i
Cubic Transportation Systems
Filter interviews by
I applied via Recruitment Consultant and was interviewed in Feb 2021. There were 3 interview rounds.
Top trending discussions
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Campus Placement and was interviewed before Feb 2023. There was 1 interview round.
Coding Questions on one of the preffered programming language. Most importantly Data Structures and algorithms.
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed in May 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
To create a repository in GIT using command prompt, use the 'git init' command.
Open the command prompt and navigate to the directory where you want to create the repository
Type 'git init' command to initialize the repository
Add files to the repository using 'git add' command
Commit the changes using 'git commit' command
Create a remote repository on GitHub or any other hosting service
Add the remote repository using 'git ...
Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.
Primary key is a column or set of columns that uniquely identifies each row in a table
Foreign key is a column or set of columns in one table that refers to the primary key in another table
Primary key cannot have null values, while foreign key can have null values
Primary key can be used to create relationships betwe...
API stands for Application Programming Interface. It is a set of protocols, routines, and tools for building software applications.
API allows different software applications to communicate with each other
It defines how software components should interact
API provides a layer of abstraction between the application and the underlying system
Examples of APIs include Google Maps API, Twitter API, and Facebook API
Count the characters in a given string.
Iterate through the string and count each character
Use a hash table to store the count of each character
Handle edge cases such as empty string or null input
Load balancing is the process of distributing network traffic across multiple servers to improve performance and availability.
Load balancing helps prevent server overload and downtime
It can be achieved through hardware or software solutions
Examples include round-robin, least connections, and IP hash algorithms
REST is an architectural style while SOAP is a protocol. REST is lightweight and uses HTTP while SOAP is XML-based and uses other protocols.
REST is stateless while SOAP maintains state
REST uses HTTP verbs (GET, POST, PUT, DELETE) while SOAP uses XML messaging
REST is faster and easier to use while SOAP is more secure and reliable
REST is used for web services while SOAP is used for enterprise-level web services
Examples o...
I applied via Referral and was interviewed in Dec 2021. There were 5 interview rounds.
API stands for Application Programming Interface. REST and SOAP are two types of APIs.
REST is an architectural style that uses HTTP protocol for communication and supports multiple data formats like JSON, XML, etc.
SOAP is a protocol that uses XML for communication and supports only XML data format.
REST is lightweight and easy to use, while SOAP is more complex and requires more bandwidth.
REST is stateless, while SOAP m...
oAuth tokens are used for authentication and authorization purposes in web applications.
oAuth tokens are used to grant access to resources without sharing the user's credentials.
There are three types of oAuth tokens: access tokens, refresh tokens, and authorization codes.
Access tokens are short-lived tokens that are used to access protected resources.
Refresh tokens are long-lived tokens that are used to obtain new acce...
Stored Procedures are pre-compiled SQL statements stored in the database and executed on demand.
Stored Procedures are used to improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
They can be called from other PL/SQL code or from external applications.
Examples include procedures for inserting, updating, an...
Drop command removes a table from the database, truncate command removes all rows from a table, and delete command removes specific rows from a table.
Drop command removes the table structure and all associated data
Truncate command removes all rows from a table but keeps the table structure
Delete command removes specific rows from a table based on a condition
Drop and truncate are faster than delete as they do not genera...
Merge Sort and Quick Sort are sorting algorithms. Merge Sort is stable but slower. Quick Sort is faster but unstable.
Merge Sort divides the array into two halves, sorts them recursively, and then merges them.
Quick Sort selects a pivot element, partitions the array around the pivot, and then recursively sorts the subarrays.
Merge Sort has a time complexity of O(nlogn) and space complexity of O(n).
Quick Sort has a time co...
Object Oriented Programming is a programming paradigm that focuses on objects and their interactions.
OOP is based on the concepts of encapsulation, inheritance, and polymorphism.
It allows for modular and reusable code.
Objects have attributes (data) and methods (functions) that operate on that data.
Examples of OOP languages include Java, Python, and C++.
Armstrong number problem solved using double pointers.
Use double pointers to access each digit of the number.
Calculate the sum of each digit raised to the power of the number of digits.
Compare the sum with the original number to check if it is an Armstrong number.
VPC stands for Virtual Private Cloud, which is a virtual network in the cloud.
VPC allows users to create their own isolated network within the cloud
It provides control over network topology, IP address range, and subnets
VPC can be used to securely connect resources in the cloud and on-premises
Examples of cloud providers that offer VPC are Amazon Web Services and Google Cloud Platform
On-premises servers can be connected to the Cloud using VPN or Direct Connect.
Use a VPN to establish a secure connection between on-premises servers and the Cloud.
Direct Connect can be used for a dedicated, private connection between on-premises servers and the Cloud.
Ensure proper network configuration and security measures are in place.
Examples of VPN solutions include OpenVPN, Cisco AnyConnect, and AWS VPN.
Examples o...
Multithreading is the execution of multiple threads of a single process, while multiprocessing is the execution of multiple processes.
Multithreading involves multiple threads within a single process, while multiprocessing involves multiple processes.
Multithreading shares the same memory space, while multiprocessing has separate memory spaces.
Multithreading is suitable for I/O-bound tasks, while multiprocessing is suita...
I handle exceptions by catching them and handling them appropriately.
I use try-catch blocks to catch exceptions.
I log the exception details for debugging purposes.
I handle the exception based on the type and severity.
I throw custom exceptions when necessary.
I ensure that the application remains stable and doesn't crash due to exceptions.
Generators and decorators are two important features in Python that help in simplifying code and improving performance.
Generators are functions that can be paused and resumed, allowing for efficient memory usage and lazy evaluation.
Decorators are functions that modify the behavior of other functions, adding functionality without changing the original code.
Generators are created using the 'yield' keyword, while decorato...
Senior Software Engineer
100
salaries
| ₹10.8 L/yr - ₹26.3 L/yr |
Principal Software Engineer
47
salaries
| ₹17 L/yr - ₹32 L/yr |
Software Engineer
23
salaries
| ₹4.3 L/yr - ₹13.3 L/yr |
Senior System Testing Engineer
13
salaries
| ₹9.7 L/yr - ₹15.6 L/yr |
Accounts Payable Administrator
12
salaries
| ₹4.7 L/yr - ₹10.8 L/yr |
Apisero
Actalent Services
Cyber Infrastructure
TestingXperts