Filter interviews by
The cyber kill chain is a model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
The cyber kill chain was developed by Lockheed Martin to help organizations understand and defend against cyber attacks.
The stages of the cyber kill chain include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
By understanding e...
I applied via LinkedIn and was interviewed in Jun 2023. There were 4 interview rounds.
Drafting of commercial contract
Legal questions and drafting of contract
Drafting IP assignment rights agreement involves specifying transfer of intellectual property rights.
Specify the parties involved in the agreement
Clearly define the intellectual property being transferred
Include terms regarding consideration for the transfer
Address any restrictions or limitations on the use of the intellectual property
Include clauses regarding confidentiality and non-disclosure
Specify the governing law
I applied via Job Portal and was interviewed before Mar 2023. There were 2 interview rounds.
CRUD database operation
I applied via Naukri.com and was interviewed before Feb 2022. There were 2 interview rounds.
Leo TechnoSoft interview questions for popular designations
I applied via Referral and was interviewed in Oct 2024. There were 3 interview rounds.
4 easy level questions will be asked basically from arrays and strings.
Assignment will be given after clearing coding round. In my case ELearning Platform project was given and 7 days time was given to complete.
I applied via Walk-in and was interviewed in Nov 2024. There were 3 interview rounds.
Verbal communicatiom, attention to detail, email writing part
posted on 28 Dec 2024
I applied via Campus Placement
Basic aptitude assessment along with some theoretical components.
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
The OSI (Open Systems Interconnection) model consists of 7 layers that define the functions of a network communication system.
Physical Layer: Deals with physical connections and transmission of raw data.
Data Link Layer: Manages data frames and error detection/correction.
Network Layer: Handles routing and logical addressing.
Transport Layer: Ensures end-to-end communication and data flow control.
Session Layer: Establishe...
Avoid deadlock by implementing proper resource allocation strategies and using techniques like timeouts and resource ordering.
Implement proper resource allocation strategies to prevent multiple processes from holding resources indefinitely.
Use timeouts to limit the amount of time a process can wait for a resource before releasing it.
Follow a strict resource ordering protocol to ensure processes request and release reso...
posted on 10 Jan 2025
posted on 12 Dec 2024
Angular Directives are markers on a DOM element that tell AngularJS's HTML compiler to attach a specified behavior to that DOM element.
Directives are used to create reusable components or custom behaviors in Angular applications.
They can be used to manipulate the DOM, add event listeners, show/hide elements, etc.
Examples include ngModel, ngIf, ngFor, etc.
Methods to communicate between components in Angular include Input and Output properties, ViewChild, Services, and Event Emitters.
Using Input and Output properties to pass data from parent to child components and emit events from child to parent components.
Using ViewChild to access child components from parent components.
Using Services to create a shared service that can be injected into multiple components to share da...
based on 40 reviews
Rating in categories
Software Developer
37
salaries
| ₹1.8 L/yr - ₹6.7 L/yr |
Security Analyst
30
salaries
| ₹1.6 L/yr - ₹6 L/yr |
Senior Software Developer
11
salaries
| ₹7.5 L/yr - ₹17.3 L/yr |
HR Executive
7
salaries
| ₹2.2 L/yr - ₹4.1 L/yr |
Quality Analyst
6
salaries
| ₹1.9 L/yr - ₹6 L/yr |
TCS
Infosys
Wipro
HCLTech