Filter interviews by
I applied via Job Portal and was interviewed before Oct 2023. There was 1 interview round.
40 general knowledgand 20 mathematics question or current affairs
Top trending discussions
posted on 1 Feb 2022
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples...
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
based on 1 review
Rating in categories
Young Professional
51
salaries
| ₹5.5 L/yr - ₹7.3 L/yr |
Data Entry Operator
10
salaries
| ₹1.7 L/yr - ₹3 L/yr |
Investigator
9
salaries
| ₹2.3 L/yr - ₹2.7 L/yr |
Field Investigator
7
salaries
| ₹2.4 L/yr - ₹3.2 L/yr |
Consultant
6
salaries
| ₹6 L/yr - ₹7.4 L/yr |
Indian Ministry of Education
Ministry of Corporate Affairs
Ministry of Finance - India
Ministry Of Health, New Delhi