Filter interviews by
A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.
Honeypots are used to detect and analyze cyber threats in a controlled environment.
They can be deployed within an organization's network to attract and monitor malicious activities.
Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...
I handle security incidents by following established incident response procedures and utilizing various security tools.
Immediately isolate affected systems to prevent further damage
Collect and analyze relevant data to determine the scope and impact of the incident
Contain the incident by blocking malicious activity and removing threats
Communicate with stakeholders to keep them informed of the situation
Document the incid...
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .
To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.
Analyze the attack vector to understand how the attack occurred
Contain the attack by isolating affected systems and limiting further damage
Investigate the root cause of the attack to prevent future incidents
Implement necessary se...
To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.
Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks
Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities
Implement security patches provided by soft...
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to mainta
The port number for RDP (Remote Desktop Protocol) is 3389.
Port number for RDP is 3389
RDP uses TCP protocol
Commonly used for remote desktop connections
I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.
Basic information about experience
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
I came across a vulnerability in a web application that allowed for SQL injection attacks.
Identified lack of input validation in user inputs
Discovered that the application was directly executing user-supplied SQL queries
Suggested implementing parameterized queries to prevent SQL injection
Tested the vulnerability by attempting to inject SQL code through input fields
It depends on the specific use case and requirements.
TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.
UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.
Choose TCP for applications that require reliable data transmission, such as ...
Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.
Hashing is commonly used in password storage to securely store user passwords without storing the actual password.
Hashing is used in digital signatures to ensure the integrity of the signed data.
Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.
File integrity checks ...
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is online test. In this test there is question of apti and also coding and from 5g question.
There are two questions asked and time is enough to solve 60 minutes
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Check if the reversed string is equal to the original string
Create a function to add two numbers
Define a function that takes two parameters as input
Inside the function, add the two numbers together and return the result
Example: function addNumbers(num1, num2) { return num1 + num2; }
Binary search code implementation in Python
Define a function that takes a sorted array and a target value as input
Initialize two pointers, low and high, to the start and end of the array respectively
While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target
If array[mid] is equal to target, return mid
If array[mid] is less than target, update low to mid + 1
If array[mid]...
A program to check if a given name is a palindrome or not.
Convert the name to lowercase to handle case-insensitivity
Remove any spaces or special characters from the name
Reverse the name and compare it with the original name to check for palindrome
malloc and calloc are functions in C programming used for dynamic memory allocation.
malloc function is used to allocate a single block of memory of a specified size.
calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
I applied via Referral
I am open to any location that offers growth opportunities and a challenging work environment.
Open to relocation for the right opportunity
Prefer locations with strong networking infrastructure
Interested in locations with tech hubs or opportunities for professional development
My current CCTC is $80,000 per year.
Current CCTC is $80,000 per year
CCTC may include salary, bonuses, benefits, etc.
Negotiable based on experience and qualifications
Border Gateway Protocol
BGP stands for Border Gateway Protocol
It is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet
BGP helps in determining the best path for data to travel between networks
It is commonly used by Internet Service Providers (ISPs) and large organizations to connect to multiple networks
BGP operates on TCP port 179
Routers are networking devices that forward data packets between computer networks.
Routers operate at the network layer of the OSI model
They use routing tables to determine the best path for data packets
Routers can connect different types of networks, such as LANs and WANs
Expected CTC (Cost to Company) for the position
ECTC stands for Expected Cost to Company
It includes salary, bonuses, benefits, and any other compensation offered by the employer
Candidates should provide their expected salary range based on their experience and skills
Reliance Industries
Indian Oil Corporation
Bharat Petroleum
Hindustan Petroleum