Add office photos
Employer?
Claim Account for FREE

SafeAeon

3.3
based on 30 Reviews
Filter interviews by

Adosy Interview Questions and Answers

Updated 11 Oct 2024

Q1. Difference between symmetric and asymmetric encryption

Ans.

Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys - public and private.

  • Symmetric encryption is faster and more efficient than asymmetric encryption.

  • Asymmetric encryption provides better security as the private key is never shared.

  • Examples of symmetric encryption algorithms include AES and DES.

  • Examples of asymmetric encryption algorithms include RSA and ECC.

Add your answer

Q2. What are different types of malwares

Ans.

Different types of malwares include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.

  • Viruses: Malicious software that can replicate itself and infect other files.

  • Worms: Self-replicating malware that spreads across networks.

  • Trojans: Malware disguised as legitimate software to trick users into installing it.

  • Ransomware: Malware that encrypts files and demands payment for decryption.

  • Spyware: Malware that secretly monitors and collects information about a user's ...read more

Add your answer

Q3. OSI Model and working of each layer

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • Layer 1 - Physical: Deals with physical connections and data transmission. Example: Ethernet cables

  • Layer 2 - Data Link: Manages data transfer between devices on the same network. Example: MAC addresses

  • Layer 3 - Network: Handles routing and forwarding of data packets. Example: IP addresses

  • Layer 4 - Transport: Ensures reliable data transfer betwee...read more

Add your answer

Q4. non repeating character in string

Ans.

Find the first non-repeating character in a string.

  • Create a frequency map of characters in the string.

  • Iterate through the string and check the frequency of each character.

  • Return the first character with frequency 1.

Add your answer
Discover Adosy interview dos and don'ts from real experiences

Q5. Explainman in middle attack

Ans.

Man-in-the-middle attack is a form of cyber attack where the attacker intercepts communication between two parties without their knowledge.

  • Attacker intercepts communication between two parties

  • Attacker can eavesdrop on the communication or alter the messages

  • Commonly used in public Wi-Fi networks or compromised routers

Add your answer

Q6. Malware and their types & Prevention

Ans.

Malware are malicious software designed to harm or exploit computer systems. Types include viruses, worms, trojans, ransomware, and spyware. Prevention involves using antivirus software, keeping systems updated, and practicing safe browsing habits.

  • Types of malware include viruses, worms, trojans, ransomware, and spyware

  • Prevention methods include using antivirus software, keeping systems updated, and practicing safe browsing habits

  • Examples of malware: WannaCry ransomware, Zeus...read more

Add your answer

Q7. Tell me on what software you have worked in past

Ans.

I have worked on various software including Salesforce, Microsoft Dynamics, and Oracle CRM.

  • Salesforce

  • Microsoft Dynamics

  • Oracle CRM

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Adosy

based on 7 interviews in the last 1 year
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 683 Interview Questions
3.6
 • 377 Interview Questions
3.8
 • 359 Interview Questions
3.8
 • 140 Interview Questions
4.4
 • 134 Interview Questions
4.0
 • 133 Interview Questions
View all
Top SafeAeon Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter