Filter interviews by
I applied via wellfound and was interviewed before Mar 2023. There was 1 interview round.
Assignment was given related to web scraping
Top trending discussions
I applied via Referral and was interviewed in Jul 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jul 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Jun 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Jun 2021. There were 4 interview rounds.
Aptitude test was easy. Preparation was good for about a month.
Direct interview was average.
GD was easy round and topic is also easy one.
I applied via Naukri.com and was interviewed before Aug 2021. There were 2 interview rounds.
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It is achieved through method overriding and method overloading.
Examples include function overloading in C++ and Java's method overriding.
Polymorphism helps in achieving loose coupling and flexibility in code design.
Object oriented programming is a programming paradigm that uses objects to represent and manipulate data.
It focuses on encapsulation, inheritance, and polymorphism.
Objects have attributes (data) and methods (functions).
Examples include Java, C++, and Python.
It allows for modular and reusable code.
It promotes code organization and maintenance.
I applied via Recruitment Consultant and was interviewed in Apr 2020. There were 4 interview rounds.
I applied via Company Website and was interviewed before Feb 2021. There were 2 interview rounds.
Codevita coding competition- 6 problem statements, need to solve at least 1 or 2 for shortlist for next round and also for interview
I applied via Recruitment Consultant and was interviewed in Dec 2018. There were 3 interview rounds.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or softwa...
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to...
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass cens...
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but ...
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls...
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Investment Banking Analyst
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Manager
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Marketing Associate
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Chief Staff
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Paytm
Flipkart
Ola Cabs
Swiggy