Filter interviews by
I applied via Naukri.com and was interviewed before Sep 2023. There were 2 interview rounds.
JWT syntax for signing and verification
JWT (JSON Web Token) is a compact, URL-safe means of representing claims to be transferred between two parties.
To sign a JWT, you need to create a header, payload, and a secret key. Then use a signing algorithm like HMAC SHA256 to create the signature.
To verify a JWT, you need to decode the JWT and verify the signature using the same secret key and algorithm used for signing.
Best practices for technology consultants
Stay updated on latest technologies and trends
Communicate effectively with clients and team members
Document all processes and decisions for future reference
Provide regular updates and progress reports to stakeholders
Continuously improve skills through training and certifications
Implementing security measures to protect data and systems from unauthorized access.
Implement strong password policies
Use encryption for sensitive data
Regularly update software and systems to patch vulnerabilities
Implement multi-factor authentication
Conduct regular security audits and penetration testing
Complex queries can be handled by breaking them down into smaller parts, using indexes, optimizing the query, and utilizing advanced query techniques.
Break down the query into smaller parts to make it more manageable
Use indexes on the columns involved in the query to improve performance
Optimize the query by analyzing execution plans and making necessary adjustments
Utilize advanced query techniques such as subqueries, j
based on 1 review
Rating in categories
Technology Consultant
12
salaries
| ₹3.2 L/yr - ₹8.8 L/yr |
Technical Lead
7
salaries
| ₹8.7 L/yr - ₹20 L/yr |
Project Manager
7
salaries
| ₹9.6 L/yr - ₹16.2 L/yr |
Technology Consultant 3
6
salaries
| ₹6.1 L/yr - ₹8.5 L/yr |
Software Developer
6
salaries
| ₹3.5 L/yr - ₹6.5 L/yr |
TCS
Infosys
Wipro
HCLTech