i
Wipro
Filter interviews by
I applied via Referral and was interviewed in Aug 2021. There was 1 interview round.
FM 200 is a clean agent fire suppression system used to extinguish fires without causing damage to equipment or the environment.
FM 200 stands for FireMaster 200
It is a colorless, odorless, and non-conductive gas
It is stored in cylinders and released through a piping network
It is commonly used in data centers, museums, and other areas with sensitive equipment
It extinguishes fires by reducing the oxygen level in the air
I...
Access provision process involves identification, authorization, and authentication.
Identify the employee and their role
Determine the level of access required
Authorize access based on the employee's role and responsibilities
Authenticate the employee's identity through a secure login process
Regularly review and update access permissions as needed
There are several types of cameras, including dome, bullet, PTZ, and thermal cameras.
Dome cameras are mounted on the ceiling and offer a 360-degree view
Bullet cameras are long and cylindrical and are ideal for outdoor use
PTZ cameras can pan, tilt, and zoom to capture a wider area
Thermal cameras use heat signatures to detect movement and are ideal for low-light environments
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.
SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.
XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.
SIEM is focused ...
PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.
PAM is a security solution that manages and monitors privileged access to critical systems and data.
PIM is a security solution that manages and secures privileged identities, such as administrator accounts.
Both PAM and PIM are important for protecting against insider threats and external attacks.
Examples of PAM and PIM solutio
posted on 20 Feb 2023
I was interviewed in Aug 2022.
Vulnerability is a weakness, threat is a potential danger, and risk is the likelihood of a threat exploiting a vulnerability.
Vulnerability: a weakness in a system that can be exploited by a threat
Threat: a potential danger that can exploit a vulnerability
Risk: the likelihood of a threat exploiting a vulnerability
Example: A vulnerability in a software program can be exploited by a hacker (threat), resulting in a data br
Secure session layer protocols include SSL and TLS.
SSL (Secure Sockets Layer)
TLS (Transport Layer Security)
I applied via Naukri.com and was interviewed before Mar 2021. There were 2 interview rounds.
based on 3 reviews
Rating in categories
Project Engineer
32.6k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23k
salaries
| ₹5.8 L/yr - ₹22.4 L/yr |
Senior Associate
21.2k
salaries
| ₹0.8 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.6k
salaries
| ₹5 L/yr - ₹19 L/yr |
Technical Lead
18.6k
salaries
| ₹8.2 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon