Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2022. There were 2 interview rounds.
I applied via Referral and was interviewed before Jun 2021. There were 2 interview rounds.
With all ,How development come to ASIS Laminates, MDF and Particle Board
posted on 10 Jan 2025
I applied via Referral and was interviewed in Jul 2024. There were 2 interview rounds.
posted on 16 Dec 2024
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
I have handled high and critical alerts related to malware infections, data breaches, and phishing attacks.
Identifying the source and scope of the alert
Isolating affected systems to prevent further damage
Implementing security patches and updates
Conducting forensic analysis to determine the extent of the breach
Collaborating with IT teams to strengthen security measures
SIEM tool architecture includes data collection, normalization, correlation, and reporting components.
Data collection: Gathers security data from various sources like logs, network traffic, and endpoints.
Normalization: Standardizes the collected data into a common format for analysis.
Correlation: Identifies patterns and relationships in the data to detect security incidents.
Reporting: Generates reports and alerts based...
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
I applied via Referral and was interviewed in Nov 2024. There was 1 interview round.
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
Simple java questions, one coding question and one design question
Visitor pattern is a design pattern where a visitor class is used to perform operations on elements of a data structure.
Visitor pattern allows adding new operations to existing classes without modifying them
It separates the algorithm from the object structure on which it operates
Commonly used in compilers, interpreters, and other complex systems
Calculate sum of elements at 1st position in each array using Java 8.
Use Java 8 stream to map each array to its 1st element and then sum them up.
Example: {{1,2},{1,3},{5,6}} -> 1 + 1 + 5 = 7
Thread collector class to manage and organize threads in a system
Create a ThreadCollector class with methods to add, remove, and retrieve threads
Implement a data structure like a list or queue to store the threads
Ensure thread safety by using synchronization mechanisms like locks or semaphores
Volatile refers to a type of memory storage that is temporary and can change frequently.
Volatile memory loses its data when power is turned off, unlike non-volatile memory.
Volatile memory is commonly used for temporary storage of data that needs to be quickly accessed and modified.
Examples of volatile memory include RAM (Random Access Memory) in computers and cache memory in processors.
Use the DISTINCT keyword in a SELECT statement to remove duplicates from a table.
Use the SELECT DISTINCT statement to retrieve unique rows from a table.
For example: SELECT DISTINCT column_name FROM table_name;
Another way is to use the GROUP BY clause with the COUNT() function to remove duplicates.
For example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;
Seeking new challenges and opportunities for growth.
Desire for new challenges and opportunities
Looking for career advancement
Seeking a more innovative and dynamic work environment
posted on 13 Dec 2024
based on 29 reviews
Rating in categories
Area Sales Manager
7
salaries
| ₹3.5 L/yr - ₹4.5 L/yr |
Marketing Executive
7
salaries
| ₹2 L/yr - ₹2.9 L/yr |
Accountant
5
salaries
| ₹4 L/yr - ₹4.2 L/yr |
Sales Executive
4
salaries
| ₹2.2 L/yr - ₹5.8 L/yr |
Assistant Accounts Manager
4
salaries
| ₹3.6 L/yr - ₹4.2 L/yr |
Tata Steel
Reliance Industries
Hindalco Industries
Aditya Birla Group