Filter interviews by
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Logical reasoning, english, maths
Top trending discussions
I applied via LinkedIn and was interviewed before Jul 2022. There were 3 interview rounds.
General Aptitude, English and Reasoning
FTIR stands for Fourier Transform Infrared Spectroscopy, a technique used to analyze the chemical composition of materials.
FTIR measures the absorption of infrared light by a sample to determine its chemical composition.
It is commonly used in chemistry, pharmaceuticals, food science, and material analysis.
FTIR can identify functional groups in organic compounds, determine polymer structures, and analyze contaminants in...
HPLC and LC-MS are analytical techniques used in chemistry to separate, identify, and quantify components in a mixture.
HPLC stands for High Performance Liquid Chromatography, used to separate and quantify components in a mixture based on their interactions with a stationary phase and mobile phase.
LC-MS stands for Liquid Chromatography-Mass Spectrometry, combines the separation capabilities of liquid chromatography with...
Chromatography is a technique used to separate and analyze mixtures based on their different interactions with a stationary phase and a mobile phase.
Chromatography is used in various industries such as pharmaceuticals, food and beverage, environmental analysis, and forensics.
Types of chromatography include gas chromatography, liquid chromatography, thin-layer chromatography, and paper chromatography.
The principle of ch...
I applied via Recruitment Consulltant and was interviewed in Apr 2023. There were 2 interview rounds.
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
I applied via Company Website and was interviewed before Nov 2022. There were 3 interview rounds.
I prefer a posting that allows me to work remotely and travel occasionally for client meetings.
Remote work flexibility is important to me
Ability to travel for client meetings is a plus
Prefer a mix of remote and in-person work
Easy to medium level coding
A pointer is a variable that stores the memory address of another variable.
Pointers allow direct manipulation of memory and efficient memory management.
They are commonly used in programming languages like C and C++.
Example: int* ptr; // declares a pointer to an integer variable
posted on 20 May 2021
Questions related to software development concepts and technologies.
Class is a blueprint for creating objects in Java.
Object is an instance of a class.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Struts is a framework for developing Java web applications.
Database DDL commands are used to define database schema, while DML commands are used to manipulate data.
System testing is a type of...
posted on 11 Oct 2020
Server side state management is the process of storing and managing data on the server side of a web application.
It involves storing data on the server instead of the client side
It helps maintain consistency and security of data
Examples include session management and database management
Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.
Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.
During initialization, the page is created and controls are initialized.
During loading, the page is loaded with data and controls are populated.
During rendering, t...
The components of .NET include the Common Language Runtime, Framework Class Library, and ASP.NET.
Common Language Runtime (CLR) - manages memory, security, and execution of code
Framework Class Library (FCL) - collection of reusable classes, interfaces, and value types
ASP.NET - web application framework for building dynamic web pages and web services
Cookies are small text files stored on a user's computer by a website to remember user preferences and login information.
Cookies are used to track user activity on a website
They can be used to store user preferences and login information
Cookies can be either session cookies or persistent cookies
Session cookies are deleted when the user closes their browser
Persistent cookies remain on the user's computer until they expi
CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.
CLR is responsible for memory management, security, and exception handling.
It compiles code into an intermediate language (IL) and then executes it.
CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.
Examples of la...
posted on 3 Jan 2023
OOPs concept in Java is a programming paradigm that focuses on objects and their interactions.
OOPs stands for Object-Oriented Programming
It emphasizes on encapsulation, inheritance, and polymorphism
Encapsulation is the process of hiding implementation details from the user
Inheritance allows a class to inherit properties and methods from another class
Polymorphism allows objects to take on multiple forms or behaviors
Exam...
StringTokenizer is a class in Java that breaks a string into tokens based on a delimiter.
It is a legacy class that is not recommended to use in new code.
It is used to split a string into smaller parts based on a delimiter.
The default delimiter is whitespace, but it can be changed to any character or string.
It is useful for parsing text files or data that is separated by a specific character.
Example: StringTokenizer st ...
I am comfortable with a wide range of technologies including Java, Python, JavaScript, and SQL.
Proficient in Java and Python programming languages
Familiar with JavaScript and its frameworks such as React and Angular
Experienced in working with SQL databases
Comfortable with version control systems like Git
Knowledgeable in software development methodologies like Agile and Scrum
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
based on 1 interview
Interview experience
Executive Accountant
12
salaries
| ₹2 L/yr - ₹3.6 L/yr |
Deputy Manager
11
salaries
| ₹9.5 L/yr - ₹14 L/yr |
CMA Trainee
10
salaries
| ₹1 L/yr - ₹2 L/yr |
Executive Assistant
9
salaries
| ₹2 L/yr - ₹6 L/yr |
Manager Marketing & Business Development
8
salaries
| ₹14 L/yr - ₹14 L/yr |
Government of India
National Informatics Centre
Central Reserve Police Force
Ministry of Defence