i
AB InBev India
Filter interviews by
Clear (1)
Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers.
Blockchain is a chain of blocks containing transaction data.
Each block is linked to the previous one using cryptographic hashes.
Transactions are verified by network participants through consensus mechanisms like Proof of Work or Proof of Stake.
Once added to the blockchain, data is immutable and cann...
A man in the middle attack is when a hacker intercepts communication between two parties without their knowledge.
Occurs when a hacker secretly intercepts and possibly alters the communication between two parties
Commonly seen in public Wi-Fi networks where the hacker positions themselves between the user and the network
Can lead to sensitive information being stolen or manipulated
RSA is a public-key encryption algorithm used for secure communication over the internet.
RSA stands for Rivest-Shamir-Adleman, named after its inventors.
It uses a pair of keys - a public key for encryption and a private key for decryption.
RSA is widely used in secure communication protocols like HTTPS for secure browsing.
It is based on the difficulty of factoring large prime numbers.
RSA keys are typically 1024 or 2048
Security attacks are malicious activities aimed at compromising the confidentiality, integrity, or availability of information.
Types of security attacks include malware, phishing, ransomware, DDoS attacks, and man-in-the-middle attacks.
Attackers may exploit vulnerabilities in software or systems to gain unauthorized access or steal sensitive data.
Common goals of security attacks are financial gain, data theft, disrupti...
Active attacks involve the attacker directly interacting with the target system, while passive attacks involve monitoring and eavesdropping.
Active attacks involve modifying data, injecting malware, or disrupting services.
Passive attacks involve listening in on communications, capturing data, or analyzing traffic.
Examples of active attacks include denial of service (DoS) attacks and man-in-the-middle attacks.
Examples of...
I applied via Campus Placement and was interviewed in Dec 2024. There was 1 interview round.
3 easy-medium level coding questions
25 aptitude MCQs
30 technical MCQs
25 verbal english MCQs
I applied via Campus Placement
Games related to aptitude
What is more imp? Career or family?
Top trending discussions
I applied via Campus Placement and was interviewed in Apr 2024. There was 1 interview round.
The 7 P's of Marketing are key elements in a marketing strategy.
Product - what you are selling
Price - how much it costs
Place - where it is sold
Promotion - how you market it
People - who are your target customers
Process - how the product is delivered
Physical Evidence - tangible aspects of the product/service
I applied via Instahyre and was interviewed before Oct 2023. There were 2 interview rounds.
Online assessment based on cognitive assessment, technical assessment and coding
I am passionate about the industry and believe in the company's mission and values.
I admire the company's innovative approach to solving industry challenges.
I am impressed by the company's track record of success and growth.
I see great potential for learning and professional development at this company.
I am a motivated and detail-oriented individual with a passion for learning and problem-solving.
Graduate student studying computer science
Experience in software development through internships
Strong communication and teamwork skills
Interested in exploring new technologies and challenges
I am suitable for this job role due to my relevant education, experience, and skills in the field.
I have a degree in [relevant field] which has equipped me with the necessary knowledge for this role
I have [X] years of experience working in similar roles, where I have successfully [specific achievement]
I possess strong skills in [specific skill required for the job], as demonstrated by my previous projects
I am a quick l...
To initialize, run, and terminate a thread in Java, you can create a class that implements the Runnable interface and use the Thread class to start and stop the thread.
Create a class that implements the Runnable interface and override the run() method to define the task to be executed by the thread.
Create an instance of the class and pass it to a Thread object.
Call the start() method on the Thread object to initialize ...
RDBMS is a type of DBMS that stores data in a structured format using tables with relationships between them.
RDBMS enforces ACID properties (Atomicity, Consistency, Isolation, Durability) for database transactions.
DBMS is a general term for any system that manages a database, while RDBMS specifically refers to relational databases.
Examples of RDBMS include MySQL, Oracle, SQL Server, while DBMS examples include MongoDB,
I applied via Referral and was interviewed in Apr 2023. There were 2 interview rounds.
I applied via Company Website and was interviewed in Apr 2023. There were 4 interview rounds.
Direction ,mirror image , coding, blood relation , reasoning , etc duration 60 minutes
Assignment for job process
based on 3 interviews
Interview experience
based on 12 reviews
Rating in categories
Principal Analyst
593
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Scientist
259
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
224
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Analyst
212
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Data Scientist
118
salaries
| ₹0 L/yr - ₹0 L/yr |
United Breweries
Carlsberg
Diageo
Pernod Ricard