i
Arete
Work with us
Filter interviews by
The different phases of Incident Response are preparation, identification, containment, eradication, recovery, and lessons learned.
Preparation: Establishing policies and procedures, training staff, and implementing security measures.
Identification: Detecting and analyzing security incidents.
Containment: Isolating the affected systems to prevent further damage.
Eradication: Removing the threat and restoring systems to th...
Phishing is a type of cyber attack where attackers trick victims into revealing sensitive information.
Phishing can be done through emails, text messages, social media, or fake websites.
Spear phishing targets specific individuals or organizations.
Whaling is a type of phishing that targets high-profile individuals like CEOs.
Vishing is phishing done through phone calls.
Smishing is phishing done through SMS or text message...
Investigating a ransomware attack involves identifying the type of ransomware, analyzing the attack vector, and determining the extent of damage.
Isolate infected systems to prevent further spread
Identify the type of ransomware and its behavior
Analyze the attack vector (e.g. phishing email, exploit kit)
Determine the extent of damage and data loss
Attempt to recover encrypted data
Investigate any possible leads or suspects
...
Shimcache is a Windows registry key that stores information about recently executed programs.
Shimcache is used by forensic analysts to determine which programs were executed on a Windows system.
It can be accessed using tools like RegRipper and Volatility.
Shimcache can provide valuable information in malware investigations.
It stores information such as the file path, last modified time, and execution time of programs.
Sh...
Top trending discussions
posted on 28 Jun 2024
I applied via Approached by Company and was interviewed before Jun 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed before Feb 2022. There were 4 interview rounds.
Basic aptitude questions of quant and reasoning and general english
Case study of varies products asked around 15-20 which were easy to attempt
SQL is a programming language used for managing and manipulating relational databases. Excel formulas are used for performing calculations and data analysis in Microsoft Excel.
SQL is used to retrieve, insert, update, and delete data from databases.
Excel formulas are written using functions and operators to perform calculations and manipulate data.
SQL example: SELECT * FROM customers WHERE age > 30;
Excel formula example...
I applied via Referral and was interviewed in Jun 2022. There were 3 interview rounds.
Normal aptitude questions
I applied via Naukri.com and was interviewed before May 2023. There were 2 interview rounds.
There will be MCQ Questions. They will ask you to use internet and answer the questions.
They want to check your research skills.
Aptitude test of 30 min is conducted
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
There are simple technical test before manger round and it was very easy to crack
Moderate level, maths reasoning questions
I waa given telecom market in indua
based on 1 review
Rating in categories
Marketing Manager
8
salaries
| ₹9.9 L/yr - ₹24.9 L/yr |
HR Manager
5
salaries
| ₹10 L/yr - ₹13 L/yr |
Forensic Analyst
5
salaries
| ₹4.8 L/yr - ₹17.9 L/yr |
Architect
5
salaries
| ₹5.4 L/yr - ₹13.5 L/yr |
Data Analyst
5
salaries
| ₹5.2 L/yr - ₹13.5 L/yr |
GfK MODE
Avontix
Rapid Care Transcription
Value Rcm Solutions