i
BT
Group
Work with us
Filter interviews by
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code revie...
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to mai...
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing,...
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services...
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
Reasoning in Aptitude
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services incl...
I applied via Campus Placement and was interviewed in Jan 2022. There were 5 interview rounds.
As per JD, i was being offered for a security Intern role and for this job description we have following in aptitude test:
20 questions in Problem Solving assesment and included topics were : Profit and Loss, HCM and LCM, simple interest, compound interest, Number system, Time & Work, Time, speed & distance, Ratio Analysis, Set theory, Profit & Loss, Percentages and Algebra.
30 questions from Technical topics like programming, coding, security and DBMS and oops.
And 10 questions from English Proficiency and communication .
There were 2 questions from security and management and questions were related to brute force, CTF and sort of simple concepts in LINUX.
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to maintain...
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code reviews an...
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing, web ...
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
Top trending discussions
I appeared for an interview before May 2016.
I appeared for an interview in Mar 2017.
I enjoy coding personal projects, hiking, and reading tech blogs to stay updated on industry trends.
Coding personal projects: I recently built a weather app using React and OpenWeather API.
Hiking: I love exploring local trails and have completed several hikes in national parks.
Reading tech blogs: I regularly follow sites like Medium and Hacker News to learn about new technologies.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find the number of red fishes.
Subtract the number of red fishes from 200 to find the number of non-red fishes.
Calculate 2% of the total number of fishes to find the desired number of red fishes.
Subtract the desired number of red fishes from the current number of red fishes to find the number of fishes to be removed.
posted on 28 Jun 2017
I appeared for an interview in Mar 2017.
I excel in problem-solving, collaboration, and adaptability, which help me thrive in dynamic software development environments.
Strong problem-solving skills: I enjoy tackling complex coding challenges, like optimizing algorithms for better performance.
Effective collaboration: I have successfully worked in cross-functional teams, contributing to projects like a full-stack web application.
Adaptability: I quickly learn ne...
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find out how many fishes represent 1%.
Multiply the result by 2 to find out how many fishes represent 2%.
Subtract the result from 200 to find out how many fishes represent 98%.
I appeared for an interview in Mar 2017.
I'm a passionate software engineer with a strong background in full-stack development and a love for solving complex problems.
Education: Bachelor's degree in Computer Science from XYZ University.
Experience: 3 years of experience in developing web applications using React and Node.js.
Projects: Developed an e-commerce platform that increased sales by 30% within the first quarter.
Skills: Proficient in JavaScript, Python, ...
I have the technical skills, experience, and passion to deliver high-quality software solutions.
I have a strong background in programming languages such as Java, Python, and C++.
I have experience working on complex software projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in software development.
I am a quick learner and have a strong...
Ericsson is a global leader in telecommunications technology with a strong focus on innovation and career development.
Global leader in telecommunications technology
Strong focus on innovation
Opportunities for career development
Yes, I am open to relocating for the right opportunity, as it can enhance my career and personal growth.
Relocation can provide exposure to new technologies and methodologies.
Living in a different city can broaden my professional network.
I am adaptable and enjoy new experiences, which relocation offers.
For example, moving to a tech hub like San Francisco could open doors to innovative projects.
I enjoy coding personal projects, hiking, and reading tech blogs to stay updated on industry trends.
Coding personal projects: I often build small applications to explore new technologies.
Hiking: I love spending weekends in nature, which helps me recharge.
Reading tech blogs: I follow sites like Medium and Hacker News to stay informed.
I excel in problem-solving and teamwork, but I sometimes struggle with time management under pressure.
Strength: Strong problem-solving skills - I enjoy tackling complex coding challenges, like optimizing algorithms for better performance.
Strength: Effective teamwork - I thrive in collaborative environments, having successfully led a project with cross-functional teams.
Weakness: Time management - I occasionally underest...
Using Applied Electronics to prevent train accidents in IRCTC
Implement sensors to detect obstacles on tracks
Use GPS and communication systems to alert train drivers of potential dangers
Install automatic braking systems in case of emergency
Regular maintenance and inspection of tracks and trains
Train and educate staff on safety protocols and emergency procedures
The internet is a global network of interconnected devices that communicate using standardized protocols.
The internet is based on the TCP/IP protocol suite.
Data is transmitted in packets across the network.
The network model consists of layers, including the physical, data link, network, transport, and application layers.
Routing protocols are used to direct packets to their destination.
Examples of internet applications ...
I am a software engineer with experience in developing web and mobile applications using various programming languages and frameworks.
Proficient in Java, Python, and JavaScript
Experience with React, Angular, and Node.js
Strong understanding of database management systems
Passionate about learning new technologies and solving complex problems
I appeared for an interview in Feb 2017.
based on 1 interview experience
based on 3 reviews
Rating in categories
Associate Engineer
362
salaries
| ₹2.8 L/yr - ₹8.5 L/yr |
Associate
297
salaries
| ₹2.3 L/yr - ₹6.8 L/yr |
Financial Analyst
280
salaries
| ₹12.8 L/yr - ₹23 L/yr |
Project Manager
223
salaries
| ₹10.1 L/yr - ₹21.4 L/yr |
Network Engineer
218
salaries
| ₹2.7 L/yr - ₹8.1 L/yr |
Jio
Vodafone Idea
Bharti Airtel
Ericsson