i
Kratikal Tech Private Limited
Filter interviews by
Clear (1)
I applied via LinkedIn and was interviewed before May 2023. There were 3 interview rounds.
Top trending discussions
posted on 5 Feb 2023
I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 2 interview rounds.
To reset a password protected BIOS configuration, you can use various methods such as removing the CMOS battery, using a BIOS reset jumper, or using manufacturer-specific software.
Remove the CMOS battery from the motherboard for a few minutes to reset the BIOS settings.
Locate the BIOS reset jumper on the motherboard and move it to the reset position for a few seconds.
Use manufacturer-specific software or tools to reset...
DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
DNS stands for Domain Name System.
It translates domain names into IP addresses.
DNS servers help in resolving domain names to their corresponding IP addresses.
They play a crucial role in the functioning of the internet.
DNS servers use a hierarchical structure for efficient name resolution.
They use different typ...
XSS attack is a type of web vulnerability where attackers inject malicious scripts into trusted websites to steal sensitive information or perform unauthorized actions.
XSS stands for Cross-Site Scripting.
Attackers exploit vulnerabilities in web applications to inject malicious scripts.
These scripts are then executed by unsuspecting users visiting the compromised website.
XSS attacks can be classified into three types: s...
The type of data stored in OSI Model Data Link Layer is the frame or packet.
The Data Link Layer is responsible for the physical transmission of data between network nodes.
It encapsulates the network layer packet into a frame with additional control information.
Examples of data stored in this layer include Ethernet frames, MAC addresses, and error detection codes.
MITM Attack is a type of cyber attack where an attacker intercepts communication between two parties to gain unauthorized access or steal information.
MITM stands for Man-in-the-Middle.
The attacker positions themselves between the sender and receiver to intercept and manipulate the communication.
Disadvantages of MITM attacks include unauthorized access to sensitive information, data theft, and potential for further expl...
SSL and TLS are cryptographic protocols used to secure communication over the internet.
SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.
SSL is the predecessor of TLS.
Both protocols provide encryption and authentication for secure communication.
TLS is considered more secure than SSL.
SSL uses a combination of symmetric and asymmetric encryption, while TLS primarily uses symmetric encryption...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be prevented by properly validating and sanitizing user input.
Developers should also use output encoding to prevent malicious scripts from being executed.
Using Content Security Policy (CSP) can also help prevent XSS attacks.
Examples of XSS att...
CSRF stands for Cross-Site Request Forgery. It is a type of attack that tricks a user into performing an action they did not intend to.
CSRF occurs when a malicious website or email tricks a user into clicking a link or button that performs an action on a different website where the user is already authenticated.
To prevent CSRF attacks, websites can use techniques such as CSRF tokens, which are unique values generated f...
posted on 14 Jul 2023
I applied via Referral and was interviewed before Jul 2022. There were 3 interview rounds.
CIA stands for Confidentiality, Integrity, and Availability in the context of information security.
Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.
Integrity: Ensuring that information is accurate and has not been tampered with.
Availability: Ensuring that information is accessible when needed by authorized users.
Example: Encrypting sensitive data to maintain confident...
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
I was interviewed before May 2016.
posted on 7 May 2017
I was interviewed in Feb 2017.
I applied via Campus Placement and was interviewed before Oct 2020. There were 4 interview rounds.
TCP-IP model has 4 layers: Application, Transport, Internet, and Network Interface.
Application layer deals with user interface and application protocols (HTTP, FTP, SMTP, etc.)
Transport layer provides end-to-end data transfer and error recovery (TCP, UDP)
Internet layer handles routing and addressing (IP)
Network Interface layer deals with physical network connection (Ethernet, Wi-Fi, etc.)
I applied via Referral and was interviewed before Apr 2021. There was 1 interview round.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Security Analyst
24
salaries
| ₹0 L/yr - ₹0 L/yr |
HR Executive
14
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Development Executive
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Safe Security
TAC Security
QUICK HEAL TECHNOLOGIES
Cyberbit