i
Technovalley Software
Consulting
Filter interviews by
I am drawn to Technovally for its innovative approach to cybersecurity and commitment to excellence in protecting digital assets.
Technovally's reputation for cutting-edge cybersecurity solutions aligns with my passion for staying ahead of cyber threats.
The opportunity to work with a diverse team of experts will enhance my skills and broaden my perspective in the field.
I admire Technovally's commitment to continuous lea...
Top trending discussions
posted on 27 Jun 2025
I appeared for an interview in May 2025, where I was asked the following questions.
Cybersecurity tools help protect systems from threats, ensuring data integrity, confidentiality, and availability.
Antivirus Software: Examples include Norton, McAfee, and Bitdefender for malware protection.
Firewalls: Tools like pfSense and Cisco ASA help monitor and control incoming and outgoing network traffic.
Intrusion Detection Systems (IDS): Snort and Suricata detect and respond to potential threats.
Vulnerability S...
The main purpose of cybersecurity is to protect systems, networks, and data from cyber threats and unauthorized access.
Safeguarding sensitive information, such as personal data and financial records, from breaches.
Ensuring the integrity of systems by preventing unauthorized modifications, like malware attacks.
Maintaining availability of services by defending against denial-of-service attacks that disrupt operations.
Pro...
posted on 7 Jun 2025
Cyber security involves protecting systems, networks, and data from digital attacks and unauthorized access.
Cyber threats include malware, phishing, and ransomware attacks. For example, the WannaCry ransomware attack affected thousands of organizations globally.
Implementing firewalls and intrusion detection systems helps safeguard networks. For instance, a firewall can block unauthorized access.
Regular software updates...
CIA stands for Confidentiality, Integrity, and Availability, the core principles of information security.
Confidentiality: Ensures that sensitive information is accessed only by authorized individuals. Example: Encryption of data.
Integrity: Guarantees that data is accurate and unaltered. Example: Hash functions to verify data integrity.
Availability: Ensures that information and resources are accessible when needed. Exam...
posted on 3 Aug 2022
I applied via Recruitment Consulltant and was interviewed before Aug 2021. There were 2 interview rounds.
Hospital management syatem
Check the coding and databases connection and validations
posted on 11 Sep 2023
I applied via Walk-in and was interviewed in Aug 2023. There were 4 interview rounds.
Section 1. 10 questions aptitude
section 2. 10 oops questions based on c++
section 3. comprehension
section 4. 10 questions English grammar
One coding question. it's like two lines of question, understand the question and write the code using any programming language.
posted on 18 Oct 2023
Database realted task
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
Leetcode question sum of 3
I applied via Naukri.com and was interviewed in Apr 2023. There was 0 interview round.
Coding test with simple questions, related to the role
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Question from reduce,map method
based on 1 interview experience
Program Manager
5
salaries
| ₹3.7 L/yr - ₹8.1 L/yr |
Technical Consultant
4
salaries
| ₹2 L/yr - ₹3.4 L/yr |
Senior Consultant
3
salaries
| ₹3 L/yr - ₹4.2 L/yr |
Business Development Executive
3
salaries
| ₹1.9 L/yr - ₹2.2 L/yr |
Python Fullstack Developer
3
salaries
| ₹1.8 L/yr - ₹2.3 L/yr |
GrapplTech
Infotact Solutions
Wilco Source
Vizlogic Digital Solutions