Filter interviews by
Dealing with a sophisticated ransomware attack that encrypted critical data and demanded a large sum of money for decryption.
Quickly isolating infected systems to prevent further spread
Working with law enforcement and cybersecurity experts to investigate the source of the breach
Implementing backup and recovery procedures to restore encrypted data
Negotiating with attackers to minimize financial impact
Top trending discussions
Networking and testing techniques are essential for ensuring the functionality and performance of software applications.
Understanding of networking protocols such as TCP/IP, HTTP, and DNS is crucial for testing network-based applications.
Knowledge of testing techniques like black box testing, white box testing, and regression testing is important for ensuring comprehensive test coverage.
Experience with tools like Wires...
Psuedo code based test
posted on 8 Jul 2024
I applied via Recruitment Consulltant and was interviewed in Jun 2024. There was 1 interview round.
Web to Case allows customers to submit cases through a web form, while Email to Case converts emails into cases automatically.
Web to Case is a web form that customers can use to submit cases directly into Salesforce.
Email to Case automatically converts emails sent to a designated email address into cases in Salesforce.
Web to Case allows for customization of the web form fields and validation rules.
Email to Case can han...
Testing a complex workflow automation in Salesforce
Testing the functionality of a multi-step approval process in Salesforce
Verifying the behavior of triggers and workflows in a highly customized Salesforce instance
Testing the integration of Salesforce with external systems and ensuring data consistency
Validating the behavior of Salesforce automation tools like Process Builder and Flow Builder
posted on 7 Mar 2024
I applied via Campus Placement
Design a restaurant website with menu, reservation system, and location map.
Include high-quality images of the restaurant, food, and ambiance
Create a user-friendly navigation menu for easy access to different sections
Implement a reservation system with date, time, and party size options
Integrate a location map with directions and contact information
Ensure mobile responsiveness for easy access on different devices
posted on 31 Jan 2024
I applied via Referral and was interviewed in Dec 2023. There were 3 interview rounds.
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
based on 15 reviews
Rating in categories
Senior Security Analyst
5
salaries
| ₹22 L/yr - ₹23 L/yr |
System Engineer Hardware
5
salaries
| ₹9.5 L/yr - ₹12.3 L/yr |
Senior Analyst
4
salaries
| ₹12.3 L/yr - ₹20.5 L/yr |
Senior Consultant
4
salaries
| ₹5.1 L/yr - ₹12.6 L/yr |
Senior Data Analyst
4
salaries
| ₹7.3 L/yr - ₹10.5 L/yr |
Edelweiss
Motilal Oswal Financial Services
ICICI Securities
HDFC Securities