Add office photos
Engaged Employer

QUICK HEAL TECHNOLOGIES

3.7
based on 399 Reviews
Filter interviews by

Terrenos Software Technologies Interview Questions and Answers

Updated 5 Feb 2024
Popular Designations

Q1. Can you specify what data breach occured in zomato!?

Ans.

Zomato faced a data breach in May 2017.

  • 17 million user records were stolen.

  • Email addresses and hashed passwords were compromised.

  • Payment information was not affected.

  • Zomato took immediate action to enhance security measures.

Add your answer

Q2. Basic definition of adware, malware, viruses, zombie etc.

Ans.

Adware, malware, viruses, and zombies are all types of malicious software that can harm computer systems.

  • Adware is software that displays unwanted advertisements on a user's computer.

  • Malware is a broad term that refers to any software designed to harm a computer system, including viruses, worms, and Trojan horses.

  • Viruses are programs that replicate themselves and infect other programs or files on a computer, often causing damage or stealing data.

  • Zombies are computers that hav...read more

Add your answer

Q3. Mention something which aspires you!?

Ans.

I aspire to make a positive impact on people's lives through my work.

  • I want to work in a field where I can help others, such as healthcare or education

  • I am passionate about using technology to improve people's lives

  • I believe in the power of community and want to work towards building stronger, more inclusive communities

  • I am inspired by people who have dedicated their lives to making a difference, such as doctors, teachers, and social workers

Add your answer

Q4. How reverse engineering is done!?

Ans.

Reverse engineering involves analyzing a product or system to understand its design and functionality.

  • Start by disassembling the product or system

  • Identify the components and their relationships

  • Analyze the code or software used in the product or system

  • Recreate the design and functionality based on the analysis

  • Reverse engineering is often used to create compatible products or to identify vulnerabilities in security systems

Add your answer
Discover Terrenos Software Technologies interview dos and don'ts from real experiences

Q5. Mention about recent data breaches!??

Ans.

There have been several high-profile data breaches in recent years.

  • In 2020, the personal information of over 500,000 Zoom users was found for sale on the dark web.

  • In 2019, Capital One suffered a data breach affecting over 100 million customers.

  • In 2018, Facebook experienced a data breach that compromised the personal information of 50 million users.

  • In 2017, Equifax experienced a data breach that exposed the personal information of 143 million people.

  • In 2016, Yahoo announced th...read more

Add your answer

Q6. Tools for data recovery

Ans.

Tools for data recovery

  • Recuva

  • EaseUS Data Recovery Wizard

  • Stellar Data Recovery

  • Disk Drill

  • TestDisk

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter