Filter interviews by
TCP is a reliable, connection-oriented protocol while UDP is a fast, unreliable, connectionless protocol.
TCP provides guaranteed delivery of data packets while UDP does not.
TCP ensures data integrity through error checking and retransmission while UDP does not.
TCP is suitable for applications that require reliable and ordered data transmission, such as web browsing and email.
UDP is suitable for applications that priori...
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
Built an app using dot net and angular
I applied via Naukri.com and was interviewed before Oct 2021. There were 2 interview rounds.
Polymorphism is a key feature of OOP in C#. Extension methods allow adding new functionality to existing types.
Polymorphism allows objects of different classes to be treated as if they are of the same type.
Extension methods are static methods that can be called as if they were instance methods of the extended type.
Polymorphism and extension methods can be used together to add new behavior to existing types without modi
Angular is a framework for building web applications using TypeScript, which is a superset of JavaScript.
Angular provides a structure for building web applications using components, services, and modules.
TypeScript is a statically typed language that provides better tooling and error checking than JavaScript.
Services in Angular are used for sharing data and functionality across components.
Components in Angular are the ...
I applied via Naukri.com and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2019. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
The end to end implementation cycle of ISMS involves planning, implementation, monitoring, review, and improvement.
Planning involves identifying the scope, objectives, and risks of the ISMS.
Implementation involves designing and implementing controls to mitigate identified risks.
Monitoring involves regular checks to ensure the controls are effective.
Review involves assessing the effectiveness of the ISMS and identifying...
Risk assessment involves identifying, analyzing, and evaluating potential risks to determine the likelihood and impact of those risks.
Identify potential risks
Analyze the likelihood and impact of each risk
Evaluate the risks to determine their priority
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Annex A controls are the information security controls listed in ISO 27001 standard.
Annex A contains 114 controls categorized into 14 sections.
These controls are designed to ensure the confidentiality, integrity, and availability of information.
Examples of controls include access control, asset management, cryptography, incident management, and more.
Organizations must select and implement controls based on their risk a...
Reasoning and logic base qus
I applied via Referral and was interviewed in May 2022. There were 3 interview rounds.
posted on 16 Jan 2023
I applied via Naukri.com and was interviewed before Jan 2022. There were 3 interview rounds.
based on 1 review
Rating in categories
Processing Executive
18
salaries
| ₹0 L/yr - ₹0 L/yr |
Executive Accountant
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Support Executive
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Customer Care Executive
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Analyst
7
salaries
| ₹0 L/yr - ₹0 L/yr |
WPP
Dentsu Aegis Network
Publicis
IPG Mediabrands