Filter interviews by
I applied via Referral and was interviewed in Dec 2020. There were 4 interview rounds.
I applied via Referral and was interviewed before Apr 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data delivery, while UDP (User Datagram Protocol) is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection between sender and receiver.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is used for applications like web br...
I applied via Job Portal and was interviewed in Mar 2024. There were 2 interview rounds.
Quant,Logical Reasoning
Simple Aptitude and Case study
I applied via Walk-in and was interviewed before Jan 2021. There were 4 interview rounds.
I applied via Referral and was interviewed in Mar 2023. There were 2 interview rounds.
Handling an angry customer requires active listening, empathy, and a willingness to find a solution.
Listen actively to the customer's concerns without interrupting them
Empathize with the customer's frustration and acknowledge their feelings
Apologize for any inconvenience caused and take responsibility for finding a solution
Offer a solution that meets the customer's needs and expectations
Follow up with the customer to e
I applied via Referral and was interviewed before Jan 2019. There were 5 interview rounds.
posted on 27 Jul 2018
I applied via Recruitment Consultant and was interviewed before Jul 2017. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Apr 2023. There were 3 interview rounds.
A DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
This can lead to service disruption or downtime for legitimate users
Common types include UDP flood, ICMP flood, and SYN flood attacks
based on 1 review
Rating in categories
Guest Service Associate
169
salaries
| ₹1 L/yr - ₹4 L/yr |
Sales and Service Associate
107
salaries
| ₹2.4 L/yr - ₹4 L/yr |
Food & Beverage Executive
92
salaries
| ₹2 L/yr - ₹4.6 L/yr |
Front Office Associate
91
salaries
| ₹1 L/yr - ₹4 L/yr |
Front Office Executive
90
salaries
| ₹1.9 L/yr - ₹4.2 L/yr |
Jubilant Foods Works
Cafe Coffee Day
Burger King
Barbeque Nation