i
Cyber
Infrastructure
Filter interviews by
You can remove duplicates from a list in Python using various methods like set(), list comprehension, or loops.
Use set(): Convert the list to a set and back to a list. Example: list(set([1, 2, 2, 3])) results in [1, 2, 3].
List comprehension: Create a new list while checking for duplicates. Example: [x for i, x in enumerate(original_list) if x not in original_list[:i]].
Using a loop: Iterate through the list and app...
Count common words in two strings by splitting, using sets, and finding intersections.
Split both strings into lists of words using the split() method.
Convert the lists to sets to eliminate duplicates.
Use set intersection to find common words.
Example: 'hello world' and 'world of python' -> common words: {'world'}.
A module is a single file of Python code, while a package is a collection of modules organized in a directory structure.
A module is a single Python file (e.g., `math.py`).
A package is a directory containing multiple modules and a special `__init__.py` file (e.g., `mypackage/`).
Modules can be imported directly (e.g., `import math`).
Packages allow for hierarchical organization of modules (e.g., `from mypackage impor...
Accessing an HTTP URL can be done using various methods like web scraping, browser automation, or direct HTTP requests.
Use the 'requests' library in Python to make GET or POST requests to the URL.
Example: response = requests.get('http://example.com')
Utilize web scraping tools like BeautifulSoup to extract data from HTML pages.
Example: soup = BeautifulSoup(response.content, 'html.parser')
Employ browser automation t...
This pen is not just a writing tool; it's a gateway to creativity, ideas, and communication, designed for every occasion.
Versatile Use: Perfect for jotting down notes in a meeting, signing important documents, or sketching your next big idea.
Ergonomic Design: The pen is crafted for comfort, ensuring a smooth writing experience without hand fatigue, ideal for long writing sessions.
Quality Ink: It features high-qual...
To find the second largest salary in SQL, we can use various methods like subqueries or the DISTINCT keyword.
Use a subquery: SELECT MAX(salary) FROM employees WHERE salary < (SELECT MAX(salary) FROM employees);
Use DISTINCT: SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 1;
Use ROW_NUMBER(): SELECT salary FROM (SELECT salary, ROW_NUMBER() OVER (ORDER BY salary DESC) AS rank FROM employe...
Revamp the UI of a given website using Figma/XD
Analyze the current website's UI to identify areas for improvement
Create wireframes and mockups of the new UI design in Figma/XD
Focus on improving user experience and usability
Use consistent design elements and color schemes
Seek feedback from stakeholders for iterative improvements
I am familiar with tools such as Adobe XD, Sketch, Figma, InVision, and Zeplin.
Adobe XD
Sketch
Figma
InVision
Zeplin
UI is the user interface, focusing on the look and feel of a product, while UX is the user experience, focusing on the overall experience of the user interacting with the product.
UI is the visual aspect of a product, including colors, typography, and layout.
UX is the overall experience of a user interacting with a product, including ease of use, efficiency, and satisfaction.
UI design focuses on creating visually a...
Both UI and UX have their own challenges, but I find UX more challenging due to the need for in-depth research and understanding of user behavior.
Understanding user needs and behavior
Creating user personas and user flows
Conducting usability testing and gathering feedback
Pattern program
Multithreading program
And overriding program
I appeared for an interview in Apr 2025, where I was asked the following questions.
You can remove duplicates from a list in Python using various methods like set(), list comprehension, or loops.
Use set(): Convert the list to a set and back to a list. Example: list(set([1, 2, 2, 3])) results in [1, 2, 3].
List comprehension: Create a new list while checking for duplicates. Example: [x for i, x in enumerate(original_list) if x not in original_list[:i]].
Using a loop: Iterate through the list and append u...
Count common words in two strings by splitting, using sets, and finding intersections.
Split both strings into lists of words using the split() method.
Convert the lists to sets to eliminate duplicates.
Use set intersection to find common words.
Example: 'hello world' and 'world of python' -> common words: {'world'}.
A module is a single file of Python code, while a package is a collection of modules organized in a directory structure.
A module is a single Python file (e.g., `math.py`).
A package is a directory containing multiple modules and a special `__init__.py` file (e.g., `mypackage/`).
Modules can be imported directly (e.g., `import math`).
Packages allow for hierarchical organization of modules (e.g., `from mypackage import mym...
Accessing an HTTP URL can be done using various methods like web scraping, browser automation, or direct HTTP requests.
Use the 'requests' library in Python to make GET or POST requests to the URL.
Example: response = requests.get('http://example.com')
Utilize web scraping tools like BeautifulSoup to extract data from HTML pages.
Example: soup = BeautifulSoup(response.content, 'html.parser')
Employ browser automation tools ...
I applied via Campus Placement
Normal apti reasoning test checking normal intelligence with some basic technical questions.
Topic was physical cash V/s Digital cash.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Oop concept, Multithread, String
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Passionate Jr. Designer with a background in UX/UI design and a strong eye for detail.
Graduated with a degree in Graphic Design
Proficient in Adobe Creative Suite
Experience with wireframing and prototyping tools like Sketch and InVision
Strong understanding of user-centered design principles
Worked on projects involving mobile app design and website development
I am familiar with tools such as Adobe XD, Sketch, Figma, InVision, and Zeplin.
Adobe XD
Sketch
Figma
InVision
Zeplin
UI is the user interface, focusing on the look and feel of a product, while UX is the user experience, focusing on the overall experience of the user interacting with the product.
UI is the visual aspect of a product, including colors, typography, and layout.
UX is the overall experience of a user interacting with a product, including ease of use, efficiency, and satisfaction.
UI design focuses on creating visually appeal...
My last project was designing a mobile app for a fitness tracking platform.
Researched user needs and preferences for fitness tracking apps
Created wireframes and prototypes for user testing
Designed a clean and intuitive user interface with a focus on usability
Collaborated with developers to ensure smooth implementation of design elements
The most critical part of the project was ensuring seamless user experience through intuitive navigation and clear visual hierarchy.
Creating user personas to understand target audience needs
Conducting usability testing to identify pain points and areas for improvement
Iterating on design based on feedback received from stakeholders
Implementing responsive design principles for optimal user experience across devices
Both UI and UX have their own challenges, but I find UX more challenging due to the need for in-depth research and understanding of user behavior.
Understanding user needs and behavior
Creating user personas and user flows
Conducting usability testing and gathering feedback
Revamp the UI of a given website using Figma/XD
Analyze the current website's UI to identify areas for improvement
Create wireframes and mockups of the new UI design in Figma/XD
Focus on improving user experience and usability
Use consistent design elements and color schemes
Seek feedback from stakeholders for iterative improvements
I applied via Campus Placement and was interviewed in Dec 2023. There was 1 interview round.
A class is a blueprint for creating objects, while an object is an instance of a class. Private, protected, public, and default are access modifiers in object-oriented programming.
A class is a template or blueprint that defines the properties and behaviors of objects.
An object is an instance of a class, created using the class blueprint.
Private access modifier restricts access to class members within the same class.
Pro...
An object is a self-contained entity that consists of both data and behavior.
Objects are instances of classes in object-oriented programming.
They encapsulate data and provide methods to manipulate that data.
Objects can interact with each other through method calls and message passing.
Examples of objects include a car, a person, or a bank account.
Public is a keyword in programming languages that denotes the accessibility of a class, method, or variable.
Public is one of the access modifiers in object-oriented programming.
It allows the class, method, or variable to be accessed from any other class or package.
Public members are part of the public API of a software component.
Example: public class MyClass { ... }
Example: public void myMethod() { ... }
Example: public...
In programming, private is an access modifier that restricts the visibility of a class member to within its own class.
Private is used to encapsulate data and prevent direct access from outside the class.
Private members can only be accessed through public methods or properties.
Private variables are often used to store internal state or implementation details.
Private methods are used for internal logic and are not meant ...
protected is an access modifier in object-oriented programming that restricts access to members within the same package or subclasses.
protected is one of the four access modifiers in Java, along with public, private, and default.
Members declared as protected can be accessed within the same package or by subclasses.
Protected members are not accessible outside the package unless accessed through inheritance.
Example: prot...
Pattern, star , hollow pattern
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an...
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of...
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Company Website and was interviewed before Jan 2024. There were 3 interview rounds.
Good questions and dsa arrays and string questions
Top trending discussions
Some of the top questions asked at the Cyber Infrastructure interview -
The duration of Cyber Infrastructure interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 30 interview experiences
Difficulty level
Duration
based on 283 reviews
Rating in categories
Software Developer
269
salaries
| ₹3.3 L/yr - ₹8 L/yr |
Junior Software Developer
105
salaries
| ₹2 L/yr - ₹5 L/yr |
Senior Software Developer
47
salaries
| ₹5.4 L/yr - ₹11.5 L/yr |
Junior Developer
46
salaries
| ₹2.5 L/yr - ₹5.9 L/yr |
Senior Developer
28
salaries
| ₹4.5 L/yr - ₹9 L/yr |
AgreeYa Solutions
Apisero
Actalent Services
Stefanini