i
FIS
Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
Top trending discussions
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Aug 2021. There were 3 interview rounds.
The first round was an aptitude test with questions ranging from basic mathematical concepts to logical/analytical questions. English was also included in the test. The difficulty was medium and I was able to solve 70-80% of the questions.
Two coding questions were the part of the test. I was supposed to solve and pass all the test cases for both the questions. The coding questions tested my knowledge in the field of arrays, loops and pointers. I was able to solve one and partially solve another.
I applied via Naukri.com and was interviewed in Nov 2020. There were 5 interview rounds.
I applied via Job Portal and was interviewed before Jul 2021. There were 3 interview rounds.
To configure and verify custom DNS in Azure AD, follow these steps:
Create a DNS zone in Azure DNS
Add a custom domain to Azure AD
Create a CNAME record in the DNS zone that points to the Azure AD domain
Verify the custom domain in Azure AD
Update the DNS registrar to use the Azure DNS name servers
Test the custom DNS by accessing Azure AD resources using the custom domain
Azure AD supports various authentication types for secure access to resources.
Azure AD supports password-based authentication, multi-factor authentication, certificate-based authentication, and federated authentication.
It also supports OAuth 2.0 and OpenID Connect for secure authentication and authorization.
Examples of supported protocols include SAML, WS-Federation, and OAuth 2.0/OpenID Connect.
Azure AD also supports ...
I applied via Campus Placement and was interviewed before Sep 2021. There were 4 interview rounds.
Prepare normal for aptitude - maths, quant, analytic
My GD topic was Is internet good for students or not
I didn't attempt this as I was noob back in third year Engg
I applied via Campus Placement and was interviewed before Oct 2021. There were 4 interview rounds.
Aptitude test has aptitude, logical and 2 coding questions
I applied via Naukri.com and was interviewed in May 2021. There were 3 interview rounds.
I appeared for an interview before Jun 2021.
Python is a high-level, interpreted programming language used for web development, data analysis, and artificial intelligence.
Python is easy to learn and has a simple syntax.
It supports multiple programming paradigms like object-oriented, functional, and procedural.
Python interpreter is a program that executes Python code.
It converts the code into bytecode and then runs it on the machine.
Python interpreter can be used ...
based on 7 reviews
Rating in categories
Senior Software Engineer
2.6k
salaries
| ₹8 L/yr - ₹30 L/yr |
Software Engineer
1.7k
salaries
| ₹4.1 L/yr - ₹15.6 L/yr |
Lead Engineer
722
salaries
| ₹8 L/yr - ₹24.9 L/yr |
Senior Leader Engineer
697
salaries
| ₹9.9 L/yr - ₹30.5 L/yr |
Team Member
634
salaries
| ₹1.4 L/yr - ₹6 L/yr |
Accenture
Wipro
Cognizant
Capgemini