i
Filter interviews by
I applied via Company Website and was interviewed before Jan 2023. There were 2 interview rounds.
Zero day attack is a cyber attack exploiting a vulnerability that is unknown to the software developer or vendor.
Zero day attack occurs when hackers exploit a software vulnerability before the developer releases a patch.
These attacks are dangerous because there is no defense or fix available at the time of the attack.
Examples include the Stuxnet worm and the WannaCry ransomware attack.
Top trending discussions
I applied via Naukri.com
BGP attributes are characteristics used to influence routing decisions in Border Gateway Protocol.
BGP attributes are used to determine the best path for routing traffic.
Some common BGP attributes include AS Path, Next Hop, Local Preference, and MED.
AS Path attribute shows the path of autonomous systems that the route has traversed.
Next Hop attribute indicates the IP address to reach the next hop for the route.
Local Pre...
RB stands for Routing and Bridging. It refers to the process of forwarding data packets between networks.
RB is a fundamental concept in networking.
It involves the routing of data packets between different networks.
Bridging refers to the process of connecting two or more network segments together.
RB helps in efficient data transmission and network connectivity.
Example: RB is used in routers to determine the best path fo
RIP version 1 is a classful routing protocol while RIP version 2 is a classless routing protocol.
RIP version 1 does not support VLSM (Variable Length Subnet Masking) while RIP version 2 does.
RIP version 1 does not support authentication while RIP version 2 does.
RIP version 1 broadcasts routing updates using the destination IP address 255.255.255.255 while RIP version 2 uses multicast address 224.0.0.9.
RIP version 1 sen...
STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks by creating a loop-free logical topology.
STP is used to prevent broadcast storms and network congestion caused by loops.
It works by electing a root bridge and calculating the shortest path to the root bridge for each network segment.
STP uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
It employs a ...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Aug 2023. There were 3 interview rounds.
Work Never waste time
System problems in error refer to issues or errors that occur within a computer system.
System problems can include hardware malfunctions, software bugs, network issues, and security breaches.
Troubleshooting system problems often involves identifying the root cause of the issue and implementing a solution.
Examples of system problems in error include blue screen errors, application crashes, slow performance, and connecti
posted on 23 Oct 2021
I applied via Naukri.com
I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.
It was good, just basic questions
3 questions were there based on chosen programming language, moderate level
Project Engineer
2.8k
salaries
| ₹3.7 L/yr - ₹12.6 L/yr |
Project Associate
427
salaries
| ₹2.6 L/yr - ₹6 L/yr |
Software Developer
178
salaries
| ₹1 L/yr - ₹9.5 L/yr |
Senior Project Engineer
126
salaries
| ₹6 L/yr - ₹15.5 L/yr |
Software Engineer
81
salaries
| ₹3 L/yr - ₹9.2 L/yr |
National Informatics Centre
TCS
Wipro
Infosys