i
QUICK HEAL TECHNOLOGIES
Filter interviews by
I applied via Campus Placement and was interviewed in Oct 2018. There were 7 interview rounds.
I have chosen security as my career because I am passionate about protecting people and assets from potential threats.
Passion for protecting people and assets
Interest in technology and cybersecurity
Desire to make a positive impact on society
Opportunities for growth and advancement in the field
I believe my education, skills, and passion align well with the organization's mission and goals.
I have relevant education and training in the field.
I possess the necessary skills and experience to contribute effectively.
I am passionate about the industry and eager to learn and grow within the organization.
I have a strong work ethic and a positive attitude towards challenges.
I have researched the organization and belie
I aspire to make a positive impact on people's lives through my work.
I want to work in a field where I can help others, such as healthcare or education
I am passionate about using technology to improve people's lives
I believe in the power of community and want to work towards building stronger, more inclusive communities
I am inspired by people who have dedicated their lives to making a difference, such as doctors, teach
I am passionate about photography and have won several awards for my work.
I have been practicing photography as a hobby for the past 5 years
I have won awards in local photography competitions
I specialize in landscape and portrait photography
I would choose a top 5 organization over a higher package.
Opportunity for growth and learning in a top organization
Prestige and reputation associated with top organizations
Networking opportunities with industry leaders
Potential for long-term career advancement
Higher job satisfaction and fulfillment
I don't have any dark secrets that would affect my ability to perform in this internship.
I believe in transparency and honesty in all aspects of my life.
I prioritize integrity and ethical behavior in my personal and professional relationships.
I am committed to maintaining confidentiality and trust in all situations.
There have been several high-profile data breaches in recent years.
In 2020, the personal information of over 500,000 Zoom users was found for sale on the dark web.
In 2019, Capital One suffered a data breach affecting over 100 million customers.
In 2018, Facebook experienced a data breach that compromised the personal information of 50 million users.
In 2017, Equifax experienced a data breach that exposed the personal inf...
Zomato faced a data breach in May 2017.
17 million user records were stolen.
Email addresses and hashed passwords were compromised.
Payment information was not affected.
Zomato took immediate action to enhance security measures.
Tools for data recovery
Recuva
EaseUS Data Recovery Wizard
Stellar Data Recovery
Disk Drill
TestDisk
Reverse engineering involves analyzing a product or system to understand its design and functionality.
Start by disassembling the product or system
Identify the components and their relationships
Analyze the code or software used in the product or system
Recreate the design and functionality based on the analysis
Reverse engineering is often used to create compatible products or to identify vulnerabilities in security syste
Adware, malware, viruses, and zombies are all types of malicious software that can harm computer systems.
Adware is software that displays unwanted advertisements on a user's computer.
Malware is a broad term that refers to any software designed to harm a computer system, including viruses, worms, and Trojan horses.
Viruses are programs that replicate themselves and infect other programs or files on a computer, often caus...
Top trending discussions
A generic swap function swaps two values of any data type.
The function should take two parameters of any data type.
Use a temporary variable to store the value of one parameter.
Assign the value of the second parameter to the first parameter.
Assign the value of the temporary variable to the second parameter.
Search for an element in a rotated sorted linked list.
Find the pivot point where the list is rotated.
Divide the list into two sublists based on the pivot point.
Perform binary search on the appropriate sublist.
Handle edge cases such as empty list and list with only one element.
Search an element in a rotated sorted array
Find the pivot point where the array is rotated
Divide the array into two sub-arrays based on pivot point
Perform binary search on the appropriate sub-array
Repeat until element is found or sub-array size is 1
Find 5 missing numbers in an array of size 95 containing numbers in range 1 to 100.
Create a boolean array of size 100 and mark the present numbers
Iterate through the boolean array and find the missing numbers
Alternatively, use a HashSet to store the present numbers and find the missing ones
Given a Sudoku board, find possible numbers for an empty cell.
Iterate through empty cells and check possible numbers using row, column, and box constraints.
Use a set to keep track of possible numbers for each empty cell.
Return the set of possible numbers for the given empty cell.
Find integer average of 4 unsigned integers without typecasting
Add all the integers and divide by 4
Use bit shifting to divide by 4
Handle overflow by using long long data type
Use unsigned int data type for input
Code to identify 32 bit or 64 bit architecture of a processor
Check if the operating system is 32 bit or 64 bit
If OS is 32 bit, processor is 32 bit
If OS is 64 bit, check if processor supports 64 bit architecture
Use CPUID instruction to check if processor supports 64 bit architecture
Convert binary number to base 64 integer
Divide the binary number into groups of 6 bits
Convert each group of 6 bits to decimal
Map the decimal value to the corresponding base 64 character
Concatenate the base 64 characters to form the final integer
posted on 5 Feb 2016
posted on 31 Jan 2017
I was interviewed before Jan 2016.
I was interviewed in Oct 2016.
I was interviewed before May 2016.
I applied via Campus Placement and was interviewed before Sep 2021. There were 4 interview rounds.
Math and verbal round .
General topics to speak
Implement a function to find duplicates in an array of strings using Hashmap.
Create a Hashmap to store the frequency of each string in the array
Iterate through the array and check if the frequency of any string is greater than 1
If yes, add it to the list of duplicates
Return the list of duplicates
Area Sales Manager
92
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Support Engineer
89
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
85
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
75
salaries
| ₹0 L/yr - ₹0 L/yr |
QA Engineer
52
salaries
| ₹0 L/yr - ₹0 L/yr |
Gen
McAfee
Kaspersky Lab
Oracle