Filter interviews by
I applied via Referral and was interviewed in Jun 2021. There were 5 interview rounds.
Post covid-19, cyber-security market will see an increase in demand due to remote work and online transactions.
Remote work and online transactions have increased the risk of cyber-attacks.
Organizations will invest more in cyber-security solutions to protect their data and systems.
Cloud-based security solutions will become more popular.
Customers will prioritize solutions that offer remote management and monitoring capab...
Checkpoint's unique differentiators are advanced threat prevention, unified security management, and cloud security solutions.
Advanced threat prevention: Checkpoint's SandBlast technology provides real-time protection against zero-day and advanced threats.
Unified security management: Checkpoint's Security Management Portal allows for centralized management of security policies across multiple environments.
Cloud securit...
The approach for making a cyber case varies based on the client's size and type.
For MSPs, focus on the benefits of outsourcing security and the cost savings compared to hiring an in-house team.
For large enterprises, emphasize the need for a comprehensive security strategy and the potential financial and reputational damage of a breach.
For government entities, highlight compliance requirements and the importance of prot...
Gartner recommends a zero-trust approach to secure remote workforces. Best practices include multi-factor authentication, VPNs, and endpoint protection.
Gartner recommends a zero-trust approach to security
Implement multi-factor authentication for all remote access
Use VPNs to secure remote connections
Ensure endpoint protection is up-to-date and includes firewalls and anti-virus software
Train employees on secure remote wo...
Yes, I have experience working with compliances like RBI, PCIDSS, GDPR, HIPAA.
I have worked with the Reserve Bank of India (RBI) guidelines to ensure compliance in financial product sales.
I am familiar with the Payment Card Industry Data Security Standard (PCIDSS) and have implemented necessary measures to protect customer data.
I have worked with the General Data Protection Regulation (GDPR) to ensure the privacy and s...
IOT security focuses on securing devices and data in the Internet of Things, while OT security focuses on securing operational technology systems.
IOT security involves securing devices and data in the Internet of Things, which includes sensors, smart devices, and other connected devices.
OT security involves securing operational technology systems, which includes industrial control systems, SCADA systems, and other syst...
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
Top trending discussions
I applied via Naukri.com and was interviewed before Jun 2020. There were 5 interview rounds.
I applied via Campus Placement and was interviewed before Sep 2021. There were 4 interview rounds.
Math and verbal round .
General topics to speak
Implement a function to find duplicates in an array of strings using Hashmap.
Create a Hashmap to store the frequency of each string in the array
Iterate through the array and check if the frequency of any string is greater than 1
If yes, add it to the list of duplicates
Return the list of duplicates
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
This was a technical round with questions on DBMS.
Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle.
Data integrity ensures that data is accurate and consistent in storage and transmission.
It involves maintaining the quality and reliability of data over time.
Methods for ensuring data integrity include checksums, encryption, and error detection codes.
Examples of data integrity violations include data corruption, unautho
A trigger is a special type of stored procedure that automatically executes when certain events occur in a database.
Triggers are used to enforce business rules, maintain data integrity, and automate repetitive tasks.
They can be triggered by INSERT, UPDATE, or DELETE operations on a table.
Examples of triggers include auditing changes to a table, updating related tables when a record is modified, or enforcing referential
Clustered indexes physically order the data in the table, while non-clustered indexes do not.
Clustered indexes determine the physical order of data in the table, while non-clustered indexes do not.
A table can have only one clustered index, but multiple non-clustered indexes.
Clustered indexes are faster for retrieval of data, especially range queries, compared to non-clustered indexes.
Non-clustered indexes are stored se...
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions on DBMS.
UNION combines and removes duplicates, UNION ALL combines without removing duplicates.
UNION merges the result sets of two or more SELECT statements and removes duplicates.
UNION ALL merges the result sets of two or more SELECT statements without removing duplicates.
UNION is slower than UNION ALL as it involves removing duplicates.
Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2;
Example: SELECT column...
A cursor in PL/SQL is used to retrieve and process multiple rows of data one at a time.
Allows iteration over a result set
Retrieves data row by row
Can be used to update or delete rows in a table
Must be declared, opened, fetched, and closed
SQL query to fetch the nth highest salary from a table
Use the ORDER BY clause to sort salaries in descending order
Use the LIMIT clause to fetch the nth highest salary
Round duration - 30 minutes
Round difficulty - Easy
This was a managerial round with typical behavioral problems.
Tip 1 : Since this was a SQL post, I would suggest you to get the basics intact and try practicing few queries.
Tip 2 : Must do Previously asked Interview as well as Online Test Questions.
Tip 3 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
I was interviewed before May 2016.
posted on 19 Aug 2016
I am a software developer with experience in Java and Python.
Proficient in Java and Python programming languages
Experience in developing web applications using Spring framework
Familiarity with database management systems such as MySQL and MongoDB
I have achieved success in developing and implementing various software solutions.
Developed a web application that increased user engagement by 30%
Implemented a new feature that reduced system downtime by 50%
Created a mobile app that received 4.5-star rating on app stores
Led a team of developers to successfully complete a project within a tight deadline
I work on a variety of projects ranging from web development to mobile app development.
Web development using HTML, CSS, JavaScript, and various frameworks such as React and Angular
Mobile app development for iOS and Android using Swift, Kotlin, and React Native
Database design and management using SQL and NoSQL databases such as MySQL and MongoDB
API development and integration using REST and GraphQL
Machine learning proje...
A hardworker puts in more effort, while a smartworker works efficiently and effectively.
A hardworker may spend more time on a task, while a smartworker finds ways to complete it faster.
A hardworker may rely on brute force, while a smartworker uses their skills and knowledge to solve problems.
A hardworker may struggle with prioritization, while a smartworker knows how to focus on the most important tasks.
A hardworker ma...
Zuckerberg is in news due to Facebook's handling of user data and misinformation.
Facebook's role in the 2016 US Presidential election
Cambridge Analytica scandal
Testimony before US Congress
Ongoing debate on social media regulation
I am a software developer with experience in Java and Python.
I have a Bachelor's degree in Computer Science.
I have worked on various projects involving web development and data analysis.
I am proficient in Java and Python programming languages.
I am a quick learner and enjoy working in a team environment.
My favorite project is the e-commerce website I developed for a local business.
I enjoyed working on the front-end design and user experience.
I implemented a secure payment gateway and order tracking system.
The website increased the business's online sales by 50%.
I received positive feedback from the client and their customers.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class and can also add its own unique properties and ...
finally is a keyword used in try-catch block, finalize is a method in Object class, and final is a keyword used for declaring constants.
finally is used to execute a block of code after try-catch block
finalize is called by garbage collector before destroying an object
final is used to declare a constant variable or to make a class uninheritable
Private keyword restricts access to member functions within the class while final keyword prevents overriding of functions.
Private keyword is used to hide the implementation details of a class from the user.
Final keyword is used to prevent the user from overriding a function in a subclass.
Using private and final keywords together can ensure that the implementation details of a class are not modified by the user.
An interface defines a set of methods that a class must implement.
An interface is declared using the 'interface' keyword.
All methods in an interface are public and abstract by default.
A class can implement multiple interfaces.
Interfaces can also extend other interfaces.
Example: public interface MyInterface { void myMethod(); }
Abstract class is a class with some implementation while Interface is a contract with no implementation.
Abstract class can have constructors while Interface cannot
Abstract class can have non-abstract methods while Interface cannot
A class can implement multiple interfaces but can only inherit from one abstract class
Abstract class is used when there is a need for common functionality among related classes while Interface...
Inheritance types in Java
Java supports single and multiple inheritance through classes and interfaces respectively
Single inheritance is when a class extends only one parent class
Multiple inheritance is when a class implements multiple interfaces
Java also supports hierarchical inheritance where multiple classes extend a single parent class
Java does not support multiple inheritance through classes to avoid the diamond pr
Order of catch blocks in a try block in Java
Specific catch blocks should come before general catch blocks
If general catch block comes before specific catch block, it will result in a compile-time error
If multiple catch blocks are present, only the first matching catch block will be executed
Garbage collection is an automatic memory management process that frees up memory occupied by objects that are no longer in use.
Garbage collection is used in programming languages like Java, C#, and Python.
It helps prevent memory leaks and reduces the risk of crashes due to memory exhaustion.
Garbage collection works by identifying objects that are no longer in use and freeing up the memory they occupy.
There are differe...
Code for connecting a Java application to a database
Import the JDBC driver for the specific database
Create a connection object using the DriverManager class
Create a statement object to execute SQL queries
Execute the query and retrieve the results
Close the connection and release resources
JSON stands for JavaScript Object Notation, a lightweight data interchange format.
JSON is used to transmit data between a server and a web application, as an alternative to XML.
It is easy to read and write for humans and easy to parse and generate for machines.
JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C family of languages.
Example: {"name"
Some of the top questions asked at the Check Point Software Technologies interview -
based on 2 interviews
Interview experience
based on 40 reviews
Rating in categories
Technical Support Engineer
21
salaries
| ₹0 L/yr - ₹0 L/yr |
TAC Engineer
20
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Engineer
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Order Management Coordinator
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Security Engineer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Palo Alto Networks
Fortinet
Gen
McAfee