Filter interviews by
The cyber kill chain is a model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
The cyber kill chain was developed by Lockheed Martin to help organizations understand and defend against cyber attacks.
The stages of the cyber kill chain include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
By understanding e...
I applied via LinkedIn and was interviewed in Jun 2023. There were 4 interview rounds.
Drafting of commercial contract
Legal questions and drafting of contract
Drafting IP assignment rights agreement involves specifying transfer of intellectual property rights.
Specify the parties involved in the agreement
Clearly define the intellectual property being transferred
Include terms regarding consideration for the transfer
Address any restrictions or limitations on the use of the intellectual property
Include clauses regarding confidentiality and non-disclosure
Specify the governing law
Top trending discussions
I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.
posted on 6 Nov 2015
I applied via Referral and was interviewed in Jul 2023. There were 4 interview rounds.
String , Array ,Collection framework related questions.
Ecommerce site with Login,Review,AddToCart,Order features,Filter features.
I appeared for an interview in Jun 2023.
I applied via LinkedIn and was interviewed in Apr 2023. There were 3 interview rounds.
Todo application javascript todo app creation needs to submit
I applied via Company Website and was interviewed in Jul 2023. There were 4 interview rounds.
I have given the coding test in python language. Out of 5 questions, we have to attain a minimum of 3 questions.
A pointer to pointer is a variable that stores the memory address of another pointer variable.
It is used to create dynamic data structures like linked lists and trees.
It allows multiple levels of indirection.
It is denoted by ** in C and C++.
Example: int **ptr;
Example: ptr = &p; where p is a pointer variable.
posted on 2 Jul 2024
Main principles of Java include object-oriented programming, platform independence, and automatic memory management.
Object-oriented programming: Java is based on classes and objects, allowing for encapsulation, inheritance, and polymorphism.
Platform independence: Java code can run on any platform that has a Java Virtual Machine (JVM) installed.
Automatic memory management: Java uses garbage collection to automatically m
The == operator compares the memory addresses of two objects, while the equals method compares the content of two objects.
The == operator is used to compare the memory addresses of two objects in Java.
The equals method is used to compare the content of two objects in Java.
Example: String str1 = new String("hello"); String str2 = new String("hello"); str1 == str2 will return false, but str1.equals(str2) will return true
based on 3 interviews
Interview experience
based on 40 reviews
Rating in categories
Software Developer
46
salaries
| ₹1.8 L/yr - ₹6.7 L/yr |
Security Analyst
30
salaries
| ₹1.6 L/yr - ₹6 L/yr |
Senior Software Developer
10
salaries
| ₹7.5 L/yr - ₹17.3 L/yr |
HR Executive
7
salaries
| ₹2.2 L/yr - ₹4.1 L/yr |
Quality Analyst
6
salaries
| ₹1.9 L/yr - ₹6 L/yr |
Pitney Bowes
Sagitec Solutions
Zebra Technologies
Systech Solutions