Filter interviews by
I applied via Walk-in and was interviewed in Nov 2024. There were 3 interview rounds.
They ask you to talk about pros and cons about some topic
I applied via Approached by Company and was interviewed in Apr 2024. There were 4 interview rounds.
TCP is connection-oriented and reliable, while UDP is connectionless and faster but less reliable.
TCP is part of the cyber kill chain as it ensures reliable data transmission and sequencing.
UDP can be used in the cyber kill chain for faster data transmission, but with the risk of data loss.
TCP is commonly used for tasks like file transfers, email, and web browsing, while UDP is used for real-time applications like vide
I applied via Naukri.com and was interviewed before Jul 2023. There were 3 interview rounds.
Speaking about a random topic for a few minutes
Run of the mill aptitude questions and some basic cybersecurity questions
Types of social engineering include phishing, pretexting, baiting, tailgating, and quid pro quo.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Pretexting: creating a false scenario to manipulate individuals into sharing information
Baiting: offering something enticing to trick individuals into providing information or access
Tailgating: unauthorized individuals following ...
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred over a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of layers include physical layer, data link layer, network layer, transport layer, etc
I applied via Job Portal and was interviewed before Jan 2024. There were 4 interview rounds.
Cybersecurity phases and generative ai
Artificial intelligence
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or attacks
Includes measures such as firewalls, encryption, antivirus software, and regular security updates
Cybersecurity professionals work to prevent, detect, and respond to cyber threats
Examples of cyber threats include malware
By monitoring keywords, analyzing user behavior, and utilizing social media monitoring tools.
Monitor keywords related to threats, violence, or harmful activities
Analyze user behavior for suspicious patterns or activities
Utilize social media monitoring tools to track mentions of threats or harmful content
I am passionate about utilizing my technical skills to optimize platforms and drive business growth.
I have a strong background in platform management and optimization.
I enjoy analyzing data and identifying opportunities for improvement.
I am excited about the opportunity to work with cutting-edge technology and drive innovation.
I am motivated by the challenge of helping businesses achieve their goals through platform op
ZeroFOX interview questions for designations
I applied via Referral and was interviewed in Nov 2023. There were 3 interview rounds.
Basic coding questions were there related to string operations
TLS handshake is the process of establishing a secure connection between a client and a server.
TLS handshake is initiated by the client and involves a series of steps to negotiate encryption parameters and exchange cryptographic keys.
It ensures the authenticity, integrity, and confidentiality of data transmitted over the network.
The handshake includes the ClientHello, ServerHello, Certificate Exchange, Key Exchange, an...
When you hit a URL in a browser, a request is sent to the server and the server responds with the requested webpage.
Typically, the browser sends an HTTP GET request to the server.
The server processes the request and generates a response.
The response may include HTML, CSS, JavaScript, and other resources needed to render the webpage.
The browser receives the response and renders the webpage for the user to view and inter...
I have worked on various protocols including HTTP, TCP/IP, and MQTT.
HTTP (Hypertext Transfer Protocol) - used for communication between web browsers and servers
TCP/IP (Transmission Control Protocol/Internet Protocol) - the foundation of the internet
MQTT (Message Queuing Telemetry Transport) - a lightweight messaging protocol for IoT devices
I applied via Campus Placement and was interviewed before Sep 2022. There were 3 interview rounds.
Difficult to answer some of DSP concepts
Should be able to answer all embedded RTOS concepts
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
It includes two DSA questions and some aptitude questions
I applied via Referral and was interviewed in May 2024. There were 4 interview rounds.
Easy to medium leetcode
I applied via Referral and was interviewed in Mar 2024. There were 2 interview rounds.
Basic coding questions
I appeared for an interview before May 2023.
Mcqs + 2 coding questions fairly easy one
Implementing a neural network for image recognition
Research different types of neural networks such as Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs)
Study how to preprocess image data and feed it into the neural network
Learn about popular deep learning frameworks like TensorFlow or PyTorch
Experiment with training a neural network on a dataset like MNIST for digit recognition
Traversing web pages with links in specific orders requires web scraping and following the links recursively.
Use web scraping tools like BeautifulSoup or Scrapy to extract links from web pages.
Implement a recursive function to follow the links in specific orders (e.g. depth-first or breadth-first).
Track visited pages to avoid infinite loops or revisiting the same pages.
Handle errors and exceptions when accessing web pa
based on 4 interviews
2 Interview rounds
based on 6 reviews
Rating in categories
Platform Specialist
41
salaries
| ₹2.6 L/yr - ₹4.5 L/yr |
Cyber Security Analyst
20
salaries
| ₹3 L/yr - ₹5 L/yr |
Security Analyst
13
salaries
| ₹3.2 L/yr - ₹5 L/yr |
Team Lead
12
salaries
| ₹5.7 L/yr - ₹12.2 L/yr |
Technical Lead
9
salaries
| ₹15.3 L/yr - ₹17 L/yr |
Vindhya Telelinks
Presto Infosolutions
Accord Synergy
Compuage Infocom