Filter interviews by
I applied via AmbitionBox and was interviewed in Aug 2022. There were 2 interview rounds.
I applied via Naukri.com
My required CTC is negotiable based on the job responsibilities and benefits offered.
My salary expectations are flexible and depend on the job requirements and company benefits.
I am open to discussing the compensation package during the interview process.
I am looking for a fair and competitive salary that reflects my skills and experience.
I am also interested in other benefits such as health insurance, retirement plans...
TCP is a reliable, connection-oriented protocol while UDP is a fast, unreliable, connectionless protocol.
TCP provides guaranteed delivery of data packets while UDP does not.
TCP ensures data integrity through error checking and retransmission while UDP does not.
TCP is suitable for applications that require reliable and ordered data transmission, such as web browsing and email.
UDP is suitable for applications that priori...
Nimbus Adcom interview questions for popular designations
Top trending discussions
The program capitalizes the first letter of each reversed word in a sentence.
Split the sentence into an array of words using space as a delimiter.
Reverse each word in the array and capitalize the first letter.
Join the modified words back into a sentence.
I applied via LinkedIn and was interviewed before Dec 2020. There were 5 interview rounds.
SEM stands for Search Engine Marketing, which involves promoting websites by increasing their visibility in search engine results pages.
SEM involves paid advertising on search engines like Google and Bing
It includes strategies like keyword research, ad copywriting, and bid management
SEM can be used to drive traffic, increase brand awareness, and generate leads or sales
Examples of SEM platforms include Google Ads, Bing
I applied via Naukri.com and was interviewed in Oct 2019. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
The end to end implementation cycle of ISMS involves planning, implementation, monitoring, review, and improvement.
Planning involves identifying the scope, objectives, and risks of the ISMS.
Implementation involves designing and implementing controls to mitigate identified risks.
Monitoring involves regular checks to ensure the controls are effective.
Review involves assessing the effectiveness of the ISMS and identifying...
Risk assessment involves identifying, analyzing, and evaluating potential risks to determine the likelihood and impact of those risks.
Identify potential risks
Analyze the likelihood and impact of each risk
Evaluate the risks to determine their priority
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Annex A controls are the information security controls listed in ISO 27001 standard.
Annex A contains 114 controls categorized into 14 sections.
These controls are designed to ensure the confidentiality, integrity, and availability of information.
Examples of controls include access control, asset management, cryptography, incident management, and more.
Organizations must select and implement controls based on their risk a...
Probability of a horse going out of a chessboard in 'n' steps.
The total number of possible moves for a horse is 8.
The probability of going out of the board depends on the position of the horse.
For example, if the horse is at a corner, the probability of going out of the board is higher.
The probability can be calculated using combinatorics and geometry.
Algorithms for manipulating arrays and strings in coding
Use sorting algorithms like quicksort and mergesort for arrays
Use string manipulation functions like substring and replace for strings
Use dynamic programming for optimizing solutions to array and string problems
Designing a large scale Ad Server
Use distributed systems for scalability
Implement caching for faster ad delivery
Ensure high availability and fault tolerance
Use real-time bidding for efficient ad placement
Implement fraud detection mechanisms
Ensure compliance with privacy regulations
based on 47 reviews
Rating in categories
Processing Executive
18
salaries
| ₹0.8 L/yr - ₹2.5 L/yr |
Executive Accountant
12
salaries
| ₹1.3 L/yr - ₹4.5 L/yr |
Technical Support Executive
8
salaries
| ₹1.8 L/yr - ₹2.5 L/yr |
Customer Care Executive
7
salaries
| ₹1.1 L/yr - ₹3.5 L/yr |
Data Analyst
7
salaries
| ₹1.6 L/yr - ₹2.5 L/yr |
R.R. Donnelley
Epsilon
Denave
Smollan Group