Filter interviews by
The cyber kill chain is a model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
The cyber kill chain was developed by Lockheed Martin to help organizations understand and defend against cyber attacks.
The stages of the cyber kill chain include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
By understanding e...
I applied via LinkedIn and was interviewed in Jun 2023. There were 4 interview rounds.
Drafting of commercial contract
Legal questions and drafting of contract
Drafting IP assignment rights agreement involves specifying transfer of intellectual property rights.
Specify the parties involved in the agreement
Clearly define the intellectual property being transferred
Include terms regarding consideration for the transfer
Address any restrictions or limitations on the use of the intellectual property
Include clauses regarding confidentiality and non-disclosure
Specify the governing law
I applied via Job Portal and was interviewed before Mar 2023. There were 2 interview rounds.
CRUD database operation
I applied via Naukri.com and was interviewed before Feb 2022. There were 2 interview rounds.
Leo TechnoSoft interview questions for popular designations
Top trending discussions
I applied via Referral and was interviewed in Oct 2024. There were 3 interview rounds.
4 easy level questions will be asked basically from arrays and strings.
Assignment will be given after clearing coding round. In my case ELearning Platform project was given and 7 days time was given to complete.
I applied via Walk-in and was interviewed in Nov 2024. There were 3 interview rounds.
Verbal communicatiom, attention to detail, email writing part
posted on 28 Dec 2024
I applied via Campus Placement
Basic aptitude assessment along with some theoretical components.
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
The OSI (Open Systems Interconnection) model consists of 7 layers that define the functions of a network communication system.
Physical Layer: Deals with physical connections and transmission of raw data.
Data Link Layer: Manages data frames and error detection/correction.
Network Layer: Handles routing and logical addressing.
Transport Layer: Ensures end-to-end communication and data flow control.
Session Layer: Establishe...
Avoid deadlock by implementing proper resource allocation strategies and using techniques like timeouts and resource ordering.
Implement proper resource allocation strategies to prevent multiple processes from holding resources indefinitely.
Use timeouts to limit the amount of time a process can wait for a resource before releasing it.
Follow a strict resource ordering protocol to ensure processes request and release reso...
posted on 10 Jan 2025
Agile methodologies in B2B projects involve frequent communication, adaptability, and collaboration with stakeholders.
Agile methodologies in B2B projects prioritize customer collaboration and responding to change over following a strict plan.
Regular feedback from stakeholders helps in adjusting project scope and priorities in real-time.
Cross-functional teams work together closely to deliver incremental value to the B2B...
I have extensive experience working with barcode scanners in various automation projects.
Implemented barcode scanning functionality in warehouse management system to track inventory
Integrated barcode scanners with automated testing tools for regression testing
Utilized barcode scanners in manufacturing processes to improve efficiency and accuracy
I applied via Naukri.com
based on 4 interviews
Interview experience
based on 40 reviews
Rating in categories
Software Developer
35
salaries
| ₹1.8 L/yr - ₹6.7 L/yr |
Security Analyst
30
salaries
| ₹1.6 L/yr - ₹6 L/yr |
Senior Software Developer
10
salaries
| ₹7.5 L/yr - ₹17.3 L/yr |
HR Executive
7
salaries
| ₹2.2 L/yr - ₹4.1 L/yr |
Quality Analyst
6
salaries
| ₹1.9 L/yr - ₹6 L/yr |
TCS
Infosys
Wipro
HCLTech