i
Cyber
Toddler
Filter interviews by
I applied via Company Website and was interviewed in Jun 2023. There were 2 interview rounds.
Analyzing fileless malware involves examining memory and logs to identify and mitigate threats operating without traditional files.
Fileless malware often uses legitimate tools like PowerShell or WMI to execute code in memory.
Analyze memory dumps using tools like Volatility or Rekall to identify suspicious processes or injected code.
Check system logs for unusual activity, such as unexpected PowerShell commands or abnorm...
Initiating and executing an incident response plan for a potential malware outbreak
Immediately isolate the affected systems from the network to prevent further spread of the malware
Notify the incident response team and relevant stakeholders about the incident
Identify the type and severity of the malware to determine the appropriate response
Contain the malware by quarantining infected systems and disconnecting them from...
To monitor the runtime behavior of a suspicious executable without risking its spread, a Cyber Security Analyst can employ tools and techniques such as sandboxing, virtual machines, and dynamic analysis tools.
Utilize sandboxing techniques to isolate the malware and prevent it from infecting the host system.
Set up a virtual machine environment to run the suspicious executable, ensuring the malware is contained within th...
To analyze unknown malware, use static code analysis and reverse engineering techniques.
Use disassemblers and decompilers to analyze the code and understand its functionality.
Inspect the code for any potential vulnerabilities, such as buffer overflows or insecure coding practices.
Identify any obfuscation techniques used by the malware to evade detection.
Use debuggers to trace the execution flow and identify any malicio...
Top trending discussions
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Campus Placement and was interviewed before Sep 2021. There were 3 interview rounds.
A C program for designing calculator
Use switch case for different operations
Use scanf to take input from user
Use printf to display output
Use functions for each operation
Use loops for continuous calculations
I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do...
Some of the top questions asked at the Cyber Toddler Cyber Security Analyst interview -
based on 1 interview experience
Difficulty level
Duration
based on 2 reviews
Rating in categories
TCS
Accenture
Wipro
Cognizant