i
Cyber
Infrastructure
Filter interviews by
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an...
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of...
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
Top trending discussions
I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.
Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.
My name is John Smith.
Full name is John Smith
Common first and last name
Easy to remember and pronounce
I applied via Naukri.com and was interviewed before Oct 2023. There was 1 interview round.
Digital marketing pros n cons
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
Basic questions on array linked list and strings
I am drawn to your organization for its innovative projects, collaborative culture, and commitment to professional growth.
Innovative Projects: Your organization is known for cutting-edge technology solutions, such as the recent AI-driven application that enhances user experience.
Collaborative Culture: I admire your emphasis on teamwork, as seen in your hackathons that encourage cross-departmental collaboration and crea...
I applied via Naukri.com and was interviewed in Mar 2023. There were 3 interview rounds.
String related functions,virtual functions and STL concepts
I appeared for an interview before Feb 2024.
Two coding questions and one email writing task.
based on 1 interview experience
Difficulty level
Duration
Software Developer
264
salaries
| ₹2 L/yr - ₹9.2 L/yr |
Junior Software Developer
104
salaries
| ₹2 L/yr - ₹5 L/yr |
Junior Developer
52
salaries
| ₹2 L/yr - ₹5.4 L/yr |
Senior Software Developer
47
salaries
| ₹4 L/yr - ₹11.5 L/yr |
Senior Developer
28
salaries
| ₹4.5 L/yr - ₹9 L/yr |
AgreeYa Solutions
Apisero
Actalent Services
Stefanini