i
XenonStack
Filter interviews by
I applied via Company Website and was interviewed in Sep 2021. There were 3 interview rounds.
Top trending discussions
posted on 28 Apr 2023
Cryptography is the practice of secure communication in the presence of third parties.
It involves techniques for secure communication and data protection
Uses mathematical algorithms to encrypt and decrypt data
Examples include AES, RSA, and SHA
Cryptography is used in various fields such as finance, military, and healthcare
Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.
Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.
Hashing is irreversible while encryption is reversible.
Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...
posted on 19 Jan 2023
I was interviewed in Dec 2022.
False positives in SIEM
Misconfigured rules triggering alerts
Legitimate traffic being flagged as malicious
Inaccurate threat intelligence data
Inadequate correlation rules
Outdated signatures or patterns
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The goal is to identify and disrupt the attack at an early stage.
For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...
posted on 19 May 2024
I applied via LinkedIn and was interviewed before May 2023. There were 3 interview rounds.
Associate Software Engineer
89
salaries
| ₹4 L/yr - ₹9 L/yr |
Devops Engineer
25
salaries
| ₹4 L/yr - ₹11 L/yr |
Business Analyst
17
salaries
| ₹3 L/yr - ₹13.4 L/yr |
Data Engineer
13
salaries
| ₹6 L/yr - ₹10 L/yr |
Software Engineer
11
salaries
| ₹4 L/yr - ₹7 L/yr |
TCS
Infosys
Wipro
HCLTech