Filter interviews by
Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.
Hash functions take an input (or 'message') and return a fixed-size string of bytes.
Common hashing algorithms include MD5, SHA-1, and SHA-256.
Hashing is used in password storage to securely store user credentials.
A hash is deterministic; the same input will always produce the same outpu...
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves safeguarding information systems from cyber threats like malware and phishing.
Includes measures such as firewalls, encryption, and intrusion detection systems.
Examples of cyber threats: ransomware attacks, data breaches, and denial-of-service attacks.
Focuses on both hardware and software se...
Encoding is the process of converting data into a specific format for efficient transmission or storage.
Encoding transforms data into a different format, such as converting text to binary.
Common encoding schemes include Base64, URL encoding, and ASCII.
Base64 is often used to encode binary data for transmission over text-based protocols.
URL encoding replaces unsafe ASCII characters with a '%' followed by two hexade...
Postman is a popular API development tool used for testing and managing APIs efficiently.
Postman allows users to send requests to APIs and view responses.
It supports various request types like GET, POST, PUT, DELETE.
Users can organize requests into collections for better management.
Postman provides features for automated testing and monitoring of APIs.
It has a user-friendly interface that simplifies API interactio...
ZAP refers to a tool for finding vulnerabilities in web applications through automated testing.
ZAP stands for Zed Attack Proxy, developed by OWASP.
It is an open-source web application security scanner.
ZAP helps identify security vulnerabilities like SQL injection and XSS.
It provides automated scanners as well as various tools for manual testing.
ZAP can be integrated into CI/CD pipelines for continuous security tes...
SAST analyzes source code for vulnerabilities, while DAST tests running applications for security flaws.
SAST (Static Application Security Testing) examines source code or binaries without executing the program.
DAST (Dynamic Application Security Testing) tests the application in its running state, simulating attacks.
SAST can identify vulnerabilities early in the development process, such as SQL injection in code.
DA...
CIA principles ensure data security through Confidentiality, Integrity, and Availability.
Confidentiality: Protecting sensitive information from unauthorized access (e.g., encryption).
Integrity: Ensuring data accuracy and consistency (e.g., checksums to verify data integrity).
Availability: Ensuring that information is accessible when needed (e.g., redundant systems to prevent downtime).
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves safeguarding information systems from cyber threats like malware and phishing.
Includes measures such as firewalls, encryption, and intrusion detection systems.
Examples of cyber threats: ransomware attacks, data breaches, and denial-of-service attacks.
Focuses on both hardware and software securit...
Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.
Hash functions take an input (or 'message') and return a fixed-size string of bytes.
Common hashing algorithms include MD5, SHA-1, and SHA-256.
Hashing is used in password storage to securely store user credentials.
A hash is deterministic; the same input will always produce the same output.
Has...
Encoding is the process of converting data into a specific format for efficient transmission or storage.
Encoding transforms data into a different format, such as converting text to binary.
Common encoding schemes include Base64, URL encoding, and ASCII.
Base64 is often used to encode binary data for transmission over text-based protocols.
URL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal...
SAST analyzes source code for vulnerabilities, while DAST tests running applications for security flaws.
SAST (Static Application Security Testing) examines source code or binaries without executing the program.
DAST (Dynamic Application Security Testing) tests the application in its running state, simulating attacks.
SAST can identify vulnerabilities early in the development process, such as SQL injection in code.
DAST is...
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
ZAP refers to a tool for finding vulnerabilities in web applications through automated testing.
ZAP stands for Zed Attack Proxy, developed by OWASP.
It is an open-source web application security scanner.
ZAP helps identify security vulnerabilities like SQL injection and XSS.
It provides automated scanners as well as various tools for manual testing.
ZAP can be integrated into CI/CD pipelines for continuous security testing.
Postman is a popular API development tool used for testing and managing APIs efficiently.
Postman allows users to send requests to APIs and view responses.
It supports various request types like GET, POST, PUT, DELETE.
Users can organize requests into collections for better management.
Postman provides features for automated testing and monitoring of APIs.
It has a user-friendly interface that simplifies API interaction.
CIA principles ensure data security through Confidentiality, Integrity, and Availability.
Confidentiality: Protecting sensitive information from unauthorized access (e.g., encryption).
Integrity: Ensuring data accuracy and consistency (e.g., checksums to verify data integrity).
Availability: Ensuring that information is accessible when needed (e.g., redundant systems to prevent downtime).
Top trending discussions
posted on 23 Jun 2022
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
I applied via Walk-in and was interviewed before Nov 2018. There were 4 interview rounds.
I applied via Company Website and was interviewed in May 2020. There were 4 interview rounds.
I applied via Walk-in and was interviewed before Feb 2021. There were 4 interview rounds.
They will give you one topic, you have to talk about that.
Simple question will be there
I come from a close-knit family that values education and hard work, with diverse backgrounds and strong support for each other.
My parents are both educators, instilling a love for learning in my siblings and me.
I have two siblings; my brother is an engineer and my sister is pursuing a career in healthcare.
Family gatherings are a big part of our lives, where we share experiences and support each other's goals.
We value ...
In my previous role as a Senior Analyst, I focused on data analysis, project management, and strategic recommendations for business growth.
Conducted in-depth data analysis to identify trends and insights, leading to a 15% increase in operational efficiency.
Managed cross-functional projects, collaborating with teams from marketing, finance, and IT to ensure alignment on objectives.
Developed and presented strategic repor...
I bring a unique blend of analytical skills, industry experience, and a passion for data-driven decision-making.
Proven track record of delivering actionable insights that led to a 20% increase in operational efficiency in my previous role.
Strong proficiency in data visualization tools like Tableau and Power BI, which I used to create dashboards that improved stakeholder engagement.
Experience in cross-functional collabo...
In five years, I envision myself as a strategic leader, driving impactful data-driven decisions and mentoring junior analysts.
I aim to lead a team of analysts, fostering a collaborative environment to enhance productivity.
I plan to deepen my expertise in advanced analytics tools, such as machine learning and AI, to drive innovative solutions.
I aspire to contribute to strategic decision-making processes, influencing com...
I excel in analytical thinking and communication, but I sometimes struggle with delegation and time management.
Strength: Strong analytical skills - I successfully identified trends in data that led to a 15% increase in operational efficiency.
Strength: Excellent communication - I effectively presented complex data insights to stakeholders, resulting in informed decision-making.
Weakness: Difficulty in delegation - I tend...
Experienced Senior Analyst with a strong background in data analysis, project management, and strategic decision-making.
Over 7 years of experience in data analysis, focusing on financial and operational metrics.
Led a project that improved reporting efficiency by 30%, resulting in faster decision-making.
Skilled in using tools like SQL, Python, and Tableau for data visualization and analysis.
Collaborated with cross-funct...
posted on 7 Apr 2021
I applied via Naukri.com and was interviewed in Jan 2021. There was 1 interview round.
Algorithms, blood relations and basic math and aptitude question
based on 1 interview experience
based on 1 review
Rating in categories
Process Advisor
675
salaries
| ₹1 L/yr - ₹7.1 L/yr |
Assistant Manager
490
salaries
| ₹7 L/yr - ₹22 L/yr |
Assistant Vice President
427
salaries
| ₹14 L/yr - ₹40.1 L/yr |
Senior Analyst
270
salaries
| ₹4 L/yr - ₹10 L/yr |
Process Associate
190
salaries
| ₹1 L/yr - ₹8.8 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
Virtusa Consulting Services