i
FIS
Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
Top trending discussions
I applied via LinkedIn and was interviewed in Aug 2024. There were 2 interview rounds.
Python , Bash , basic aptitude
URL config is a configuration file that maps URLs to specific views or functions in a web application.
URL config is typically defined in a file like urls.py in Django framework.
It helps in routing incoming requests to the appropriate view or function.
URL patterns are defined using regular expressions to match specific URLs.
URL config allows for dynamic routing and handling of different endpoints in a web application.
HTTP is a protocol used for transferring data over the internet.
HTTP stands for Hypertext Transfer Protocol
It is the foundation of data communication on the World Wide Web
HTTP works by establishing a connection between a client and a server, where the client sends a request and the server responds with the requested data
Example: When you type a website URL in your browser, the browser sends an HTTP request to the serve
I applied via campus placement at KIIT University, Bhuvaneshwar and was interviewed in Mar 2024. There was 1 interview round.
I applied via campus placement at New Delhi Institute of Management (NDIM) and was interviewed in Jan 2024. There were 2 interview rounds.
Sorting algorithms are used to arrange elements in a specific order.
Sorting algorithms can be categorized as comparison-based or non-comparison-based.
Examples of sorting algorithms include Bubble Sort, Merge Sort, and Quick Sort.
Efficiency of sorting algorithms is measured in terms of time complexity and space complexity.
I was interviewed in Feb 2024.
I am a recent graduate with a degree in Computer Science and a passion for coding and problem-solving.
Graduated with a degree in Computer Science
Passionate about coding and problem-solving
Completed internships at tech companies
Participated in coding competitions
I applied via Campus Placement
On spot topic were given by the interviewer
I applied via Approached by Company and was interviewed before Sep 2022. There were 3 interview rounds.
MCQ+2 Coding questions
LCA in binary tree refers to finding the lowest common ancestor of two nodes in a binary tree.
Start from the root and traverse down the tree to find the paths to the two nodes
Compare the paths to find the last common node between them, which is the LCA
If one of the nodes is the ancestor of the other, return that node as the LCA
based on 7 reviews
Rating in categories
Senior Software Engineer
2.7k
salaries
| ₹7 L/yr - ₹29 L/yr |
Software Engineer
1.6k
salaries
| ₹4.2 L/yr - ₹16 L/yr |
Lead Engineer
677
salaries
| ₹7.3 L/yr - ₹26.4 L/yr |
Team Member
675
salaries
| ₹1.5 L/yr - ₹6 L/yr |
Senior Leader Engineer
629
salaries
| ₹9.9 L/yr - ₹30.5 L/yr |
TCS
Infosys
Wipro
HCLTech