First Name* Last Name* Email* Phone Number*City*Select the CityBangaloreChennaiDelhiHyderabadKolkataMumbaiAhmedabadPuneOtherUpload CV*Accepted file types: doc, docx, pdf, Max. file size: 2 MB.Vulnerability Scan check for known vulnerabilities in configuration?* Yes No Risk analysis is analysis of cost/benefit if the vulnerability is not fixed?* Yes No Providing maximum administrative privileges is best security practice?* Yes No A Layer-2 switch can help restrict traffic on network?* Yes No Having deny all rule on the firewall is a best security practice?* Yes No Can having correct audit log setting help in forensic investigation?* Yes No SSL/TLS layer provides confidentiality and integrity while data is transmitting from source to destination?* Yes No Having password and additional PIN for authentication can be considered as 2-factor authentication?* Yes No Wireshark tool is used to detect insecure deserialization?* Yes No Linux netstat command can tell the listening services?* Yes No * “Yes, I would like ControlCase to contact me based on the information provided above. Read our Privacy Policy for details on how your information may be used.”NameThis field is for validation purposes and should be left unchanged.