Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.
I have 3 years of experience in testing. Testing is the process of evaluating a system or application to identify defects or errors.
I have 3 years of experience in manual and automated testing
Testing involves executing test cases to identify defects or errors in a system or application
Types of testing include functional testing, regression testing, performance testing, and user acceptance testing
Black box, White Box, Regression, and Smoke testing are different types of software testing techniques.
Black box testing focuses on testing the functionality of the software without knowing its internal code.
White box testing involves testing the internal code structure, paths, and logic of the software.
Regression testing is performed to ensure that new code changes do not adversely affect existing functionalities.
Smok...
Test cases are scenarios designed to validate the functionality of a software application. Bug life cycle refers to the stages a bug goes through from identification to resolution.
Test Cases: - Verify login functionality with valid credentials - Test adding items to a shopping cart - Validate search functionality by entering keywords
Bug Life Cycle: - Bug identification - Bug logging - Bug prioritization - Bug fixing - ...
Yes, I can write code for File Handling in various programming languages.
Use functions like fopen(), fclose(), fread(), fwrite() for file operations
Handle errors using error handling techniques like try-catch or if-else statements
Examples: C - fopen("file.txt", "r"), Python - with open("file.txt", "r") as file:
I am comfortable with coding and my preferred language is Java.
Proficient in Java programming language
Comfortable writing test scripts and automation code
Familiar with debugging and troubleshooting code issues
I applied via Referral and was interviewed in May 2024. There were 2 interview rounds.
Crud operation in the mern stack develoment
Top trending discussions
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2021. There were 2 interview rounds.
They ask to many technical question and ask to code also
They ask for your background and thing you learnt in your past
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via LinkedIn and was interviewed in Nov 2020. There were 4 interview rounds.
based on 2 interviews
Interview experience
Business Development Manager
7
salaries
| ₹5 L/yr - ₹8 L/yr |
Patient Care Manager
6
salaries
| ₹2 L/yr - ₹2.4 L/yr |
Software Developer
5
salaries
| ₹2.8 L/yr - ₹6.1 L/yr |
Project Manager
5
salaries
| ₹10.6 L/yr - ₹21 L/yr |
Software Engineer
4
salaries
| ₹4 L/yr - ₹10.8 L/yr |
Teleperformance
Optum Global Solutions
FIS
Nagarro