i
Aloola
Filter interviews by
Analysation and sitting permutations test was taken
Top trending discussions
I applied via job-board and was interviewed before Dec 2015. There were 4 interview rounds.
I have 5 years of experience in marketing and sales roles at various companies.
Worked in marketing and sales roles for 5 years
Managed social media campaigns and advertising strategies
Developed relationships with clients and increased sales revenue
posted on 31 Oct 2022
React is a JavaScript library for building user interfaces.
React allows for building reusable UI components
It uses a virtual DOM for efficient updates
React is declarative, making it easier to reason about code
It has a large and active community with many resources available
posted on 17 Jun 2024
I applied via Recruitment Consulltant and was interviewed in May 2024. There were 2 interview rounds.
Was given a requirement and asked to prepare the solution document and flow for the application based on the requirement.
I applied via Recruitment Consultant and was interviewed in Oct 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed in Oct 2024. There was 1 interview round.
The different phases of Incident Response are preparation, identification, containment, eradication, recovery, and lessons learned.
Preparation: Establishing policies and procedures, training staff, and implementing security measures.
Identification: Detecting and analyzing security incidents.
Containment: Isolating the affected systems to prevent further damage.
Eradication: Removing the threat and restoring systems to th...
Phishing is a type of cyber attack where attackers trick victims into revealing sensitive information.
Phishing can be done through emails, text messages, social media, or fake websites.
Spear phishing targets specific individuals or organizations.
Whaling is a type of phishing that targets high-profile individuals like CEOs.
Vishing is phishing done through phone calls.
Smishing is phishing done through SMS or text message...
Investigating a ransomware attack involves identifying the type of ransomware, analyzing the attack vector, and determining the extent of damage.
Isolate infected systems to prevent further spread
Identify the type of ransomware and its behavior
Analyze the attack vector (e.g. phishing email, exploit kit)
Determine the extent of damage and data loss
Attempt to recover encrypted data
Investigate any possible leads or suspects
...
Shimcache is a Windows registry key that stores information about recently executed programs.
Shimcache is used by forensic analysts to determine which programs were executed on a Windows system.
It can be accessed using tools like RegRipper and Volatility.
Shimcache can provide valuable information in malware investigations.
It stores information such as the file path, last modified time, and execution time of programs.
Sh...
I applied via Company Website and was interviewed in Mar 2023. There were 2 interview rounds.
posted on 2 Jun 2022
Verification is the process of evaluating a system or component to determine whether it meets the specified requirements. Testing is the process of executing a system or component with the intent of finding defects.
Verification ensures that the product meets the requirements and specifications.
Testing ensures that the product works as expected and does not have any defects.
Verification is done before testing.
Testing is...
posted on 28 Jul 2022
I applied via Approached by Company and was interviewed in Jun 2022. There were 2 interview rounds.
based on 1 interview
Interview experience
Novigo Integrated Services
Adsum Advisory Services
Azista Industries
E Merge Tech Global Services