i
Confidential Company
Filter interviews by
A domain is a group of network devices that share a common address and can communicate with each other.
Domains are used to organize and manage network resources.
Each domain has a unique name and can contain multiple devices.
Domains help in controlling access to resources and managing security.
Examples: Microsoft Active Directory, DNS domains.
Authentication systems are designed to verify the identity of users accessing a system or application.
Implement multi-factor authentication for added security
Use strong encryption to protect user credentials
Regularly update and patch authentication systems to prevent vulnerabilities
Implement account lockout policies to prevent brute force attacks
Adapting to rapidly changing technology and staying updated with new advancements.
Keeping up with new software updates and technologies
Learning new programming languages and frameworks
Adapting to changes in cybersecurity threats
Balancing workload with continuous learning and professional development
Top trending discussions
I applied via Walk-in and was interviewed before Nov 2021. There was 1 interview round.
Static class and static constructor in C#
Static class can only contain static members and cannot be instantiated
Static constructor is called only once when the class is first accessed
Static constructor is used to initialize static members of the class
Example: Math class in C# is a static class
Example: static constructor can be used to initialize a static variable with a value
Performance improvement in Angular app
Use lazy loading to load modules on demand
Optimize change detection strategy
Use trackBy function in ngFor loops
Minimize DOM manipulation
Use AOT compilation
Implement server-side rendering
Use web workers for heavy computations
Use caching for frequently accessed data
Performing web application penetration testing on a website with firewall enabled.
Identify the type of firewall and its configuration
Perform reconnaissance to gather information about the target
Identify vulnerabilities and exploit them
Use tools like Burp Suite, Nmap, and Metasploit
Test for common web application vulnerabilities like SQL injection and cross-site scripting
Document findings and provide recommendations for
I applied via Campus Placement and was interviewed in Mar 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jun 2021. There was 1 interview round.
I remain calm, listen actively, empathize, apologize, offer solutions, and follow up.
Remain calm and professional throughout the call.
Listen actively to the customer's concerns and let them vent.
Empathize with the customer and acknowledge their frustration.
Apologize for the inconvenience caused and take responsibility.
Offer solutions to resolve the issue and ask for their input.
Follow up with the customer to ensure the...
I applied via Naukri.com and was interviewed in Jan 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2021. There was 1 interview round.
Steps for Azure migration from onprem to cloud and Hyper V migration using VMWARE tool.
Assess on-premises environment
Choose appropriate migration method
Prepare Azure environment
Migrate data and applications
Optimize and secure migrated resources
VMware tool used for migration: VMware vCenter Converter
Hyper-V migration can be done using Azure Site Recovery
based on 1 interview
Interview experience
TCS
Accenture
Wipro
Cognizant