Filter interviews by
Top trending discussions
I applied via Company Website and was interviewed before Nov 2022. There were 3 interview rounds.
I prefer a posting that allows me to work remotely and travel occasionally for client meetings.
Remote work flexibility is important to me
Ability to travel for client meetings is a plus
Prefer a mix of remote and in-person work
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 20 Nov 2024
Topics like ratios,number systems
posted on 29 Jan 2022
posted on 11 May 2023
Maximum maths and English aptitute was there.
posted on 11 Oct 2020
Server side state management is the process of storing and managing data on the server side of a web application.
It involves storing data on the server instead of the client side
It helps maintain consistency and security of data
Examples include session management and database management
Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.
Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.
During initialization, the page is created and controls are initialized.
During loading, the page is loaded with data and controls are populated.
During rendering, t...
The components of .NET include the Common Language Runtime, Framework Class Library, and ASP.NET.
Common Language Runtime (CLR) - manages memory, security, and execution of code
Framework Class Library (FCL) - collection of reusable classes, interfaces, and value types
ASP.NET - web application framework for building dynamic web pages and web services
Cookies are small text files stored on a user's computer by a website to remember user preferences and login information.
Cookies are used to track user activity on a website
They can be used to store user preferences and login information
Cookies can be either session cookies or persistent cookies
Session cookies are deleted when the user closes their browser
Persistent cookies remain on the user's computer until they expi
CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.
CLR is responsible for memory management, security, and exception handling.
It compiles code into an intermediate language (IL) and then executes it.
CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.
Examples of la...
posted on 4 Jun 2022
I'm sorry, but I cannot answer that question without more information.
My name is [insert name here]
My name is [insert name here]
I have been called by this name since birth
It is the name given to me by my parents
It is the name I use to introduce myself to others
I prefer not to disclose my age as it is not relevant to my qualifications and experience for this position.
Age should not be a factor in determining one's ability to perform a job
Experience, skills, and qualifications are more important than age
Employers are not allowed to discriminate based on age
I am confident that my qualifications and experience make me a strong candidate for this position
I oversee daily operations, manage staff, and ensure customer satisfaction.
Manage and supervise staff
Ensure customer satisfaction
Create and implement policies and procedures
Monitor inventory and sales
Handle customer complaints and resolve issues
Train new employees
Collaborate with upper management
posted on 26 Feb 2023
based on 3 interviews
Interview experience
Senior Assistant Director
88
salaries
| ₹5.4 L/yr - ₹14.2 L/yr |
Assistant Director
78
salaries
| ₹4.4 L/yr - ₹10.6 L/yr |
Deputy Director
46
salaries
| ₹8 L/yr - ₹17.5 L/yr |
Research Associate
31
salaries
| ₹3 L/yr - ₹7.3 L/yr |
Executive Assistant
22
salaries
| ₹2 L/yr - ₹4.2 L/yr |
Government of India
National Informatics Centre
Central Reserve Police Force
Ministry of Defence