i
Aloola
Filter interviews by
Analysation and sitting permutations test was taken
Top trending discussions
posted on 17 Jun 2024
I applied via Recruitment Consulltant and was interviewed in May 2024. There were 2 interview rounds.
Was given a requirement and asked to prepare the solution document and flow for the application based on the requirement.
posted on 31 Oct 2022
React is a JavaScript library for building user interfaces.
React allows for building reusable UI components
It uses a virtual DOM for efficient updates
React is declarative, making it easier to reason about code
It has a large and active community with many resources available
I applied via job-board and was interviewed before Dec 2015. There were 4 interview rounds.
I have 5 years of experience in marketing and sales roles at various companies.
Worked in marketing and sales roles for 5 years
Managed social media campaigns and advertising strategies
Developed relationships with clients and increased sales revenue
The different phases of Incident Response are preparation, identification, containment, eradication, recovery, and lessons learned.
Preparation: Establishing policies and procedures, training staff, and implementing security measures.
Identification: Detecting and analyzing security incidents.
Containment: Isolating the affected systems to prevent further damage.
Eradication: Removing the threat and restoring systems to th...
Phishing is a type of cyber attack where attackers trick victims into revealing sensitive information.
Phishing can be done through emails, text messages, social media, or fake websites.
Spear phishing targets specific individuals or organizations.
Whaling is a type of phishing that targets high-profile individuals like CEOs.
Vishing is phishing done through phone calls.
Smishing is phishing done through SMS or text message...
Investigating a ransomware attack involves identifying the type of ransomware, analyzing the attack vector, and determining the extent of damage.
Isolate infected systems to prevent further spread
Identify the type of ransomware and its behavior
Analyze the attack vector (e.g. phishing email, exploit kit)
Determine the extent of damage and data loss
Attempt to recover encrypted data
Investigate any possible leads or suspects
...
Shimcache is a Windows registry key that stores information about recently executed programs.
Shimcache is used by forensic analysts to determine which programs were executed on a Windows system.
It can be accessed using tools like RegRipper and Volatility.
Shimcache can provide valuable information in malware investigations.
It stores information such as the file path, last modified time, and execution time of programs.
Sh...
I applied via Recruitment Consultant and was interviewed in Oct 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed in Oct 2024. There was 1 interview round.
posted on 15 Mar 2024
posted on 14 May 2023
I applied via Naukri.com and was interviewed in Apr 2023. There were 2 interview rounds.
I am an experienced professional with a strong background in operations management.
Over 5 years of experience in managing operations in various industries
Proven track record of improving efficiency and productivity
Strong leadership and team management skills
Excellent problem-solving and decision-making abilities
Proficient in using various operational tools and software
Implemented cost-saving measures resulting in a 20%...
posted on 3 Mar 2025
I was interviewed before Mar 2024.
based on 1 interview
Interview experience
Novigo Integrated Services
Adsum Advisory Services
Azista Industries
E Merge Tech Global Services