Ordnance Factory
BigBasket Interview Questions and Answers
Q1. Secure communication process that prevents third parties from accessing data transferred from one endpoint to another.
Secure communication process to prevent third-party access to transferred data.
Use encryption to scramble the data during transmission
Implement secure protocols like HTTPS, SSL, TLS
Use firewalls and intrusion detection systems to monitor network traffic
Implement access controls and authentication mechanisms to restrict unauthorized access
Regularly update software and security patches to prevent vulnerabilities
Use VPNs to create secure tunnels for data transmission
Q2. What is end to end encryption ?
End-to-end encryption is a security measure that ensures data is encrypted from the sender to the recipient, preventing unauthorized access.
End-to-end encryption protects data during transmission and storage.
It encrypts data at the sender's device and decrypts it at the recipient's device.
Only the sender and recipient have the encryption keys to access the data.
Popular examples include WhatsApp, Signal, and ProtonMail.
Q3. What is objective of network security ?
The objective of network security is to protect computer networks and data from unauthorized access, attacks, and misuse.
Preventing unauthorized access to network resources
Protecting sensitive data from being intercepted or modified
Detecting and mitigating network attacks
Ensuring the availability and reliability of network services
Implementing security measures such as firewalls, encryption, and access controls
Educating users about safe network practices
Monitoring network tra...read more
Q4. What is cyber Security?
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks.
It involves implementing measures to prevent unauthorized access, use, disclosure, disruption, or destruction of information.
Cybersecurity includes various techniques such as encryption, firewalls, antivirus software, and intrusion detection systems.
Examples of cyber threats include malware, phishing, ransomware, and social engineering attacks.
Organizations and individuals ne...read more
Q5. What is 4*4 vehicle , and it’s working principle
A 4*4 vehicle is a four-wheel drive vehicle that uses all four wheels to provide power to the vehicle.
A 4*4 vehicle is also known as a four-wheel drive vehicle.
It uses all four wheels to provide power to the vehicle.
This allows the vehicle to have better traction and control in off-road or slippery conditions.
The working principle involves a transfer case that distributes power to both the front and rear axles.
Examples of 4*4 vehicles include SUVs, pickup trucks, and off-road...read more
Q6. How much axis in vmc machine
A VMC machine typically has 3 or 4 axis.
VMC machines usually have X, Y, and Z axis.
Some advanced VMC machines may have a fourth axis, such as a rotary table.
The number of axis can vary depending on the specific machine and its capabilities.
Interview Process at BigBasket
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month