Beyond Key Systems
10+ MJ Naidu Hospital Interview Questions and Answers
Q1. What is Agile mythology? how it is different then Waterfall process
Agile mythology is the set of beliefs and practices associated with Agile methodology, which is different from the Waterfall process.
Agile mythology emphasizes on iterative and incremental development
It values customer collaboration and responding to change over following a plan
Agile mythology promotes self-organizing teams and continuous improvement
Waterfall process follows a sequential approach with a fixed scope and plan
It has less flexibility to adapt to changing requirem...read more
Q2. Steps to perform Brute Force a login form using Burp Suite
Steps to perform Brute Force a login form using Burp Suite
1. Intercept the login request in Burp Suite
2. Send the request to Intruder module
3. Set the payload type to 'Cluster Bomb' and configure the payload options
4. Start the attack and analyze the responses
5. Use the results to identify valid credentials
Q3. How can you secure your application and protect it from hackers?
Securing an application involves implementing various security measures to protect it from hackers.
Implement strong authentication mechanisms such as multi-factor authentication
Regularly update software and patches to fix vulnerabilities
Use encryption to protect data both in transit and at rest
Implement firewalls and intrusion detection/prevention systems
Conduct regular security audits and penetration testing
Train employees on security best practices to prevent social enginee...read more
Q4. What is the difference between a clustered and a non-clustered index in SQL?
Clustered index physically reorders the data in the table while non-clustered index does not.
Clustered index determines the physical order of data in the table, while non-clustered index does not.
A table can have only one clustered index, but multiple non-clustered indexes.
Clustered index is faster for retrieval of data, but slower for insert and update operations compared to non-clustered index.
Example: Primary key in a table is usually implemented as a clustered index, whil...read more
Q5. What are the main uses of sealed classes and partial classes, and why are they necessary?
Sealed classes and partial classes are used in C# for different purposes such as restricting inheritance and organizing code.
Sealed classes are used to restrict inheritance, meaning they cannot be inherited by other classes. This is useful when you want to prevent further derivation of a class.
Partial classes are used to split the definition of a class into multiple files. This is helpful for organizing large classes or separating auto-generated code from custom code.
Sealed c...read more
Q6. Why CSP Headers are used
CSP headers are used to mitigate cross-site scripting (XSS) attacks by specifying which resources can be loaded on a webpage.
Prevent XSS attacks by restricting resources that can be loaded on a webpage
Specify allowed sources for scripts, stylesheets, images, fonts, etc.
Enforce security policies to protect against unauthorized code execution
Helps in detecting and mitigating security vulnerabilities in web applications
Q7. What is CORS vulnerability
CORS vulnerability allows attackers to make unauthorized requests to a website by bypassing the same-origin policy.
CORS stands for Cross-Origin Resource Sharing
It is a security feature implemented by browsers to prevent unauthorized access to resources on a different origin
Attackers can exploit misconfigured CORS policies to make requests from their own malicious website to the target website, potentially accessing sensitive data
Developers should properly configure CORS heade...read more
Q8. What is the difference between a lead and a contact
A lead is a potential customer who has shown interest in a product or service, while a contact is a person or organization with whom you have a relationship.
A lead is a potential customer who has not yet made a purchase, while a contact is someone you have already engaged with.
Leads are typically generated through marketing efforts, while contacts are usually obtained through networking or existing customer databases.
Leads require further nurturing to convert them into custom...read more
Q9. What is web designer and technology used?
A web designer is responsible for creating the visual elements of a website using various technologies such as HTML, CSS, and JavaScript.
Web designers use tools like Adobe Photoshop, Sketch, and Figma to create mockups and prototypes.
They work closely with UI/UX designers and developers to ensure a seamless user experience.
Knowledge of responsive design principles and accessibility standards is crucial for web designers.
Familiarity with front-end development technologies like...read more
Q10. MVVM vs MVC
MVVM and MVC are both design patterns used in software development to separate concerns and improve maintainability.
MVC separates the application into Model, View, and Controller components.
MVVM adds a ViewModel layer between the View and Model to handle user interactions and data binding.
MVVM is commonly used in WPF and Xamarin applications.
MVC is commonly used in web applications.
Both patterns aim to improve code organization and maintainability.
Top HR Questions asked in MJ Naidu Hospital
Interview Process at MJ Naidu Hospital
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month