Upload Button Icon Add office photos

Ordnance Factory

Compare button icon Compare button icon Compare

Filter interviews by

Ordnance Factory Interview Questions, Process, and Tips for Experienced

Updated 15 Dec 2024

Ordnance Factory Interview Experiences for Experienced

Popular Designations

1 interview found

I applied via Walk-in and was interviewed before Sep 2021. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. What is cyber Security?
  • Ans. 

    Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.

    • It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.

    • Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.

    • Examples of cyber threats include malware, phishing, ransomware, and s...

  • Answered by AI
  • Q2. What is end to end encryption ?
  • Ans. 

    End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.

    • End-to-end encryption protects data during transmission and storage.

    • It encrypts data at the sender's device and decrypts it at the recipient's device.

    • Only the sender and recipient have the encryption keys to access the data.

    • Popular examples include WhatsApp, Signal, and ProtonMail.

  • Answered by AI
  • Q3. Secure communication process that prevents third parties from accessing data transferred from one endpoint to another.
  • Ans. 

    Secure communication process to prevent third-party access to transferred data.

    • Use encryption to scramble the data during transmission

    • Implement secure protocols like HTTPS, SSL, TLS

    • Use firewalls and intrusion detection systems to monitor network traffic

    • Implement access controls and authentication mechanisms to restrict unauthorized access

    • Regularly update software and security patches to prevent vulnerabilities

    • Use VPNs

  • Answered by AI
  • Q4. What is objective of network security ?
  • Ans. 

    The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.

    • Preventing unauthorized access to network resources

    • Protecting sensitive data from being intercepted or modified

    • Detecting and mitigating network attacks

    • Ensuring the availability and reliability of network services

    • Implementing security measures such as firewalls, encryption, and access controls

    • Educatin...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Ordnance Factory Apprentice Trainee interview:
  • Computer Networking
  • Cryptography
  • Network Security
  • Programming
  • Computer Hardware
Interview preparation tips for other job seekers - “Just apply. You may not be the best candidate or have all the requisite qualifications, but you’ll never get a job if you don’t try.”

Skills evaluated in this interview

Apprentice Trainee Interview Questions asked at other Companies

Q1. # Modes of heat transfer and how do they work? #Thermodynamics #performance curve of pump #priming (pump)
View answer (3)

Interview questions from similar companies

I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.

Interview Questionnaire 

7 Questions

  • Q1. Sql Injection
  • Q2. Security provided for the website
  • Q3. Projects handled in previous companies
  • Q4. Validations used in your project
  • Ans. 

    Validations used in project

    • Input validation to ensure correct data type and format

    • Data validation to ensure data integrity and consistency

    • Business rule validation to ensure compliance with requirements

    • Authentication and authorization validation to ensure secure access

    • Error handling and exception validation to ensure proper handling of errors

  • Answered by AI
  • Q5. StoredProcedure in sql
  • Ans. 

    Stored procedures are precompiled SQL statements that can be saved and reused in a database.

    • Stored procedures can improve performance by reducing network traffic and improving security.

    • They can be used to encapsulate business logic and provide a consistent interface to the database.

    • Parameters can be passed to stored procedures, allowing for dynamic queries.

    • Examples of stored procedures include ones that retrieve data,

  • Answered by AI
  • Q6. Views in sql
  • Ans. 

    Views in SQL are virtual tables that are based on the result of an SQL statement.

    • Views are created using the CREATE VIEW statement.

    • They can be used to simplify complex queries.

    • They can also be used to restrict access to sensitive data.

    • Views are updated automatically when the underlying tables are updated.

    • They can be used to join multiple tables into a single view.

  • Answered by AI
  • Q7. Familiar databases

Interview Preparation Tips

Interview preparation tips for other job seekers - They want Fullstack developers so be prepare for it.

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Perform some basics logic
  • Q2. Do SQL query and c#

Interview Preparation Tips

Interview preparation tips for other job seekers - Coding round with technical round and also prepare for logical round
Round 1 - One-on-one 

(1 Question)

  • Q1. One round interview in project

Interview Preparation Tips

Interview preparation tips for other job seekers - I have completed MCA. Total Work Experience is 4.5 Years.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.

Round 1 - One-on-one 

(1 Question)

  • Q1. Basic details of required skillset
Round 2 - Assignment 

To create a web page

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. Introduce Yourself
  • Q2. What are types of cyber attacks
  • Ans. 

    Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.

    • Malware: malicious software designed to damage or gain unauthorized access to a computer system.

    • Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

    • Ransomware: malware that encrypts a user's files and demands payment for their release.

    • DDoS attacks: flooding a network or serv...

  • Answered by AI
  • Q3. How to mitigate MITM attack
  • Ans. 

    To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.

    • Use encryption to protect data in transit

    • Implement secure communication protocols like HTTPS

    • Verify server certificates to ensure the authenticity of the server

    • Use VPNs for secure remote access

  • Answered by AI
  • Q4. Develop a RAT using MSF
  • Ans. 

    Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)

    • Use Metasploit Framework to create a payload for the RAT

    • Set up a listener to receive connections from the compromised machines

    • Utilize post-exploitation modules in MSF for advanced functionality

    • Ensure proper evasion techniques to avoid detection by antivirus software

  • Answered by AI
  • Q5. Describe OSI model
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Example: When you send an email, t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Stay updated with the current scenarios and knowledge in the market

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - HR 

(4 Questions)

  • Q1. Work experience
  • Q2. Expected salary
  • Q3. Domain knowledge
  • Q4. About Notice period
Round 2 - Online interview with Scientists 

(1 Question)

  • Q1. How to handle cyber threads in web application
  • Ans. 

    Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.

    • Implement strong encryption protocols to protect data in transit and at rest

    • Use firewalls to monitor and control incoming and outgoing traffic

    • Regularly conduct security audits and penetration testing to identify vulnerabilities

    • Implement secure coding practices to prevent common s...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for National Informatics Centre Software Engineer interview:
  • Cybersecurity
  • Laravel
  • PHP
Interview preparation tips for other job seekers - Software Application Support Engineer (0 -2 years) was the post. Asked about the projects handled on the previous job. And technologies used over the project and my contribution over the project and asked about the web application security issues and it's a online interview conducted by the NiC scientists. It's a contract position in nic developers are placed via contract on trivandrum office. Onboarding was smooth.

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. What are the features of Selenium?
  • Ans. 

    Selenium is a popular automation testing tool used for web applications.

    • Supports multiple programming languages like Java, Python, C#, etc.

    • Can automate web browsers across different platforms.

    • Allows for parallel test execution.

    • Integrates with popular CI/CD tools like Jenkins.

    • Supports various browsers like Chrome, Firefox, Safari, etc.

  • Answered by AI
Round 2 - HR 

(1 Question)

  • Q1. What are your salary expectations?
  • Ans. 

    My salary expectations are based on my experience, skills, and the market rate for Senior Software Engineers.

    • Research the average salary for Senior Software Engineers in the specific location and industry

    • Consider your years of experience and relevant skills

    • Be prepared to negotiate based on the company's offer and benefits package

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is OOPs concept in java?
  • Ans. 

    OOPs concept in Java is a programming paradigm that focuses on objects and their interactions.

    • OOPs stands for Object-Oriented Programming

    • It emphasizes on encapsulation, inheritance, and polymorphism

    • Encapsulation is the process of hiding implementation details from the user

    • Inheritance allows a class to inherit properties and methods from another class

    • Polymorphism allows objects to take on multiple forms or behaviors

    • Exam...

  • Answered by AI
  • Q2. What is string toknizer in java ?
  • Ans. 

    StringTokenizer is a class in Java that breaks a string into tokens based on a delimiter.

    • It is a legacy class that is not recommended to use in new code.

    • It is used to split a string into smaller parts based on a delimiter.

    • The default delimiter is whitespace, but it can be changed to any character or string.

    • It is useful for parsing text files or data that is separated by a specific character.

    • Example: StringTokenizer st ...

  • Answered by AI
Round 3 - One-on-one 

(1 Question)

  • Q1. Which technologies you are comfortable ?
  • Ans. 

    I am comfortable with a wide range of technologies including Java, Python, JavaScript, and SQL.

    • Proficient in Java and Python programming languages

    • Familiar with JavaScript and its frameworks such as React and Angular

    • Experienced in working with SQL databases

    • Comfortable with version control systems like Git

    • Knowledgeable in software development methodologies like Agile and Scrum

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Knowledge is the key . Be clear with full of confidence.

Skills evaluated in this interview

Interview Questionnaire 

5 Questions

  • Q1. What is server side state management
  • Ans. 

    Server side state management is the process of storing and managing data on the server side of a web application.

    • It involves storing data on the server instead of the client side

    • It helps maintain consistency and security of data

    • Examples include session management and database management

  • Answered by AI
  • Q2. What is page life cycle
  • Ans. 

    Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.

    • Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.

    • During initialization, the page is created and controls are initialized.

    • During loading, the page is loaded with data and controls are populated.

    • During rendering, t...

  • Answered by AI
  • Q3. What is components of dot net
  • Ans. 

    The components of .NET include the Common Language Runtime, Framework Class Library, and ASP.NET.

    • Common Language Runtime (CLR) - manages memory, security, and execution of code

    • Framework Class Library (FCL) - collection of reusable classes, interfaces, and value types

    • ASP.NET - web application framework for building dynamic web pages and web services

  • Answered by AI
  • Q4. What is cookies
  • Ans. 

    Cookies are small text files stored on a user's computer by a website to remember user preferences and login information.

    • Cookies are used to track user activity on a website

    • They can be used to store user preferences and login information

    • Cookies can be either session cookies or persistent cookies

    • Session cookies are deleted when the user closes their browser

    • Persistent cookies remain on the user's computer until they expi

  • Answered by AI
  • Q5. What is clr
  • Ans. 

    CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.

    • CLR is responsible for memory management, security, and exception handling.

    • It compiles code into an intermediate language (IL) and then executes it.

    • CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.

    • Examples of la...

  • Answered by AI

Skills evaluated in this interview

Ordnance Factory Interview FAQs

How many rounds are there in Ordnance Factory interview for experienced candidates?
Ordnance Factory interview process for experienced candidates usually has 2 rounds. The most common rounds in the Ordnance Factory interview process for experienced candidates are Resume Shortlist and Technical.
How to prepare for Ordnance Factory interview for experienced candidates?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Ordnance Factory. The most common topics and skills that interviewers at Ordnance Factory expect are B2B Sales, Corporate Sales and Sales.
What are the top questions asked in Ordnance Factory interview for experienced candidates?

Some of the top questions asked at the Ordnance Factory interview for experienced candidates -

  1. Secure communication process that prevents third parties from accessing data tr...read more
  2. What is end to end encryptio...read more
  3. What is objective of network securit...read more

Tell us how to improve this page.

Ordnance Factory Reviews and Ratings

based on 262 reviews

4.4/5

Rating in categories

4.3

Skill development

4.2

Work-life balance

3.9

Salary

3.9

Job security

4.3

Company culture

3.6

Promotions

4.2

Work satisfaction

Explore 262 Reviews and Ratings
Junior Works Manager
28 salaries
unlock blur

₹5 L/yr - ₹18 L/yr

Chargeman
12 salaries
unlock blur

₹7 L/yr - ₹13.2 L/yr

Technician
9 salaries
unlock blur

₹1.6 L/yr - ₹6 L/yr

Apprentice Trainee
9 salaries
unlock blur

₹0.1 L/yr - ₹2.2 L/yr

Graduate Apprentice Trainee
9 salaries
unlock blur

₹1 L/yr - ₹2.5 L/yr

Explore more salaries
Compare Ordnance Factory with

Government of India

4.2
Compare

National Informatics Centre

3.9
Compare

Csc E Governance Services

3.9
Compare

Central Reserve Police Force

4.6
Compare
Did you find this page helpful?
Yes No
write
Share an Interview