Filter interviews by
I applied via Company Website and was interviewed in Jan 2024. There was 1 interview round.
Top trending discussions
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 20 Nov 2024
Topics like ratios,number systems
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
Basics Maths and basics reasoning
I applied via Recruitment Consulltant and was interviewed in Apr 2023. There were 2 interview rounds.
posted on 1 Apr 2024
The ratio of M-20 concrete is 1:1.5:3 (cement:sand:aggregate).
The ratio of M-20 concrete is 1 part cement, 1.5 parts sand, and 3 parts aggregate.
For example, if you have 1 kg of cement, you will need 1.5 kg of sand and 3 kg of aggregate to make M-20 concrete.
posted on 27 May 2024
I applied via LinkedIn and was interviewed before May 2023. There were 3 interview rounds.
GD topic - 70 hours work per week
Basic aptitude tests
posted on 3 Aug 2022
I applied via Walk-in and was interviewed in Sep 2021. There was 0 interview round.
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 29 Jan 2022
Research Scientist
22
salaries
| ₹3.6 L/yr - ₹4.5 L/yr |
Project Assistant
4
salaries
| ₹1.2 L/yr - ₹4 L/yr |
Data Entry Operator
3
salaries
| ₹2 L/yr - ₹2.5 L/yr |
Assistant
3
salaries
| ₹3 L/yr - ₹6 L/yr |
Data Entry Operator and Office Assistant
3
salaries
| ₹2 L/yr - ₹2 L/yr |
Government of India
National Informatics Centre
Csc E Governance Services
Central Reserve Police Force