Faster and better experience!
Filter interviews by
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
The event life cycle of a SIEM solution involves several stages from data collection to incident response.
Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.
Normalization: The collected data is normalized to a common format for easier analysis and correlation.
Aggregation: Events are grouped together based on common attributes to identify patterns and t...
The OSI model is a conceptual framework that defines the functions of a network protocol stack.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and interacts with the layers above and below it.
The model helps in understanding how data is transmitted and received in a network.
For example, the Physical layer deals wi...
I applied via Campus Placement and was interviewed before Mar 2020. There were 4 interview rounds.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Example...
I applied via Company Website and was interviewed in Oct 2021. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
I appeared for an interview in Feb 2025.
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves protecting sensitive information from cyber threats like hacking and malware.
Includes measures such as firewalls, encryption, and intrusion detection systems.
Examples of cyber threats: phishing attacks, ransomware, and denial-of-service attacks.
Cybersecurity is essential for businesses to safegu...
Burp Suite is a popular web application security testing tool used for vulnerability scanning and penetration testing.
Comprises various tools like a proxy server, scanner, and intruder for testing web applications.
Allows interception and modification of HTTP/S requests and responses.
Can automate repetitive tasks, such as scanning for vulnerabilities.
Supports extensions and plugins for enhanced functionality, e.g., BApp...
IDOR (Insecure Direct Object Reference) is a security vulnerability allowing unauthorized access to objects via user-controlled input.
IDOR occurs when an application exposes a reference to an internal implementation object.
Example: A URL like 'example.com/user/123' could allow access to user data if '123' is manipulated.
Attackers can exploit IDOR by changing parameters to access unauthorized data.
Preventing IDOR involv...
based on 2 interviews
Interview experience
based on 6 reviews
Rating in categories
Software Engineer
310
salaries
| ₹3.7 L/yr - ₹16 L/yr |
Senior Software Engineer
152
salaries
| ₹7.6 L/yr - ₹29.3 L/yr |
Technical Support Engineer
148
salaries
| ₹2.8 L/yr - ₹7.5 L/yr |
System Analyst
144
salaries
| ₹4.7 L/yr - ₹16.4 L/yr |
Senior Enterprise Associate
133
salaries
| ₹4.1 L/yr - ₹13 L/yr |
IBM
Accenture
HCLTech
TCS