i
Sequretek It Solutions
Filter interviews by
DNS port number is 53.
DNS port number is used for DNS queries and responses.
It is a well-known port number, which is 53.
DNS uses both TCP and UDP protocols on port 53.
SSH port number is 22.
SSH port number is used for secure communication over a network.
Default port number for SSH is 22.
Port number can be changed for security reasons.
Example: ssh user@hostname -p 2222
A brute force attack is a trial-and-error method used by hackers to crack passwords or encryption by systematically trying all possible combinations.
Brute force attacks are time-consuming but effective against weak passwords.
Hackers use automated tools to try all possible combinations until the correct one is found.
Examples include trying all possible 4-digit PIN codes or dictionary words as passwords.
Strong passwords ...
I applied via Naukri.com and was interviewed in Dec 2023. There were 3 interview rounds.
Mathematics and grammar
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
I was asked to write a program in C++ related to linked list and sorting algorithm
The question covers topics like C vs C++, OOPS concept, virtual mechanism, multi-threading, and security products.
C is a procedural programming language, while C++ is an extension of C with added features like classes and objects.
OOPS (Object-Oriented Programming) is a programming paradigm that focuses on objects and their interactions.
Virtual mechanism allows a derived class to override the implementation of a method ...
OOPS (Object-Oriented Programming) is a programming paradigm that uses objects to represent real-world entities and their interactions.
OOPS focuses on the concept of objects, which are instances of classes.
It emphasizes encapsulation, inheritance, and polymorphism.
Encapsulation ensures that data and methods are bundled together within an object.
Inheritance allows classes to inherit properties and behaviors from other c...
Virtual Mechanism is a technology that simulates real-world experiences or processes using computer-generated environments.
Virtual Mechanism uses computer-generated environments to replicate real-world experiences.
It typically involves the use of virtual reality (VR) or augmented reality (AR) technologies.
Virtual Mechanism can be used in various fields such as gaming, training, education, and simulations.
Examples inclu...
Security software protects computer systems and data from unauthorized access and threats.
Security software uses various techniques such as encryption, firewalls, and antivirus programs to safeguard computer systems.
It monitors network traffic and detects and blocks any suspicious or malicious activities.
Security software regularly updates its databases to stay up-to-date with the latest threats and vulnerabilities.
It ...
Top trending discussions
I applied via Campus Placement and was interviewed before Apr 2021. There were 5 interview rounds.
Time and work, time and distance, percentages, data interpretation
Business case study - increase revenue for museum
I applied via Campus Placement and was interviewed in Jan 2021. There were 5 interview rounds.
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
Flip-flops and latches are sequential logic circuits used to store and manipulate binary data.
Flip-flops are edge-triggered devices, while latches are level-sensitive devices.
Flip-flops have separate clock and data inputs, while latches have a single input for both clock and data.
Flip-flops are used in synchronous circuits, while latches are used in asynchronous circuits.
Flip-flops are more complex and require more cir...
posted on 19 Oct 2021
I applied via Naukri.com and was interviewed before Oct 2020. There were 3 interview rounds.
I will use a combination of messaging systems, data replication, and versioning to ensure consistency and availability.
Use messaging systems like Kafka or RabbitMQ to ensure reliable communication between systems
Implement data replication to ensure that data is available on multiple nodes
Use versioning to ensure that all nodes are working with the same data
Implement conflict resolution strategies to handle conflicts th...
I applied via Approached by Company and was interviewed before Apr 2021. There were 5 interview rounds.
Usually Hr will ask about your profile, projects and your interests
Case study: Help a Dairy company in launch of there premium product in Tier 2 city
I applied via Recruitment Consulltant and was interviewed before Jun 2021. There were 3 interview rounds.
Decision Tree is preferred over Random Forest when interpretability is important.
Decision Tree is easier to interpret and visualize than Random Forest.
Decision Tree is better suited for small datasets with few features.
Random Forest is better suited for large datasets with many features.
Random Forest is less prone to overfitting than Decision Tree.
Decision Tree can be used as a building block for Random Forest.
If inter...
The duration of Sequretek It Solutions interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 3 interviews
Interview experience
based on 152 reviews
Rating in categories
Associate Consultant
201
salaries
| ₹2 L/yr - ₹8 L/yr |
Consultant
63
salaries
| ₹3 L/yr - ₹12 L/yr |
SOC Analyst
25
salaries
| ₹1.8 L/yr - ₹8.2 L/yr |
Project Manager
21
salaries
| ₹8 L/yr - ₹17.5 L/yr |
Linux Administrator
20
salaries
| ₹3 L/yr - ₹8.5 L/yr |
Subex
MathCo
Innovatiview India Ltd
Watchyourhealth.com