Filter interviews by
The CIA Triad represents the core principles of information security: Confidentiality, Integrity, and Availability.
Confidentiality: Ensuring that sensitive information is accessed only by authorized users. Example: Encryption of data.
Integrity: Maintaining the accuracy and consistency of data over its lifecycle. Example: Hash functions to verify data integrity.
Availability: Ensuring that information and resources ...
NIST and ISO 27001 are frameworks for managing information security risks and ensuring data protection.
NIST (National Institute of Standards and Technology) provides a Cybersecurity Framework that helps organizations manage cybersecurity risks.
ISO 27001 is an international standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
Both framework...
Symmetric encryption uses one key for both encryption and decryption, while asymmetric uses a pair of keys: public and private.
Symmetric encryption is faster and more efficient for large data sets.
Asymmetric encryption provides enhanced security through key pairs.
Example of symmetric encryption: AES (Advanced Encryption Standard).
Example of asymmetric encryption: RSA (Rivest-Shamir-Adleman).
Symmetric keys must be ...
Map, reduce, and filter are higher-order functions in JavaScript used to manipulate arrays.
Map: Transforms each element in an array and returns a new array with the transformed elements.
Reduce: Reduces an array to a single value by applying a function to each element.
Filter: Creates a new array with elements that pass a certain condition.
Detecting a cycle in a linked list using Floyd's Tortoise and Hare algorithm.
Use two pointers: slow and fast. Slow moves one step, fast moves two steps.
If there's a cycle, slow and fast will eventually meet.
If fast reaches the end (null), there's no cycle.
Example: In a list 1 -> 2 -> 3 -> 4 -> 2 (cycle), slow and fast meet at 2.
I would use a combination of HTML, CSS, and JavaScript to create a simple web application that stores and displays data.
Use HTML to create the structure of the web application
Use CSS to style the elements on the page
Use JavaScript to handle user interactions and store/retrieve data
Consider using a backend server (e.g. Node.js) to handle data storage and retrieval
Utilize AJAX to fetch data from the server asynchron...
Binary search is a technique used to efficiently locate a target value within a sorted array.
Start by comparing the target value to the middle element of the array.
If the target value is less than the middle element, search the left half of the array.
If the target value is greater than the middle element, search the right half of the array.
Repeat the process until the target value is found or the subarray is empty...
Code to call an API and display data
Use a library like Axios or Fetch to make the API call
Parse the response data and display it on the frontend
Handle any errors that may occur during the API call
A queue can be designed using an array or linked list data structure.
A queue follows the FIFO (First In First Out) principle.
Elements are added to the rear end and removed from the front end.
Array implementation requires keeping track of front and rear indices.
Linked list implementation requires keeping track of only front and rear nodes.
AMI is a pre-configured virtual machine image used to create EC2 instances, while Snapshot is a backup of an EBS volume.
AMI is used to launch EC2 instances with pre-configured settings and software
Snapshot is a backup of an EBS volume that can be used to restore data or create a new volume
AMI includes the operating system, application server, and any other software needed for the instance
Snapshot only includes the...
I appeared for an interview in Apr 2025, where I was asked the following questions.
The CIA Triad represents the core principles of information security: Confidentiality, Integrity, and Availability.
Confidentiality: Ensuring that sensitive information is accessed only by authorized users. Example: Encryption of data.
Integrity: Maintaining the accuracy and consistency of data over its lifecycle. Example: Hash functions to verify data integrity.
Availability: Ensuring that information and resources are a...
Symmetric encryption uses one key for both encryption and decryption, while asymmetric uses a pair of keys: public and private.
Symmetric encryption is faster and more efficient for large data sets.
Asymmetric encryption provides enhanced security through key pairs.
Example of symmetric encryption: AES (Advanced Encryption Standard).
Example of asymmetric encryption: RSA (Rivest-Shamir-Adleman).
Symmetric keys must be share...
The MITRE ATT&CK framework is a comprehensive knowledge base of cyber adversary tactics and techniques.
It categorizes adversary behavior into tactics (goals) and techniques (methods).
For example, 'Initial Access' is a tactic, while 'Phishing' is a technique under it.
The framework is used for threat modeling, detection, and response planning.
Organizations can map their security controls against ATT&CK techniques...
Threat intelligence involves understanding and mitigating security threats, while CVE and CVSS help assess vulnerabilities.
Threat Intelligence: The collection and analysis of information about threats to inform security decisions.
Common Vulnerabilities and Exposures (CVE): A publicly available database of known vulnerabilities in software and hardware.
Example of CVE: CVE-2021-34527, also known as PrintNightmare, which ...
NIST and ISO 27001 are frameworks for managing information security risks and ensuring data protection.
NIST (National Institute of Standards and Technology) provides a Cybersecurity Framework that helps organizations manage cybersecurity risks.
ISO 27001 is an international standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
Both frameworks emp...
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
Detecting a cycle in a linked list using Floyd's Tortoise and Hare algorithm.
Use two pointers: slow and fast. Slow moves one step, fast moves two steps.
If there's a cycle, slow and fast will eventually meet.
If fast reaches the end (null), there's no cycle.
Example: In a list 1 -> 2 -> 3 -> 4 -> 2 (cycle), slow and fast meet at 2.
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
The advantages and disadvantages of AI.
I live in a cozy apartment in downtown Los Angeles.
I live in downtown Los Angeles
I reside in a cozy apartment
My address is in the city center
Yes, I am comfortable with the Noida location as I have lived and worked there before.
I have previous experience working in Noida.
I am familiar with the area and its amenities.
I have friends or family living in Noida who can provide support.
I have researched the commute options and find them suitable.
A singleton class is a class that can only have one instance created and provides a global point of access to that instance.
Singleton classes are often used in scenarios where only one instance of a class is needed, such as for managing a connection pool or configuration settings.
The singleton pattern typically involves a private constructor, a static method to access the instance, and a static variable to hold the ins...
Easy questions oops,java,rest assured
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There were 4 interview rounds.
Java coding , logical questions
I applied via Approached by Company and was interviewed in Oct 2023. There were 3 interview rounds.
Top trending discussions
Some of the top questions asked at the Monotype interview -
The duration of Monotype interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 17 interview experiences
Difficulty level
Duration
based on 121 reviews
Rating in categories
Senior Software Engineer
35
salaries
| ₹19 L/yr - ₹31.8 L/yr |
Market Research Associate
27
salaries
| ₹6 L/yr - ₹8 L/yr |
Product Manager
23
salaries
| ₹24 L/yr - ₹38 L/yr |
Software Engineer
21
salaries
| ₹12 L/yr - ₹19 L/yr |
Market Research Specialist
17
salaries
| ₹7.6 L/yr - ₹9 L/yr |
Pitney Bowes
Dataflow Group
Sapphire Software Solutions (India)
Sagitec Solutions