Filter interviews by
Top trending discussions
Event ID 4624 is for successful login in Windows Security Event Log.
Event ID 4624 is logged in the Windows Security Event Log when a user successfully logs on to a computer.
This event is commonly used by security analysts to track user activity and identify potential security incidents.
The event includes information such as the account name, account domain, logon type, and logon process.
For example, in a Windows enviro...
Event ID 4625 is for login fail
Event ID 4625 is generated when a user fails to log in to a system
It is commonly seen in Windows Security event logs
The event provides information on the account that failed to log in, the reason for the failure, and the source of the login attempt
This question is likely asking about the reason code 4625 for a login failure.
4625 is the event ID for a failed login attempt in Windows systems
It could indicate a user entering incorrect credentials or an account being locked out
Common reasons for event 4625 include mistyped passwords, expired accounts, or disabled accounts
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
Developed by MITRE Corporation
Provides a comprehensive list of tactics and techniques used by adversaries during cyber attacks
Used by cybersecurity professionals to improve threat detection and response
Helps organizations understand and defend against common attack patterns
Example: Credential Dumping is a
Company X experienced a data breach due to a phishing attack on employee email accounts.
Phishing attack targeted employee email accounts
Sensitive data such as customer information or financial records may have been compromised
Company X is working on improving cybersecurity measures to prevent future breaches
I was interviewed in Apr 2024.
QRadar SIEM architecture is a distributed system with components like Console, Event Processors, Flow Processors, and Data Nodes.
QRadar SIEM architecture is based on a distributed model
Components include Console, Event Processors, Flow Processors, and Data Nodes
Console provides the user interface for managing and monitoring security events
Event Processors collect, normalize, and correlate events from various sources
Flo...
I applied via campus placement at Thadomal Shahani Engineering College, Mumbai and was interviewed in Aug 2024. There were 3 interview rounds.
In the aptitude round there were various sections such as quants, verbal and technical questions based on networking and cloud platforms and some pseudo codes . No coding questions were asked .
It was structured group discussion with one panel member and a case study was provided to us .
I am a dedicated and detail-oriented analyst with a strong background in data analysis and problem-solving.
I have a Bachelor's degree in Statistics and have completed multiple data analysis projects during my studies.
I am proficient in using statistical software such as R and Python to analyze data and generate insights.
I have experience working with cross-functional teams to develop and implement data-driven strategie...
I have worked on various projects including financial analysis, market research, and data visualization.
Developed financial models to analyze company performance
Conducted market research to identify growth opportunities
Created interactive dashboards for data visualization
Collaborated with cross-functional teams to implement project recommendations
GOOD EXPERIENCE - 10 MIN INTERVIEW
EASY EXPERIENCE - 10 MIN INTERVIEW JAVA REALETD
Artifical Intelligence
Maths, englkisg, coding
Abap, python, hard ques
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 3 interview rounds.
Content moderation is the process of monitoring and filtering user-generated content on online platforms to ensure it meets community guidelines.
Monitoring and reviewing user-generated content
Filtering out inappropriate or harmful content
Enforcing community guidelines and policies
Removing spam, hate speech, and other violations
Implementing automated tools and human moderators
Examples: Facebook moderating posts, YouTube
It consists of few questions on logical thinking and aptitude
Types of fraud include identity theft, credit card fraud, insurance fraud, and investment fraud.
Identity theft
Credit card fraud
Insurance fraud
Investment fraud
Prepare SAR by collecting relevant data, analyzing information, and documenting findings.
Collect all relevant data related to the suspicious activity report (SAR)
Analyze the information to identify any patterns or red flags
Document your findings in a clear and concise manner
Ensure compliance with regulatory requirements and guidelines
Submit the SAR to the appropriate authorities or stakeholders
I use a combination of statistical analysis, machine learning algorithms, and data visualization tools for fraud detection.
Statistical analysis tools like SAS or R
Machine learning algorithms like logistic regression or random forests
Data visualization tools like Tableau or Power BI
based on 1 review
Rating in categories
Software Engineer
48
salaries
| ₹3.7 L/yr - ₹11.1 L/yr |
Devops Engineer
28
salaries
| ₹4.5 L/yr - ₹13 L/yr |
Software Developer
28
salaries
| ₹3 L/yr - ₹11 L/yr |
Softwaretest Engineer
16
salaries
| ₹4.2 L/yr - ₹11 L/yr |
Data Analyst
15
salaries
| ₹2.5 L/yr - ₹10.1 L/yr |
Cognizant
Teleperformance
Reliance Retail
iEnergizer