTTPS uses SSL/TLS certificates to encrypt data while HTTP does not
HTTPS is used for secure online transactions like online banking, e-commerce, et...
The OWASP Top 10 is a list of the most critical web application security risks.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
Common cyber attacks include phishing, malware, ransomware, DDoS, and social engineering.
Phishing: fraudulent emails or websites that trick users into giving sensitive information
Malware: malicious software that can damage or control a computer system
Ransomware: malware that encrypts files and demands payment for their release
DDoS: Distributed Denial of Service attacks overwhelm a website or network with traffic
Social ...
Mitigating common cyber attacks involves implementing strong passwords, regular software updates, and employee training.
Use strong passwords and two-factor authentication
Regularly update software and operating systems
Train employees on how to identify and avoid phishing scams
Implement firewalls and antivirus software
Limit access to sensitive data and regularly backup important files
Top trending discussions
VLAN stands for Virtual Local Area Network, a method of segmenting a physical network into multiple virtual networks.
VLANs allow for better network security by isolating traffic between different groups of devices.
They can improve network performance by reducing broadcast traffic.
VLANs can be used to logically group devices based on department, function, or location.
Each VLAN operates as if it is on its own separate ne...
P2P is a direct connection between two parties, while MPLS is a network technology that directs data from one network node to the next based on short path labels.
P2P stands for Peer-to-Peer and is a decentralized communication model where each party has equal capabilities and responsibilities.
MPLS stands for Multiprotocol Label Switching and is a routing technique used in telecommunications networks to speed up and sha...
posted on 16 Oct 2024
posted on 23 Aug 2023
I applied via Naukri.com and was interviewed in Jul 2023. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Apr 2023. There were 4 interview rounds.
I applied via Referral and was interviewed in May 2023. There were 2 interview rounds.
MGCP, SIP, and SCCP are protocols used in telecommunications for controlling communication sessions.
MGCP (Media Gateway Control Protocol) is used for controlling media gateways in VoIP networks.
SIP (Session Initiation Protocol) is used for initiating, maintaining, and terminating real-time sessions like voice and video calls over IP networks.
SCCP (Skinny Client Control Protocol) is a Cisco proprietary protocol used for...
Logs can be collected using various methods such as syslog, SNMP, agent-based monitoring, and log management tools.
Use syslog to collect system logs from network devices
Utilize SNMP to gather performance data and alerts from network devices
Deploy agent-based monitoring tools on servers to collect detailed logs
Implement log management tools like Splunk or ELK stack for centralized log collection and analysis
posted on 7 Mar 2024
I applied via Naukri.com and was interviewed before Mar 2023. There was 1 interview round.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer has a specific function and communicates with the layers above and below it.
Examples of layers include physical layer, data link laye...
The OSI model consists of 7 layers that define the functions of a network.
The 7 layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and protocols associated with it.
For example, the Physical layer deals with the physical connection between devices, while the Application layer handles user interfaces.
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers determine the best path for data packets to reach their destination, ...
The statement is incorrect. Routers route between different networks, while switches connect devices within the same network.
Routers route traffic between different networks based on IP addresses
Switches connect devices within the same network based on MAC addresses
Example: A router connects a home network to the internet, while a switch connects devices within the home network
posted on 15 Apr 2023
I applied via Naukri.com and was interviewed before Apr 2022. There were 2 interview rounds.
Public IP is the address assigned to a device connected to a network, accessible over the internet. Private IP is used within a private network.
Public IP is unique and globally routable
Private IP is used within a local network and not accessible over the internet
Public IP allows devices to communicate with other devices on the internet
Private IP allows devices to communicate within the local network
Example of public IP
STP stands for Spanning Tree Protocol, a network protocol used to prevent loops in Ethernet networks.
STP is used to create a loop-free logical topology in a network.
It works by selecting a root bridge and calculating the shortest path to reach each network segment.
STP uses a tree-like structure to block redundant paths and ensure data flows efficiently.
It helps in preventing broadcast storms and improving network stabi
I applied via Walk-in and was interviewed in Dec 2020. There was 1 interview round.
based on 5 reviews
Rating in categories
Software Engineer
223
salaries
| ₹4 L/yr - ₹14.9 L/yr |
Senior Software Engineer
143
salaries
| ₹6 L/yr - ₹18.3 L/yr |
Software Developer
135
salaries
| ₹3.3 L/yr - ₹12.6 L/yr |
Senior Executive
56
salaries
| ₹3.7 L/yr - ₹9 L/yr |
Senior Associate
55
salaries
| ₹3.8 L/yr - ₹8.5 L/yr |
Upwork
Remote
Gurit India
PeoplePerHour