i
FIS
Filter interviews by
Clear (1)
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
What people are saying about FIS
I applied via Approached by Company and was interviewed before Apr 2021. There were 3 interview rounds.
My resume
I applied via Company Website and was interviewed before Sep 2021. There were 2 interview rounds.
2 coding questions which are of easy level
I applied via Walk-in and was interviewed before Jul 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed before Jan 2021. There were 2 interview rounds.
Good
I was interviewed in Sep 2016.
Developed a web-based project management tool for a software development company.
Used Agile methodology for development
Implemented features like task assignment, progress tracking, and team collaboration
Integrated with third-party tools like GitHub and Slack
Designed a user-friendly interface with responsive design
Deployed on AWS using EC2 and RDS
My CV showcases my experience in software development, including projects in Java, Python, and web development.
Experience in Java, Python, and web development
Worked on projects involving database management systems
Familiar with Agile development practices
I was interviewed in May 2017.
Developed a web-based project management system for tracking tasks and deadlines.
Used HTML, CSS, JavaScript for front-end development
Implemented backend using Node.js and MongoDB for database management
Incorporated user authentication and authorization features
Utilized Agile methodology for project management
I was interviewed before Jun 2016.
An induction motor can be started by providing a rotating magnetic field.
Use a three-phase power supply to create a rotating magnetic field
The magnetic field induces a current in the rotor, causing it to rotate
The motor may require a starting capacitor or a starting winding to provide the initial torque
Once the motor reaches its rated speed, the starting mechanism can be switched off
I am a passionate software engineer with 5 years of experience in developing web applications using various technologies.
Experienced in full stack web development
Proficient in languages like JavaScript, Python, and Java
Familiar with frameworks like React, Node.js, and Spring Boot
Strong problem-solving and analytical skills
Excellent team player with good communication skills
I was interviewed in Mar 2017.
I was interviewed in Dec 2016.
based on 7 reviews
Rating in categories
Senior Software Engineer
2.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
1.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Engineer
684
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Member
660
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Leader Engineer
647
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech