Filter interviews by
I was interviewed in Dec 2024.
I was given an assignment on Audiobased attendance system.
I applied via Referral
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
National Informatics Centre interview questions for popular designations
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
Get interview-ready with Top National Informatics Centre Interview Questions
Reverse the string, Reverse of an array, Data base related queries
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
I applied via Walk-in and was interviewed in Feb 2024. There was 1 interview round.
Server hardening is the process of securing a server by reducing its attack surface and minimizing vulnerabilities.
Server hardening involves configuring the server to reduce the risk of unauthorized access, data theft, and other security threats.
This can include installing security patches and updates, disabling unnecessary services and ports, and implementing access controls.
Examples of server hardening measures inclu...
The default Mysql port is 3306.
Mysql uses port 3306 by default for communication.
The port number can be changed in the configuration file.
To connect to a Mysql server, the client must specify the correct port number.
SSH is a secure network protocol used for remote access to servers. SSL is a security protocol used for secure communication over the internet.
SSH stands for Secure Shell and is used for secure remote access to servers
SSH uses encryption to secure the communication between the client and server
SSL stands for Secure Sockets Layer and is used for secure communication over the internet
SSL uses encryption to secure the com...
Logical Volume Management (LVM) is a method of allocating space on mass storage devices that allows for flexible partitioning.
LVM allows for the creation of logical volumes that can span multiple physical disks.
It provides features such as resizing volumes on-the-fly and creating snapshots for backups.
LVM is commonly used in enterprise environments to manage large amounts of data.
Examples of LVM tools include pvcreate,
I will implement various security measures such as firewalls, access controls, regular updates, and backups.
Install and configure firewalls to prevent unauthorized access
Implement access controls to restrict access to sensitive data
Regularly update software and operating systems to patch vulnerabilities
Perform regular backups to ensure data can be restored in case of a security breach
Top trending discussions
Interview experience
based on 578 reviews
Rating in categories
Software Developer
708
salaries
| ₹2 L/yr - ₹9.4 L/yr |
Senior Software Developer
181
salaries
| ₹3 L/yr - ₹13.2 L/yr |
Software Engineer
148
salaries
| ₹3 L/yr - ₹7.2 L/yr |
Programmer
142
salaries
| ₹1.2 L/yr - ₹6 L/yr |
Java Developer
134
salaries
| ₹2.4 L/yr - ₹8.4 L/yr |
TCS
Wipro
Infosys
HCLTech