i
SAP
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Mar 2022. There were 5 interview rounds.
posted on 6 Jan 2023
Time and distance
data interpotation
puzzle
Das
array
tree
map
binary tree
Questions on JavaScript concepts like hoisting, closure, arrays, string manipulation, and connecting dots.
Hoisting refers to the behavior of moving declarations to the top of the scope.
Closures are functions that have access to variables in their outer scope.
Arrays are used to store multiple values in a single variable.
To duplicate a string, use the 'repeat' method or concatenate the string with itself.
To add to a numb...
Two numbers can be manipulated using mathematical operations such as addition, subtraction, multiplication, and division.
Addition: add the two numbers together
Subtraction: subtract one number from the other
Multiplication: multiply the two numbers together
Division: divide one number by the other
Modulo: find the remainder when one number is divided by the other
To multiply two numbers, you can use the multiplication operator (*) in most programming languages.
In Python: num1 * num2
In Java: num1 * num2
In JavaScript: num1 * num2
In C++: num1 * num2
In Ruby: num1 * num2
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.
Firewall is a security system that filters network traffic based on predetermined security rules.
Gateway is a node that acts as an entry and exit point for data between two networks.
Firewall can be a software program or a hardware device, while gateway is typical...
To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.
Implement firewalls to filter out malicious traffic
Use intrusion detection systems to detect and block suspicious activity
Implement rate limiting to prevent overwhelming the network with excessive requests
I applied via Job Portal
posted on 22 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.
OS, DBMS, DLD, Networking, and Cryptography
Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.
Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.
Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.
Other types include hashing algorithms like SHA-256 and digital signatures like DSA.
Cr...
posted on 19 Apr 2022
posted on 28 Apr 2024
I applied via Approached by Company and was interviewed before Apr 2023. There were 2 interview rounds.
I applied via Company Website and was interviewed before Jul 2021. There was 1 interview round.
Some of the top questions asked at the SAP Security Engineer interview -
based on 1 review
Rating in categories
Software Developer
970
salaries
| ₹8.8 L/yr - ₹32 L/yr |
Developer
843
salaries
| ₹10.2 L/yr - ₹32 L/yr |
Developer Associate
821
salaries
| ₹6.3 L/yr - ₹23 L/yr |
Senior Developer
491
salaries
| ₹13.1 L/yr - ₹48 L/yr |
Business Process Consultant
395
salaries
| ₹11 L/yr - ₹40 L/yr |
Oracle
SAS
Zoho
IBM