Filter interviews by
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
Hash tables are data structures that store key-value pairs for efficient retrieval.
Hash tables use a hash function to map keys to indexes in an array.
They have constant time complexity for insertion, deletion, and lookup operations.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
I applied via Campus Placement and was interviewed before Sep 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2022. There were 5 interview rounds.
As per JD, i was being offered for a security Intern role and for this job description we have following in aptitude test:
20 questions in Problem Solving assesment and included topics were : Profit and Loss, HCM and LCM, simple interest, compound interest, Number system, Time & Work, Time, speed & distance, Ratio Analysis, Set theory, Profit & Loss, Percentages and Algebra.
30 questions from Technical topics like programming, coding, security and DBMS and oops.
And 10 questions from English Proficiency and communication .
There were 2 questions from security and management and questions were related to brute force, CTF and sort of simple concepts in LINUX.
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to maintain...
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code reviews an...
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing, web ...
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
Reasoning in Aptitude
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services incl
I applied via Job Fair and was interviewed in May 2024. There was 1 interview round.
English communication test
I applied via Campus Placement and was interviewed in Jul 2022. There were 2 interview rounds.
The 1st round is a written test. The written test consists of some Aptitude questions,technical and 2 coding questions.
A stack is a linear data structure that follows the Last-In-First-Out (LIFO) principle.
Applications include function call stack, undo-redo operations, infix to postfix conversion, and backtracking algorithms.
Push and pop operations are used to add and remove elements from the stack, respectively.
Fibonacci series can be implemented using a stack or recursion.
Stacks can be implemented using arrays or linked lists.
I applied via Campus Placement and was interviewed in Mar 2023. There were 3 interview rounds.
based on 2 interviews
Interview experience
Technical Specialist
305
salaries
| ₹15 L/yr - ₹38 L/yr |
Senior Associate
290
salaries
| ₹6.9 L/yr - ₹21.7 L/yr |
Network Engineer
235
salaries
| ₹2.9 L/yr - ₹14.1 L/yr |
Senior Technical Specialist
149
salaries
| ₹22.8 L/yr - ₹48 L/yr |
Senior Network Engineer
110
salaries
| ₹7 L/yr - ₹22 L/yr |
Jio
Vodafone Idea
Bharti Airtel
Ericsson