Filter interviews by
posted on 12 Apr 2024
CyberArk tool manages password management for privilege functional Ids by securely storing, rotating, and controlling access to credentials.
CyberArk stores privileged account credentials in a secure vault
It automatically rotates passwords to reduce the risk of unauthorized access
Access to passwords is controlled through policies and workflows
It provides auditing and reporting capabilities for privileged account usage
In...
Cyber Ark components include Privileged Account Security, Endpoint Privilege Manager, and Privileged Session Manager.
Privileged Account Security: Manages and secures privileged accounts and credentials.
Endpoint Privilege Manager: Controls and monitors privileged access on endpoints.
Privileged Session Manager: Monitors and records privileged sessions for auditing purposes.
Static privilege accounts can be onboarded into CyberArk for automated password management by following these steps.
Identify the static privilege accounts that need to be onboarded into CyberArk.
Create a Safe in CyberArk to store the passwords for these accounts.
Define the policies and permissions for accessing and managing these accounts within CyberArk.
Use CyberArk's REST API or CLI to automate the onboarding process...
posted on 4 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
posted on 7 Sep 2024
A palindrome code is a program that checks if a given string reads the same forwards and backwards.
Create a function that takes a string as input
Reverse the string and compare it to the original string
Return true if they are the same, false otherwise
posted on 19 Aug 2024
RDBMS stands for Relational Database Management System in SQL.
RDBMS is a type of database management system that stores data in a structured format using rows and columns.
It allows users to establish relationships between different data sets.
SQL (Structured Query Language) is commonly used to interact with RDBMS.
Examples of RDBMS in SQL include MySQL, Oracle, and SQL Server.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to represent multiple data types.
Examples include method overloading and method overriding in object-oriented programming.
posted on 29 Oct 2023
I applied via Referral and was interviewed in Sep 2023. There were 3 interview rounds.
Introduction my self
posted on 4 Jun 2022
I applied via Approached by Company and was interviewed in Dec 2021. There were 2 interview rounds.
posted on 22 Oct 2021
posted on 7 Apr 2021
posted on 2 Jul 2024
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
There are two types of IP addresses - IPv4 and IPv6.
Example of IPv4 address: 192.168.1.1
Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI model stands for Open Systems Interconnection model
It helps in understanding how different networking protocols work together
Each layer has specific functions and communicates with adjacent layers
Examples of layers include physical layer, data link layer, network layer, e
The daily routine of an IT Support Engineer involves troubleshooting technical issues, providing support to end users, and maintaining IT systems.
Responding to help desk tickets and resolving technical issues
Installing and configuring hardware and software
Providing technical support to end users via phone, email, or in person
Performing routine maintenance on IT systems
Documenting solutions and procedures for future ref
posted on 5 Apr 2023
I was interviewed before Apr 2022.
ISO 27001 is a globally recognized standard for information security management.
ISO 27001 provides a framework for managing and protecting sensitive information.
It outlines a risk management process to identify, assess, and treat information security risks.
ISO 27001 requires organizations to implement and maintain a set of policies, procedures, and controls to ensure the confidentiality, integrity, and availability of ...
DLP policies are rules and procedures that prevent sensitive data from being accessed, used, or shared inappropriately.
DLP policies can be used to prevent data breaches and protect sensitive information.
They can include rules for identifying and classifying sensitive data, as well as procedures for monitoring and controlling access to that data.
Examples of DLP policies include restricting access to certain files or fol...
Interview experience
Senior Consultant
4k
salaries
| ₹8 L/yr - ₹25.5 L/yr |
Consultant
3.3k
salaries
| ₹6 L/yr - ₹20.9 L/yr |
Lead Consultant
3.3k
salaries
| ₹10.5 L/yr - ₹36 L/yr |
Software Engineer
3.2k
salaries
| ₹3.5 L/yr - ₹13 L/yr |
Associate Consultant
2.8k
salaries
| ₹4.6 L/yr - ₹15 L/yr |
Cognizant
TCS
Infosys
Accenture