Filter interviews by
I applied via Referral and was interviewed before Nov 2020. There were 5 interview rounds.
Firewall security is necessary to protect computer networks from unauthorized access and malicious attacks.
Prevents unauthorized access to a network
Filters incoming and outgoing network traffic
Blocks malicious traffic and viruses
Enforces network security policies
Logs network activity for auditing and analysis
TCP/IP is a set of protocols used for communication between devices on the internet.
TCP is responsible for establishing a connection between devices and ensuring data is transmitted reliably.
IP is responsible for routing data packets between devices.
TCP/IP is the foundation of the internet and is used for various applications such as email, web browsing, and file transfers.
Examples of TCP/IP protocols include HTTP, FTP
I applied via Referral and was interviewed in Oct 2024. There were 3 interview rounds.
Finding kth largest number by creating function without using in-built methods using javascript
posted on 23 Oct 2024
I applied via Indeed and was interviewed in Sep 2024. There were 4 interview rounds.
I applied via Campus Placement
Dsa problems dp and tress problem
I am a passionate software engineer with 5 years of experience in developing web applications using various technologies.
5 years of experience in software development
Proficient in developing web applications
Skilled in using various technologies
Passionate about software engineering
Reverse array of strings
Iterate through the array and swap elements from start to end
Use two pointers, one at the beginning and one at the end, and swap elements until they meet
Reverse a given string
Use built-in functions like reverse() or loop through the string in reverse order
Create a new string and append characters from the original string in reverse order
Convert the string to an array of characters, reverse the array, and then join it back into a string
Calculate sum of all elements in a given array of strings
Iterate through the array and convert each element to integer before adding to sum
Handle edge cases like empty array or non-numeric elements
Return the final sum after iterating through all elements
Docker cp command is used to copy files/folders between a container and the host machine.
Used to copy files/folders from a container to the host machine or vice versa
Syntax: docker cp [OPTIONS] CONTAINER:SRC_PATH DEST_PATH
Example: docker cp mycontainer:/app/file.txt /host/path
Ingress is a Kubernetes resource that exposes HTTP and HTTPS routes from outside the cluster to services within the cluster.
Ingress works by defining rules for routing external traffic to services based on hostnames or paths.
Network policies can be created to control the traffic allowed to reach the services behind the Ingress.
For example, a network policy can restrict traffic to a specific service to only come from a
posted on 22 Aug 2024
I applied via Job Fair and was interviewed in Jul 2024. There was 1 interview round.
50 question paper filled in 30min
I applied via Naukri.com and was interviewed in Dec 2023. There was 1 interview round.
based on 2 reviews
Rating in categories
Network Engineer
42
salaries
| ₹2.1 L/yr - ₹5 L/yr |
Compliance Executive
22
salaries
| ₹2.2 L/yr - ₹3.7 L/yr |
Cargo Assistant
21
salaries
| ₹1.4 L/yr - ₹2.2 L/yr |
Senior Payroll Executive
20
salaries
| ₹3.3 L/yr - ₹6.8 L/yr |
Payroll Executive
18
salaries
| ₹1.8 L/yr - ₹4.4 L/yr |
Maxgen Technologies
ANR Software Private Limited
Magic Edtech
Value Point Systems