i
Apar Industries
Filter interviews by
Be the first one to contribute and help others!
I applied via Referral and was interviewed before Dec 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2023. There were 2 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates w...
I am passionate about cybersecurity and believe in the values and mission of your company.
I have a strong background in cybersecurity with experience in threat detection and prevention.
I am impressed by your company's reputation for innovative security solutions.
I am excited about the opportunity to work with a team of talented professionals in the field.
I believe that my skills and expertise align well with the challe
I applied via Walk-in and was interviewed in Aug 2023. There was 1 interview round.
Burp Suite is a web application security testing tool.
Burp Suite is used for manual and automated testing of web applications.
It includes various tools like a proxy, scanner, intruder, repeater, and sequencer.
The proxy tool allows intercepting and modifying HTTP/S traffic.
The scanner tool automatically identifies vulnerabilities in web applications.
The intruder tool can be used for brute-forcing, fuzzing, and payload t...
Nmap is a powerful network scanning tool used to discover hosts and services on a network.
Nmap can be used to scan specific hosts or entire networks.
It provides various scan types such as TCP, UDP, SYN, etc.
Nmap can detect open ports, running services, and operating systems.
It offers advanced features like OS fingerprinting, version detection, and script scanning.
Example: 'nmap -p 1-1000 -sS 192.168.0.1' scans ports 1
I applied via Referral and was interviewed before Jan 2021. There were 5 interview rounds.
I applied via Company Website and was interviewed before Jan 2023. There were 2 interview rounds.
Simple Python Coding questions.
I appeared for an interview before Feb 2024.
I applied via Approached by Company and was interviewed in Feb 2024. There were 3 interview rounds.
I have worked on projects related to developing software for autonomous vehicles and implementing machine learning algorithms for predictive maintenance.
Developed software for autonomous vehicles to improve navigation and obstacle avoidance
Implemented machine learning algorithms for predictive maintenance in manufacturing plants
Collaborated with cross-functional teams to integrate new technologies into existing systems
I have experience with Java, Python, SQL, AWS, Docker, and Kubernetes in my previous projects.
Java
Python
SQL
AWS
Docker
Kubernetes
Docker is a platform for developing, shipping, and running applications in containers.
Docker allows applications to be isolated in containers, making them portable and easy to deploy across different environments.
Containers share the host OS kernel but run as isolated processes, providing lightweight and efficient virtualization.
Docker simplifies the process of packaging applications and their dependencies, ensuring co...
Database normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Database normalization involves breaking down data into smaller, more manageable tables and defining relationships between them.
It helps in reducing data redundancy, improving data integrity, and making the database more efficient.
For example, in a project I worked on, we normalized the database by spl...
I have extensive experience working on challenging projects in various industries.
Led a team in developing a complex software solution for a major client
Managed a project with tight deadlines and limited resources
Implemented innovative solutions to overcome technical obstacles
Collaborated with cross-functional teams to deliver successful outcomes
I would approach learning about new domain and technologies with a different background by leveraging my existing skills, seeking out resources, and collaborating with experts in the field.
Identify key concepts and terminology in the new domain
Seek out online courses, tutorials, and books to gain foundational knowledge
Collaborate with colleagues or mentors who have experience in the new domain
Experiment with hands-on p...
Cryptography is the practice and study of techniques for securing information and communication.
Cryptography is used to protect data from unauthorized access.
It involves techniques such as encryption and decryption.
Common encryption algorithms include DES, 3DES, AES, and RC4.
Asymmetric encryption uses different keys for encryption and decryption, while symmetric encryption uses the same key.
Cryptography is essential fo
I applied via LinkedIn and was interviewed in Nov 2023. There were 4 interview rounds.
Assistant Manager
218
salaries
| ₹4.7 L/yr - ₹12 L/yr |
Deputy Manager
101
salaries
| ₹5.8 L/yr - ₹14.1 L/yr |
Senior Officer
57
salaries
| ₹3.6 L/yr - ₹8 L/yr |
Production Engineer
56
salaries
| ₹2.4 L/yr - ₹5.7 L/yr |
Officer
54
salaries
| ₹2.4 L/yr - ₹6 L/yr |
Qualcomm
TDK India Private Limited
Molex
Applied Materials