Add office photos
Engaged Employer

EC-Council

4.4
based on 389 Reviews
Video summary
Filter interviews by

McDermott International Interview Questions and Answers

Updated 13 Feb 2025

Q1. What is wireshark tool used for?

Ans.

Wireshark is a network protocol analyzer used for troubleshooting, analysis, software and communication protocol development.

  • Wireshark captures and displays the data traveling back and forth on a network in real time.

  • It allows users to analyze network traffic and pinpoint issues such as latency, packet loss, and security vulnerabilities.

  • The tool can be used for network troubleshooting, protocol development, network security analysis, and education.

  • Wireshark supports various p...read more

Add your answer

Q2. What is cyber kill chain

Ans.

Cyber kill chain is a framework that describes the stages of a cyber attack.

  • It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • The framework helps organizations understand and defend against cyber attacks.

  • For example, by identifying the stage of an attack, organizations can take appropriate measures to prevent or mitigate the damage.

  • The cyber kill chain is often used in conjunction w...read more

Add your answer

Q3. To explain about OSI model

Ans.

The OSI model is a conceptual framework for understanding how data is transmitted over a network.

  • OSI stands for Open Systems Interconnection

  • It has 7 layers, each with a specific function

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application

  • Each layer communicates with the layer above and below it

  • Example: When you visit a website, the Application layer sends a request to the Transport layer, which breaks it into smaller packets and sends it...read more

Add your answer

Q4. Steps of ethical hacking

Ans.

Ethical hacking involves a systematic approach to identify and exploit vulnerabilities in a system with the owner's permission.

  • Obtain permission from the system owner

  • Gather information about the target system

  • Identify potential vulnerabilities

  • Exploit the vulnerabilities to gain access to the system

  • Document the findings and report them to the system owner

  • Provide recommendations for improving the system's security

Add your answer
Discover McDermott International interview dos and don'ts from real experiences

Q5. Explain the Osi model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It helps in understanding how different networking protocols work together.

  • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with the adjacent layers.

  • For example, HTTP operat...read more

Add your answer

Q6. What is the process involved in manual testing?

Ans.

Manual testing involves executing test cases without the use of automation tools.

  • Understanding the requirements and creating test cases

  • Executing test cases manually

  • Recording test results and reporting defects

  • Regression testing to ensure previous issues are fixed

  • Exploratory testing to find new issues

Add your answer

Q7. Strategy for business growth

Ans.

To achieve business growth, I would focus on diversifying product offerings, expanding into new markets, and enhancing customer engagement.

  • Develop a comprehensive marketing strategy to reach new target audiences

  • Introduce new products or services to meet evolving customer needs

  • Utilize data analytics to identify opportunities for growth

  • Strengthen relationships with existing customers through personalized marketing campaigns

  • Explore partnerships or collaborations to access new ma...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at McDermott International

based on 17 interviews
Interview experience
3.5
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 1.6k Interview Questions
3.8
 • 367 Interview Questions
3.9
 • 176 Interview Questions
4.1
 • 162 Interview Questions
4.1
 • 161 Interview Questions
3.8
 • 137 Interview Questions
View all
Top EC-Council Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter