Microsoft Corporation
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Clear (1)
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
posted on 4 Mar 2025
I have over three years of experience in cybersecurity, focusing on threat analysis, incident response, and vulnerability management.
Conducted regular security assessments and vulnerability scans, identifying and mitigating risks in network infrastructure.
Managed incident response for security breaches, leading a team to investigate and remediate threats effectively.
Developed and implemented security policies and proce...
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Company Website and was interviewed in Dec 2021. There were 8 interview rounds.
I'm attend the interview tomorrow
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Cyber attacks in network are a major threat to organizations and can cause significant damage.
Cyber attacks can come in various forms such as malware, phishing, ransomware, and DDoS attacks.
Network security measures such as firewalls, intrusion detection systems, and antivirus software can help prevent cyber attacks.
Regular security audits and employee training can also help mitigate the risk of cyber attacks.
In the ev...
Application layers in cyber security refer to the different levels of software and protocols that make up an application.
Application layer is the topmost layer in the OSI model
It includes protocols like HTTP, SMTP, FTP, etc.
Security measures at this layer include firewalls, intrusion detection systems, and web application firewalls
Vulnerabilities at this layer include SQL injection, cross-site scripting, and session hi
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
To determine if a point is inside a polygon, use the ray casting algorithm.
Create a line from the point to a point outside the polygon
Count the number of times the line intersects with the polygon edges
If the count is odd, the point is inside the polygon; otherwise, it is outside
The four storage classes in C are auto, register, static, and extern.
Auto: default storage class for all local variables
Register: used to define local variables that should be stored in a register instead of RAM
Static: used to define local variables that retain their value between function calls
Extern: used to declare a global variable that is defined in another file
i is stored in global data segment, j is stored in stack, k is stored in heap.
i is a global variable and is stored in the global data segment
j is a local variable and is stored in the stack
k is a pointer variable and is stored in the stack, while the memory it points to is allocated on the heap using malloc()
Use a hash table to store the words and check for existence in constant time.
Create a hash table with the words as keys and a boolean value as the value.
For each new word, check if it exists in the hash table. If it does, it has appeared before. If not, add it to the hash table.
Alternatively, use a set data structure to store only the unique words and check for existence in the set.
based on 1 interview
Interview experience
Software Engineer
1.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
1.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
762
salaries
| ₹0 L/yr - ₹0 L/yr |
Consultant
600
salaries
| ₹0 L/yr - ₹0 L/yr |
Amazon
Deloitte
TCS