SafeAeon
Adosy Interview Questions and Answers
Q1. Difference between symmetric and asymmetric encryption
Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys - public and private.
Symmetric encryption is faster and more efficient than asymmetric encryption.
Asymmetric encryption provides better security as the private key is never shared.
Examples of symmetric encryption algorithms include AES and DES.
Examples of asymmetric encryption algorithms include RSA and ECC.
Q2. What are different types of malwares
Different types of malwares include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.
Viruses: Malicious software that can replicate itself and infect other files.
Worms: Self-replicating malware that spreads across networks.
Trojans: Malware disguised as legitimate software to trick users into installing it.
Ransomware: Malware that encrypts files and demands payment for decryption.
Spyware: Malware that secretly monitors and collects information about a user's ...read more
Q3. OSI Model and working of each layer
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
Layer 1 - Physical: Deals with physical connections and data transmission. Example: Ethernet cables
Layer 2 - Data Link: Manages data transfer between devices on the same network. Example: MAC addresses
Layer 3 - Network: Handles routing and forwarding of data packets. Example: IP addresses
Layer 4 - Transport: Ensures reliable data transfer betwee...read more
Q4. non repeating character in string
Find the first non-repeating character in a string.
Create a frequency map of characters in the string.
Iterate through the string and check the frequency of each character.
Return the first character with frequency 1.
Q5. Explainman in middle attack
Man-in-the-middle attack is a form of cyber attack where the attacker intercepts communication between two parties without their knowledge.
Attacker intercepts communication between two parties
Attacker can eavesdrop on the communication or alter the messages
Commonly used in public Wi-Fi networks or compromised routers
Q6. Malware and their types & Prevention
Malware are malicious software designed to harm or exploit computer systems. Types include viruses, worms, trojans, ransomware, and spyware. Prevention involves using antivirus software, keeping systems updated, and practicing safe browsing habits.
Types of malware include viruses, worms, trojans, ransomware, and spyware
Prevention methods include using antivirus software, keeping systems updated, and practicing safe browsing habits
Examples of malware: WannaCry ransomware, Zeus...read more
Q7. Tell me on what software you have worked in past
I have worked on various software including Salesforce, Microsoft Dynamics, and Oracle CRM.
Salesforce
Microsoft Dynamics
Oracle CRM
Interview Process at Adosy
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month