Filter interviews by
Circuit breakers are devices that automatically stop the flow of electricity in a circuit to prevent damage or fire.
Circuit breakers can be classified into different types based on their operating mechanism, such as thermal, magnetic, or thermal-magnetic.
Examples of circuit breaker types include Miniature Circuit Breaker (MCB), Molded Case Circuit Breaker (MCCB), and Residual Current Circuit Breaker (RCCB).
Top trending discussions
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
posted on 1 Feb 2022
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
Interview experience
based on 6 reviews
Rating in categories
Junior Engineer
25
salaries
| ₹3.5 L/yr - ₹12 L/yr |
Deputy Engineer
25
salaries
| ₹6.8 L/yr - ₹18.4 L/yr |
Graduate Apprentice Trainee
13
salaries
| ₹0.6 L/yr - ₹1.7 L/yr |
Apprentice
8
salaries
| ₹0.9 L/yr - ₹3 L/yr |
Apprenticeship Trainee
6
salaries
| ₹1 L/yr - ₹2 L/yr |
NTPC
Power Grid Corporation of India
Tata Power
Adani Power