Filter interviews by
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
Top trending discussions
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
I applied via LinkedIn and was interviewed before Jul 2022. There were 3 interview rounds.
General Aptitude, English and Reasoning
FTIR stands for Fourier Transform Infrared Spectroscopy, a technique used to analyze the chemical composition of materials.
FTIR measures the absorption of infrared light by a sample to determine its chemical composition.
It is commonly used in chemistry, pharmaceuticals, food science, and material analysis.
FTIR can identify functional groups in organic compounds, determine polymer structures, and analyze contaminants in...
HPLC and LC-MS are analytical techniques used in chemistry to separate, identify, and quantify components in a mixture.
HPLC stands for High Performance Liquid Chromatography, used to separate and quantify components in a mixture based on their interactions with a stationary phase and mobile phase.
LC-MS stands for Liquid Chromatography-Mass Spectrometry, combines the separation capabilities of liquid chromatography with...
Chromatography is a technique used to separate and analyze mixtures based on their different interactions with a stationary phase and a mobile phase.
Chromatography is used in various industries such as pharmaceuticals, food and beverage, environmental analysis, and forensics.
Types of chromatography include gas chromatography, liquid chromatography, thin-layer chromatography, and paper chromatography.
The principle of ch...
I applied via Recruitment Consulltant and was interviewed in Apr 2023. There were 2 interview rounds.
posted on 29 Jan 2022
posted on 20 Nov 2024
Topics like ratios,number systems
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data,
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 1 Oct 2024
I applied via Company Website and was interviewed before Oct 2023. There was 1 interview round.
I have experience with a variety of tools commonly used in DevOps, including Jenkins, Docker, Kubernetes, Ansible, and Git.
Proficient in Jenkins for continuous integration and continuous deployment
Familiar with Docker for containerization of applications
Experience with Kubernetes for container orchestration
Skilled in Ansible for configuration management and automation
Proficient in Git for version control and collaborat
posted on 22 Oct 2022
I applied via Walk-in and was interviewed before Oct 2021. There were 3 interview rounds.
Nice environment for interview
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Technical Officer
18
salaries
| ₹4 L/yr - ₹11 L/yr |
Data Entry Operator
9
salaries
| ₹1.9 L/yr - ₹4 L/yr |
Food Analyst
5
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
Consultant
5
salaries
| ₹5 L/yr - ₹9 L/yr |
Food Technologist
4
salaries
| ₹2 L/yr - ₹7.3 L/yr |
Government of India
National Informatics Centre
Central Reserve Police Force
Ministry of Defence