Filter interviews by
This question prompts me to connect my experiences and skills to the role I'm applying for.
My academic background in [Your Major] aligns with the internship requirements.
I have completed projects related to [Relevant Project/Experience], showcasing my skills.
My passion for [Relevant Field/Interest] drives my motivation to excel in this role.
I am eager to join this organization to gain hands-on experience, contribute to impactful projects, and grow professionally in my field.
I am passionate about the industry and want to learn from experienced professionals.
The company's values align with my own, particularly in innovation and community service.
I am excited about the opportunity to work on real-world projects, such as [specific project or initiative].
This ...
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.
DNS servers store records of domain names and their corresponding IP addresses, allowing for effi...
Wifi is used for high-speed internet access over a larger area, while Bluetooth is used for short-range communication between devices.
Wifi is used for connecting devices to the internet wirelessly over a larger area
Bluetooth is used for short-range communication between devices, typically within a range of 30 feet
Wifi typically offers faster data transfer speeds compared to Bluetooth
Wifi requires a network access point...
I appeared for an interview in Mar 2023.
I applied via Referral and was interviewed before Apr 2022. There were 4 interview rounds.
Question was Good
Asked question about aptitude
Question was okay
Asked question on c and java
Top trending discussions
I applied via Campus Placement and was interviewed before Sep 2020. There were 4 interview rounds.
Hash tables are data structures that store key-value pairs for efficient retrieval.
Hash tables use a hash function to map keys to indexes in an array.
They have constant time complexity for insertion, deletion, and lookup operations.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
Adding a tree child and subchild resembles creating directories and subdirectories in a file system.
A tree structure consists of nodes, where each node can have multiple children.
To add a child, create a new node and link it to the parent node.
For example, if 'Folder A' is a parent, 'Folder B' can be a child of 'Folder A'.
To add a subchild, link a new node to the child node, e.g., 'File 1' as a subchild of 'Folder B'.
T...
I'm a passionate student eager to learn and contribute, with a background in project management and a love for technology.
Currently pursuing a degree in Computer Science, focusing on software development.
Completed an internship at XYZ Corp, where I assisted in developing a mobile app.
Active member of the university coding club, participating in hackathons and workshops.
Volunteered at a local non-profit, helping to stre...
I applied via Campus Placement and was interviewed in Jan 2022. There were 5 interview rounds.
As per JD, i was being offered for a security Intern role and for this job description we have following in aptitude test:
20 questions in Problem Solving assesment and included topics were : Profit and Loss, HCM and LCM, simple interest, compound interest, Number system, Time & Work, Time, speed & distance, Ratio Analysis, Set theory, Profit & Loss, Percentages and Algebra.
30 questions from Technical topics like programming, coding, security and DBMS and oops.
And 10 questions from English Proficiency and communication .
There were 2 questions from security and management and questions were related to brute force, CTF and sort of simple concepts in LINUX.
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to maintain...
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code reviews an...
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing, web ...
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
Reasoning in Aptitude
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services incl...
based on 4 interview experiences
Difficulty level
Duration
based on 23 reviews
Rating in categories
Junior Engineer
117
salaries
| ₹4 L/yr - ₹8 L/yr |
Sub Divisional Engineer
111
salaries
| ₹8.3 L/yr - ₹25 L/yr |
Junior Accounts Officer
91
salaries
| ₹5.7 L/yr - ₹12 L/yr |
Junior Telecom Officer
71
salaries
| ₹4.7 L/yr - ₹12.5 L/yr |
Accounts Officer
40
salaries
| ₹8.2 L/yr - ₹14.6 L/yr |
Jio
Bharti Airtel
Ericsson
Nokia