Filter interviews by
I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and s...
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educatin...
Top trending discussions
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data,
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
I applied via Recruitment Consultant and was interviewed before Dec 2019. There was 1 interview round.
posted on 22 Nov 2024
posted on 16 Jul 2022
I appeared for an interview in Jun 2022.
Group Discussion topic in various part leadership etc.
My topic is Workplace- An inclusive Workplace is where everyone irrespective of gender, race religion, or position in the company, feels valued and respected. No discrimination exists in an inclusive Workplace. Etc..
I applied via Walk-in and was interviewed in Jan 2022. There were 6 interview rounds.
ऐसा अक्सर देखा गया है कि ग्रुप डिस्कशन में शुरुआत करना कई बार फायदेमंद होता है. आप शुरुआत में ही अपना पक्ष रख देते हैं. हालांकि, कई बार यह उल्टा भी पड
A case study can be defined as an intensive study about a person, a group of people or a unit, which is aimed to generalize over several units'.1 A case study has also been described as an intensive, systematic investigation of a single individual, group, community or some other unit in which the researcher examines in ...
posted on 20 May 2021
Questions related to software development concepts and technologies.
Class is a blueprint for creating objects in Java.
Object is an instance of a class.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Struts is a framework for developing Java web applications.
Database DDL commands are used to define database schema, while DML commands are used to manipulate data.
System testing is a type of...
I applied via Referral and was interviewed before Jan 2022. There were 2 interview rounds.
I applied via LinkedIn and was interviewed before Jul 2022. There were 3 interview rounds.
General Aptitude, English and Reasoning
FTIR stands for Fourier Transform Infrared Spectroscopy, a technique used to analyze the chemical composition of materials.
FTIR measures the absorption of infrared light by a sample to determine its chemical composition.
It is commonly used in chemistry, pharmaceuticals, food science, and material analysis.
FTIR can identify functional groups in organic compounds, determine polymer structures, and analyze contaminants in...
HPLC and LC-MS are analytical techniques used in chemistry to separate, identify, and quantify components in a mixture.
HPLC stands for High Performance Liquid Chromatography, used to separate and quantify components in a mixture based on their interactions with a stationary phase and mobile phase.
LC-MS stands for Liquid Chromatography-Mass Spectrometry, combines the separation capabilities of liquid chromatography with...
Chromatography is a technique used to separate and analyze mixtures based on their different interactions with a stationary phase and a mobile phase.
Chromatography is used in various industries such as pharmaceuticals, food and beverage, environmental analysis, and forensics.
Types of chromatography include gas chromatography, liquid chromatography, thin-layer chromatography, and paper chromatography.
The principle of ch...
based on 7 reviews
Rating in categories
Junior Works Manager
28
salaries
| ₹5 L/yr - ₹18 L/yr |
Chargeman
12
salaries
| ₹7 L/yr - ₹13.2 L/yr |
Technician
9
salaries
| ₹1.6 L/yr - ₹6 L/yr |
Apprentice Trainee
9
salaries
| ₹0.1 L/yr - ₹2.2 L/yr |
Graduate Apprentice Trainee
9
salaries
| ₹1 L/yr - ₹2.5 L/yr |
Government of India
National Informatics Centre
Csc E Governance Services
Central Reserve Police Force