Add office photos
Employer?
Claim Account for FREE

Ordnance Factory

4.3
based on 247 Reviews
Filter interviews by

BigBasket Interview Questions and Answers

Updated 5 Feb 2024

Q1. Secure communication process that prevents third parties from accessing data transferred from one endpoint to another.

Ans.

Secure communication process to prevent third-party access to transferred data.

  • Use encryption to scramble the data during transmission

  • Implement secure protocols like HTTPS, SSL, TLS

  • Use firewalls and intrusion detection systems to monitor network traffic

  • Implement access controls and authentication mechanisms to restrict unauthorized access

  • Regularly update software and security patches to prevent vulnerabilities

  • Use VPNs to create secure tunnels for data transmission

Add your answer

Q2. What is end to end encryption ?

Ans.

End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.

  • End-to-end encryption protects data during transmission and storage.

  • It encrypts data at the sender's device and decrypts it at the recipient's device.

  • Only the sender and recipient have the encryption keys to access the data.

  • Popular examples include WhatsApp, Signal, and ProtonMail.

View 1 answer

Q3. What is objective of network security ?

Ans.

The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.

  • Preventing unauthorized access to network resources

  • Protecting sensitive data from being intercepted or modified

  • Detecting and mitigating network attacks

  • Ensuring the availability and reliability of network services

  • Implementing security measures such as firewalls, encryption, and access controls

  • Educating users about safe network practices

  • Monitoring network tra...read more

View 1 answer

Q4. What is cyber Security?

Ans.

Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.

  • It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.

  • Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.

  • Examples of cyber threats include malware, phishing, ransomware, and social engineering attacks.

  • Organizations and individuals ne...read more

View 1 answer
Discover BigBasket interview dos and don'ts from real experiences

Q5. What is 4*4 vehicle , and it’s working principle

Ans.

A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.

  • A 4*4 vehicle is also known as a four-wheel drive vehicle.

  • It uses all four wheels to provide power to the vehicle.

  • This allows the vehicle to have better traction and control in off-road or slippery conditions.

  • The working principle involves a transfer case that distributes power to both the front and rear axles.

  • Examples of 4*4 vehicles include SUVs, pickup trucks, and off-road...read more

Add your answer

Q6. How much axis in vmc machine

Ans.

A VMC machine typically has 3 or 4 axis.

  • VMC machines usually have X, Y, and Z axis.

  • Some advanced VMC machines may have a fourth axis, such as a rotary table.

  • The number of axis can vary depending on the specific machine and its capabilities.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at BigBasket

based on 9 interviews
Interview experience
3.6
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 712 Interview Questions
3.7
 • 274 Interview Questions
3.6
 • 185 Interview Questions
4.1
 • 159 Interview Questions
4.2
 • 146 Interview Questions
3.7
 • 140 Interview Questions
View all
Top Ordnance Factory Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter