PhoneThis field is for validation purposes and should be left unchanged.First Name*Last Name*Email* Phone Number*City*Select the CityBangaloreChennaiDelhiHyderabadKolkataMumbaiAhmedabadPuneOtherUpload CV*Accepted file types: doc, docx, pdf, Max. file size: 2 MB. Vulnerability Scan check for known vulnerabilities in configuration?* Yes No Risk analysis is analysis of cost/benefit if the vulnerability is not fixed?* Yes No Providing maximum administrative privileges is best security practice?* Yes No A Layer-2 switch can help restrict traffic on network?* Yes No Having deny all rule on the firewall is a best security practice?* Yes No Can having correct audit log setting help in forensic investigation?* Yes No SSL/TLS layer provides confidentiality and integrity while data is transmitting from source to destination?* Yes No Having password and additional PIN for authentication can be considered as 2-factor authentication?* Yes No Wireshark tool is used to detect insecure deserialization?* Yes No Linux netstat command can tell the listening services?* Yes No * “Yes, I would like ControlCase to contact me based on the information provided above. Read our Privacy Policy for details on how your information may be used.”