Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Apr 2023. There were 2 interview rounds.
Top trending discussions
posted on 29 Jan 2022
posted on 20 Nov 2024
Topics like ratios,number systems
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 11 May 2023
Maximum maths and English aptitute was there.
posted on 20 May 2021
Questions related to software development concepts and technologies.
Class is a blueprint for creating objects in Java.
Object is an instance of a class.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Struts is a framework for developing Java web applications.
Database DDL commands are used to define database schema, while DML commands are used to manipulate data.
System testing is a type of...
I applied via Company Website and was interviewed before Nov 2022. There were 3 interview rounds.
I prefer a posting that allows me to work remotely and travel occasionally for client meetings.
Remote work flexibility is important to me
Ability to travel for client meetings is a plus
Prefer a mix of remote and in-person work
Easy to medium level coding
A pointer is a variable that stores the memory address of another variable.
Pointers allow direct manipulation of memory and efficient memory management.
They are commonly used in programming languages like C and C++.
Example: int* ptr; // declares a pointer to an integer variable
posted on 26 Feb 2023
posted on 4 Jun 2022
Some of the top questions asked at the FICCI interview for freshers -
The duration of FICCI interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 1 interview
Interview experience
10-15 Yrs
₹ 10-17 LPA
10-12 Yrs
₹ 5.9-10 LPA
Senior Assistant Director
88
salaries
| ₹5.4 L/yr - ₹14.2 L/yr |
Assistant Director
78
salaries
| ₹4.4 L/yr - ₹10.6 L/yr |
Deputy Director
46
salaries
| ₹8 L/yr - ₹17.5 L/yr |
Research Associate
31
salaries
| ₹3 L/yr - ₹7.3 L/yr |
Executive Assistant
22
salaries
| ₹2 L/yr - ₹4.2 L/yr |
Government of India
National Informatics Centre
Central Reserve Police Force
Ministry of Defence