i
QUICK HEAL TECHNOLOGIES
Filter interviews by
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
QUICK HEAL TECHNOLOGIES interview questions for popular designations
Use the input() function in Python to take input from the user.
Use the input() function to prompt the user for input and store the input in a variable.
You can specify a prompt message inside the input() function to guide the user on what to input.
The input() function always returns a string, so you may need to convert the input to the desired data type if needed.
Use GROUP BY and HAVING clause to fetch duplicate records from a table
Use GROUP BY clause to group records with same values
Use HAVING clause to filter out groups with count greater than 1
Example: SELECT column_name, COUNT(column_name) FROM table_name GROUP BY column_name HAVING COUNT(column_name) > 1
Get interview-ready with Top QUICK HEAL TECHNOLOGIES Interview Questions
I applied via campus placement at Pune Vidyarthi Griha's College of Engineering and Technology, Pune and was interviewed in Apr 2024. There were 2 interview rounds.
Tha aptitude exam was not very easy and not that difficult. It was something which one can easily get into.
I applied via Job Fair and was interviewed in Feb 2024. There was 1 interview round.
Basic discussion of gd
I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 2 interview rounds.
To reset a password protected BIOS configuration, you can use various methods such as removing the CMOS battery, using a BIOS reset jumper, or using manufacturer-specific software.
Remove the CMOS battery from the motherboard for a few minutes to reset the BIOS settings.
Locate the BIOS reset jumper on the motherboard and move it to the reset position for a few seconds.
Use manufacturer-specific software or tools to reset...
DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
DNS stands for Domain Name System.
It translates domain names into IP addresses.
DNS servers help in resolving domain names to their corresponding IP addresses.
They play a crucial role in the functioning of the internet.
DNS servers use a hierarchical structure for efficient name resolution.
They use different typ...
XSS attack is a type of web vulnerability where attackers inject malicious scripts into trusted websites to steal sensitive information or perform unauthorized actions.
XSS stands for Cross-Site Scripting.
Attackers exploit vulnerabilities in web applications to inject malicious scripts.
These scripts are then executed by unsuspecting users visiting the compromised website.
XSS attacks can be classified into three types: s...
The type of data stored in OSI Model Data Link Layer is the frame or packet.
The Data Link Layer is responsible for the physical transmission of data between network nodes.
It encapsulates the network layer packet into a frame with additional control information.
Examples of data stored in this layer include Ethernet frames, MAC addresses, and error detection codes.
MITM Attack is a type of cyber attack where an attacker intercepts communication between two parties to gain unauthorized access or steal information.
MITM stands for Man-in-the-Middle.
The attacker positions themselves between the sender and receiver to intercept and manipulate the communication.
Disadvantages of MITM attacks include unauthorized access to sensitive information, data theft, and potential for further expl...
SSL and TLS are cryptographic protocols used to secure communication over the internet.
SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.
SSL is the predecessor of TLS.
Both protocols provide encryption and authentication for secure communication.
TLS is considered more secure than SSL.
SSL uses a combination of symmetric and asymmetric encryption, while TLS primarily uses symmetric encryption...
I applied via Naukri.com and was interviewed before Jul 2023. There were 2 interview rounds.
IPC mechanism in Windows allows communication between processes through shared memory, message passing, and synchronization.
IPC mechanisms in Windows include named pipes, mailslots, shared memory, and sockets.
Named pipes allow communication between processes on the same machine or over a network.
Mailslots are used for one-way interprocess communication.
Shared memory allows processes to share data by mapping a region of...
Multi-threading in Windows allows multiple threads to run concurrently within a single process.
Windows provides APIs like CreateThread and CreateProcess to create and manage threads.
Threads share the same memory space within a process, allowing for efficient communication and resource sharing.
Windows supports both user-mode and kernel-mode threads, with user-mode threads being more lightweight.
Synchronization mechanism...
Memory mapping in Windows allows files to be mapped directly into memory for faster access and manipulation.
Memory mapping allows files to be accessed as if they were in memory
File mapping can be used for sharing data between processes
Improves performance by reducing disk I/O operations
Examples: CreateFileMapping, MapViewOfFile, UnmapViewOfFile
Critical section in Windows is a synchronization mechanism used to protect shared resources from concurrent access.
Critical sections are used to ensure mutual exclusion between threads accessing shared resources.
They are implemented using the Windows API functions InitializeCriticalSection, EnterCriticalSection, and LeaveCriticalSection.
Critical sections are more efficient than mutexes for synchronization within a sing...
Top trending discussions
Interview experience
based on 402 reviews
Rating in categories
15-20 Yrs
Not Disclosed
Technical Support Engineer
91
salaries
| ₹2.4 L/yr - ₹6 L/yr |
Area Sales Manager
91
salaries
| ₹3.2 L/yr - ₹7.1 L/yr |
Software Engineer
87
salaries
| ₹4.1 L/yr - ₹11.3 L/yr |
Senior Software Engineer
75
salaries
| ₹8.5 L/yr - ₹28 L/yr |
Senior Accounts Manager
55
salaries
| ₹7.4 L/yr - ₹20 L/yr |
NortonLifeLock's
McAfee
Kaspersky Lab
KPIT Technologies