Filter interviews by
Top trending discussions
I am a recent graduate with a degree in Computer Science and a passion for coding and problem-solving.
Recent graduate with a degree in Computer Science
Passionate about coding and problem-solving
Experience with programming languages like Java, Python, and C++
Completed internships at tech companies
MERN is a full stack JavaScript framework that consists of MongoDB, Express.js, React, and Node.js.
MERN stands for MongoDB, Express.js, React, and Node.js.
It is used for building dynamic web applications.
MongoDB is the database, Express.js is the backend framework, React is the frontend library, and Node.js is the runtime environment.
posted on 2 Mar 2024
I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.
posted on 16 Jun 2023
The exam was conducted online. Prepare the basics of the concepts
I applied via Company Website and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
I was interviewed in May 2017.
posted on 7 Apr 2022
posted on 26 Sep 2024
C language basic questions, microcontroller
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Office Assistant
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Executive Assistant
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Research Scientist
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Web Developer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
National Informatics Centre
Software Technology Parks of India
Centre for Development of Advanced Computing
NASSCOM