Filter interviews by
I applied via Company Website and was interviewed before Mar 2021. There was 1 interview round.
posted on 1 Feb 2022
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
posted on 26 Oct 2024
I applied via Job Portal and was interviewed before Oct 2023. There was 1 interview round.
40 general knowledgand 20 mathematics question or current affairs
posted on 1 Feb 2022
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
based on 2 reviews
Rating in categories
Senior Section Engineer
8
salaries
| ₹12.5 L/yr - ₹20 L/yr |
Junior Engineer
5
salaries
| ₹3 L/yr - ₹9 L/yr |
Supervisor
5
salaries
| ₹1.8 L/yr - ₹2.3 L/yr |
Graduate Apprentice Trainee
5
salaries
| ₹1 L/yr - ₹2 L/yr |
Safety Officer
5
salaries
| ₹2.2 L/yr - ₹15.1 L/yr |
BHEL
Hindustan Aeronautics
BEML
Garden Reach Shipbuilders & Engineers