i
Wipro
Filter interviews by
I applied via Referral and was interviewed in Aug 2021. There was 1 interview round.
FM 200 is a clean agent fire suppression system used to extinguish fires without causing damage to equipment or the environment.
FM 200 stands for FireMaster 200
It is a colorless, odorless, and non-conductive gas
It is stored in cylinders and released through a piping network
It is commonly used in data centers, museums, and other areas with sensitive equipment
It extinguishes fires by reducing the oxygen level in the air
I...
Access provision process involves identification, authorization, and authentication.
Identify the employee and their role
Determine the level of access required
Authorize access based on the employee's role and responsibilities
Authenticate the employee's identity through a secure login process
Regularly review and update access permissions as needed
There are several types of cameras, including dome, bullet, PTZ, and thermal cameras.
Dome cameras are mounted on the ceiling and offer a 360-degree view
Bullet cameras are long and cylindrical and are ideal for outdoor use
PTZ cameras can pan, tilt, and zoom to capture a wider area
Thermal cameras use heat signatures to detect movement and are ideal for low-light environments
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
posted on 20 Feb 2023
I was interviewed in Aug 2022.
Vulnerability is a weakness, threat is a potential danger, and risk is the likelihood of a threat exploiting a vulnerability.
Vulnerability: a weakness in a system that can be exploited by a threat
Threat: a potential danger that can exploit a vulnerability
Risk: the likelihood of a threat exploiting a vulnerability
Example: A vulnerability in a software program can be exploited by a hacker (threat), resulting in a data br
Secure session layer protocols include SSL and TLS.
SSL (Secure Sockets Layer)
TLS (Transport Layer Security)
A supervisor is a person who oversees and manages a team or group of individuals.
Supervisors are responsible for delegating tasks and ensuring they are completed efficiently.
They provide guidance and support to their team members.
They are accountable for the performance and productivity of their team.
They communicate effectively with their team and higher-ups.
Examples include a retail store manager, a construction site
I applied via Company Website and was interviewed in Dec 2021. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.
SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.
XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.
SIEM is focused ...
PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.
PAM is a security solution that manages and monitors privileged access to critical systems and data.
PIM is a security solution that manages and secures privileged identities, such as administrator accounts.
Both PAM and PIM are important for protecting against insider threats and external attacks.
Examples of PAM and PIM solutio
based on 3 reviews
Rating in categories
Project Engineer
32.6k
salaries
| ₹1.8 L/yr - ₹8.3 L/yr |
Senior Software Engineer
23k
salaries
| ₹5.8 L/yr - ₹22.4 L/yr |
Senior Associate
21.2k
salaries
| ₹0.8 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.6k
salaries
| ₹5 L/yr - ₹19 L/yr |
Technical Lead
18.6k
salaries
| ₹8.2 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon