Filter interviews by
I applied via Approached by Company and was interviewed before May 2023. There was 1 interview round.
I applied via Campus Placement and was interviewed in Mar 2021. There was 1 interview round.
The question is unclear. Please provide more context.
Please provide more information about the context of the question.
Without additional details, it is impossible to provide a meaningful answer.
The quality is not specified in the question.
Without knowing the quality in question, it is impossible to provide an answer.
More information is needed to answer this question.
Please provide additional context or clarification.
I applied via Job Fair and was interviewed in Oct 2021. There were 2 interview rounds.
Decipilen
I applied via Recruitment Consulltant and was interviewed before Aug 2021. There were 5 interview rounds.
Knowledge Comprehension Test
Stitch to Sample Test & Procedure
QCM-PPM in Work Environment.
Karan Letex interview questions for popular designations
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
As a team lead, my daily tasks include overseeing project progress, assigning tasks, providing guidance and support to team members, and ensuring deadlines are met.
Overseeing project progress and ensuring tasks are completed on time
Assigning tasks to team members based on their strengths and workload
Providing guidance and support to team members to help them succeed
Communicating with stakeholders to provide updates on ...
Database credentials can be stored securely in cloud using encryption, environment variables, and key management services.
Use encryption to protect sensitive information such as passwords and keys.
Store credentials in environment variables rather than hardcoding them in code.
Utilize key management services provided by cloud providers for secure storage and access control.
Avoid storing credentials in plain text files or...
Database credentials can be stored in a secure external vault service like HashiCorp Vault or AWS Secrets Manager.
Store database credentials in a secure external vault service like HashiCorp Vault or AWS Secrets Manager.
Utilize Kubernetes secrets to store the access credentials for the external vault service.
Implement proper access controls and encryption mechanisms to ensure the security of the stored credentials.
Yes, I have experience with React.
I have worked on multiple projects using React for front-end development.
I am proficient in using React components, state management, and hooks.
I have integrated React with backend technologies like Node.js for full-stack development.
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There were 2 interview rounds.
Product case study and experience-based questions.
I applied via Naukri.com and was interviewed in Mar 2024. There were 2 interview rounds.
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when an attacker inserts malicious SQL code into input fields on a website.
This code can then manipulate the database, steal data, or perform other unauthorized actions.
Example: Entering ' OR '1'='1' into a login form to bypass authentication.
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.
There are three types of XSS attacks: stored, reflected, and DOM-based.
Preventing XSS attacks in...
OTP flooding is a type of cyber attack where a large number of one-time passwords are sent to a target in order to overwhelm them.
OTP flooding is a form of denial-of-service attack.
Attackers flood the target with numerous OTPs, making it difficult for the target to use their legitimate OTP.
This type of attack can be used to disrupt services or gain unauthorized access to accounts.
Examples of OTP flooding include sendin...
Resource flooding is a type of cyber attack where an attacker overwhelms a system with excessive requests, causing it to become slow or unresponsive.
Resource flooding is a type of denial of service (DoS) attack.
Attackers flood a system with excessive requests, such as HTTP requests or network traffic, to overwhelm its resources.
This can lead to the system becoming slow or unresponsive, disrupting normal operations.
Comm...
posted on 10 Apr 2023
Hotel Operations roles involve managing various departments and ensuring smooth functioning of the hotel.
Hotel Operations roles include managing front desk, housekeeping, food and beverage, maintenance, and security departments.
Ensuring guest satisfaction, managing budgets, and maintaining quality standards are key responsibilities.
Scenarios may include handling guest complaints, managing staff schedules, and overseein...
Yes, I am willing to work rotational shifts as per the company's requirement.
I understand the importance of flexibility in a senior executive role
I am willing to adjust my schedule to meet the needs of the company
I have experience working in rotational shifts in my previous roles
I am committed to ensuring smooth operations and meeting deadlines
I am open to discussing any concerns or limitations with the company
posted on 24 Jul 2021
based on 1 interview
Interview experience
based on 34 reviews
Rating in categories
Merchandiser
6
salaries
| ₹3.2 L/yr - ₹6 L/yr |
Senior Merchandiser
6
salaries
| ₹6.7 L/yr - ₹8 L/yr |
Asst Store
5
salaries
| ₹1.8 L/yr - ₹2 L/yr |
Store Incharge
5
salaries
| ₹1.8 L/yr - ₹3 L/yr |
Production Incharge
5
salaries
| ₹1.9 L/yr - ₹4 L/yr |
Arvind Group
Raymond Lifestyle Limited
Welspun Living Limited
Trident Group