Filter interviews by
Authentication verifies the identity of a user, while authorization determines what actions the user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions granted to a user.
Authentication precedes authorization in the security process.
Example: Logging into a website with a username and password is...
Pentesting is a method of assessing the security of a system by simulating real-world attacks. NMap is a popular tool for network scanning.
Pentesting, short for penetration testing, involves identifying vulnerabilities in a system through simulated attacks.
There are different types of pentesting, including network, web application, wireless, and social engineering.
NMap is a powerful network scanning tool used to discov...
I applied via Recruitment Consulltant
They give you paper with basic java questions based on oops
I applied via Naukri.com and was interviewed in Oct 2023. There were 2 interview rounds.
VAPT stands for Vulnerability Assessment and Penetration Testing.
Vulnerability Assessment involves identifying and assessing vulnerabilities in a system or network.
Penetration Testing involves simulating cyber attacks to exploit vulnerabilities and test the security measures in place.
VAPT combines both approaches to provide a comprehensive security assessment.
Examples of VAPT tools include Nessus, Metasploit, and OpenV
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access to data and information.
It includes protecting against malware, phishing, ransomware, and other cyber threats.
Cyber security also involves monitoring for security breaches and responding to incidents to minimize damage.
Examples of cyber security tools...
I applied via Walk-in and was interviewed in Nov 2022. There were 3 interview rounds.
When I visit in the company office they first say to download the company app in which they have taken my aptitude test.
Answers to common Java interview questions on super keyword, inheritance, and abstract classes.
The super keyword is used to call a method or constructor in the parent class.
Inheritance is a mechanism in which one class acquires the properties and methods of another class.
Abstract classes are classes that cannot be instantiated and are used as a base for other classes to inherit from.
Abstract methods are methods that do...
MobiTrail interview questions for popular designations
Top trending discussions
I applied via Naukri.com
I applied via Indeed and was interviewed in Jan 2021. There was 1 interview round.
posted on 21 Feb 2015
Quantifiable factors to rate cab drivers for company's purpose
Customer ratings and feedback
Number of completed trips
Average trip duration
Percentage of on-time pickups
Accident and traffic violation history
Vehicle cleanliness and maintenance
Driver punctuality and professionalism
The criterion for choosing between Yuvraj Singh and Stuart Binny for the World Cup squad would be based on their recent performance, fitness, and team balance.
Evaluate recent performance of both players
Assess fitness levels of both players
Consider team balance and required skill sets
Analyze pitch and weather conditions of the tournament
Take into account the opposition teams and their strengths and weaknesses
I was interviewed before Feb 2021.
Round duration - 65 minutes
Round difficulty - Easy
There were 2 sections –
Aptitude and Logical Reasoning and MCQ based on Java question ,C++, coding for 20 min and 45 min respectively.
Section A- Not very difficult to clear this round although less time was a problem.
Section B- It contains 15 multiple choice question on c/c++,java and 4 simple coding questions
Determine if a given singly linked list of integers forms a cycle or not.
A cycle in a linked list occurs when a node's next
points back to a previous node in the ...
Detect if a singly linked list forms a cycle by checking if a node's next pointer points back to a previous node.
Traverse the linked list using two pointers, one moving at double the speed of the other.
If the two pointers meet at any point, there is a cycle in the linked list.
Use Floyd's Cycle Detection Algorithm for O(N) time complexity and O(1) space complexity.
Round duration - 75 minutes
Round difficulty - Medium
It was an online coding test in which 3 coding question were given.
Given two strings, S
and X
, your task is to find the smallest substring in S
that contains all the characters present in X
.
S = "abdd", X = "bd"
Find the smallest substring in string S that contains all characters in string X.
Iterate through string S and keep track of characters in X found in a window
Use two pointers to maintain the window and slide it to find the smallest window
Return the smallest window containing all characters in X
Given a non-decreasing sorted array ARR
of N
positive numbers, determine the smallest positive integer that cannot be expressed as the sum of elements from...
Find the smallest positive integer that cannot be expressed as the sum of elements from any proper subset of a non-decreasing sorted array of positive numbers.
Start with the smallest possible integer that cannot be represented, which is 1.
Iterate through the array and update the smallest integer that cannot be represented.
If the current element is greater than the smallest integer that cannot be represented, return tha...
Given a square chessboard of size 'N x N', determine the minimum number of moves a Knight requires to reach a specified target position from its initial position...
Calculate the minimum number of moves a Knight needs to reach a target position on a chessboard.
Implement a function that takes knight's starting position, target position, and chessboard size as input
Use breadth-first search algorithm to find the shortest path for the Knight
Consider all possible 8 movements of the Knight on the chessboard
Return the minimum number of moves required for the Knight to reach the target po
Round duration - 60 minutes
Round difficulty - Easy
It started with a discussion on the programs given in coding round. They asked me about my interest field after that they directly jumped into Networking, Linux and Ethical Hacking part looking my interest domain. They asked me various question on networking and linux.
Then they asked me to code a simple c program
Given a singly linked list of integers, return the head of the reversed linked list.
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed link...
Reverse a singly linked list of integers and return the head of the reversed linked list.
Iterate through the linked list and reverse the pointers to point to the previous node.
Keep track of the current, previous, and next nodes while reversing the linked list.
Update the head of the reversed linked list as the last node encountered during reversal.
FTP uses port number 21 and SMTP uses port number 25.
FTP uses port 21 for data transfer and port 20 for control information.
SMTP uses port 25 for email communication.
Understanding port numbers is important for network communication.
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: Layer 1 (Physical) deals with physi...
To copy files in Linux, you can use the 'cp' command.
Use the 'cp' command followed by the source file and destination directory to copy a file.
To copy a directory and its contents, use the '-r' flag with the 'cp' command.
You can also use wildcards like '*' to copy multiple files at once.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Some of the top questions asked at the MobiTrail interview -
based on 3 interviews
Interview experience
based on 29 reviews
Rating in categories
Software Developer
43
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Programmer
17
salaries
| ₹0 L/yr - ₹0 L/yr |
IT Security Analyst
11
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Programmer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Information Security Analyst
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Ola Cabs
Swiggy
Paytm
Flipkart