Filter interviews by
Be the first one to contribute and help others!
posted on 14 Dec 2024
I applied via Referral and was interviewed in Nov 2024. There were 4 interview rounds.
Social Media Intelligence, Crimes through social media , Digital risk protection, Executive and Brand logo infringement
Trademarks protect brand names and logos, copyrights protect creative works, and patents protect inventions.
Trademarks are used to protect brand names, logos, and slogans from being used by others in a way that could confuse consumers.
Copyrights protect original creative works such as books, music, and artwork from being copied or used without permission.
Patents protect inventions and grant the inventor exclusive right...
Threat is a potential danger, vulnerability is a weakness that can be exploited, and risk is the likelihood of a threat exploiting a vulnerability.
Threat: potential danger or harm that can exploit vulnerabilities
Vulnerability: weakness in a system that can be exploited by threats
Risk: likelihood of a threat exploiting a vulnerability
Example: A threat could be a cyber attack, a vulnerability could be outdated software, ...
I tackle fraudulent accounts on social media by using a combination of technology, data analysis, and manual review.
Utilize automated tools to detect suspicious activity and patterns
Analyze user behavior and engagement metrics to identify anomalies
Investigate flagged accounts manually to verify authenticity
Collaborate with security teams and law enforcement if necessary
Implement account verification processes to preven
In 5 years, I see myself as a seasoned Platform Operations Specialist leading a team and implementing innovative strategies.
Leading a team of platform operations specialists
Implementing innovative strategies to improve platform efficiency
Continuing to learn and grow in the field of platform operations
I am excited to join Zerofox because I am passionate about disaster recovery planning and believe in the company's mission.
I am drawn to the unique focus on DRP at Zerofox and see it as a valuable opportunity to expand my skills in a different area of cybersecurity.
I am impressed by Zerofox's innovative approach to protecting organizations from digital risks, and I am eager to contribute to their mission.
I believe that...
posted on 11 Sep 2024
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Different data formats in big data are used for various purposes like storage efficiency, data processing speed, and compatibility with different systems.
JSON: Lightweight, human-readable, and widely supported for web applications.
Parquet: Columnar storage format for efficient querying and processing of large datasets.
Avro: Schema-based serialization format with support for complex data types.
ORC: Optimized Row Columna...
Find the most frequent element in a list of strings.
Iterate through the list and count the frequency of each element using a dictionary.
Track the element with the highest frequency as you iterate.
Return the element with the highest frequency.
Psuedo code based test
posted on 31 Jan 2024
I applied via Referral and was interviewed in Dec 2023. There were 3 interview rounds.
posted on 12 Jun 2024
I applied via Walk-in and was interviewed in Dec 2023. There were 3 interview rounds.
Online CBT in MCQ pattern from Aptitude, C programming, DSP, Digital Electronics, Microcontroller and Microprocessor, Electronic devices and circuits
Pnp and Npn transistors are types of bipolar junction transistors used in electronic circuits. Microcontroller choice depends on project requirements. Dynamic memory allocation is a method of allocating memory during runtime.
Pnp and Npn transistors are used in electronic circuits to control the flow of current.
Microcontroller choice depends on factors like processing power, memory requirements, and peripherals needed. ...
posted on 17 Feb 2024
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP addresses are used to identify and locate devices on a network.
There are two types of IP addresses: IPv4 (32-bit) and IPv6 (128-bit).
IPv4 addresses are written in the format of four numbers separated by periods (e.g. 192.168.1.1).
IPv6 addresses are written in a hexadecimal format with colons separating each group of num...
To connect a device with software, you need to ensure compatibility, install necessary drivers, establish a connection method, and configure settings.
Ensure the device is compatible with the software being used
Install any required drivers for the device
Establish a connection method such as USB, Bluetooth, or Wi-Fi
Configure settings within the software to recognize the device
I applied via campus placement at Geethanjali College of Engineering And Technology, Hyderabad and was interviewed in Aug 2023. There were 4 interview rounds.
The 1st round was a combination of aptitude tests, technical MCQs, and cybersecurity-based MCQ questions. This round was moderate level.
My topic was "chatgpt- pros and cons ". gd round was about 15-20 mins with 8-10 students in each group. This round was comparatively easy.
I applied via Referral and was interviewed in Oct 2023. There were 4 interview rounds.
Asked about Six Sigma
They will ask you more about Six Sigma and your work experience.
None of the questions asked by me
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates w...
TCP/IP is a set of protocols that governs the way data is transmitted over the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
It is a suite of communication protocols used to connect devices on the internet.
TCP ensures that data packets are delivered error-free and in sequence.
IP is responsible for routing packets to their destination.
Examples of TCP/IP protocols include HTTP, FTP, and SMTP.
Software Engineer
8
salaries
| ₹8 L/yr - ₹15 L/yr |
Indus Towers
Vertiv
Nvidia
Colt Technology Services