Filter interviews by
I applied via Naukri.com and was interviewed before Dec 2023. There were 2 interview rounds.
Ransomware is a type of malicious software that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware typically spreads through phishing emails, malicious websites, or software vulnerabilities.
Once infected, the user's files are encrypted and inaccessible until a ransom is paid.
Payment is often demanded in cryptocurrency to make it harder to trace.
Examples of ransomware include Wanna
Top trending discussions
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model helps in understanding how data is transmitted over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of OSI layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application la
I appeared for an interview in Feb 2025.
AAA in cybersecurity stands for Authentication, Authorization, and Accounting, crucial for securing systems.
Authentication verifies user identity (e.g., passwords, biometrics).
Authorization determines user permissions (e.g., access to files).
Accounting tracks user activities (e.g., logging access times).
Example: A user logs in (Authentication), accesses a file (Authorization), and their actions are logged (Accounting).
IDS detects intrusions, while IPS actively prevents them, enhancing network security.
IDS (Intrusion Detection System) monitors network traffic for suspicious activity.
IPS (Intrusion Prevention System) not only detects but also blocks potential threats.
Example of IDS: Snort, which analyzes traffic and alerts administrators.
Example of IPS: Cisco Firepower, which can block malicious traffic in real-time.
IDS is typically p...
I enjoy hiking, reading, and photography, which help me relax and explore my creativity.
Hiking: I love exploring nature trails and discovering new landscapes, often going on weekend hikes with friends.
Reading: I read a variety of genres, from fiction to non-fiction, and recently finished a book on cybersecurity.
Photography: I enjoy capturing moments during my hikes, focusing on landscapes and wildlife, and I often shar
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
A SOC analyst's day-to-day activities involve monitoring and analyzing security events, investigating incidents, and responding to threats.
Monitoring security events and alerts from various sources
Analyzing and investigating potential security incidents
Responding to and mitigating security threats
Performing vulnerability assessments and penetration testing
Creating and maintaining security incident reports
Collaborating ...
Logical reasoning and verbal ability.
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Basic aptitude topics
Scenario based questions
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
CIA stands for Confidentiality, Integrity, and Availability. Splunk and IBM QRadar are both security information and event management (SIEM) tools.
CIA is a security model that focuses on protecting information by ensuring its confidentiality, integrity, and availability.
Splunk is a SIEM tool that collects, indexes, and analyzes machine data to provide insights into security events and threats.
IBM QRadar is another SIEM...
based on 2 interviews
Interview experience
Software Engineer
7
salaries
| ₹3.9 L/yr - ₹9 L/yr |
SOC Analyst
6
salaries
| ₹3.4 L/yr - ₹4.5 L/yr |
Cyber Security Analyst
5
salaries
| ₹5.5 L/yr - ₹7.5 L/yr |
Senior Strategy Officer
5
salaries
| ₹36 L/yr - ₹36 L/yr |
Senior Software Engineer
4
salaries
| ₹11.5 L/yr - ₹12 L/yr |
TCS
Accenture
Wipro
Cognizant