Filter interviews by
Be the first one to contribute and help others!
I applied via Referral and was interviewed before Jul 2021. There were 3 interview rounds.
Aptitude test about sales planning.
I applied via Walk-in and was interviewed before May 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Sep 2019. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jun 2020. There were 3 interview rounds.
I am an experienced Sales Executive with a strong track record in achieving sales targets and building relationships with clients.
I have successfully exceeded sales targets by 20% in my previous role.
I have a proven ability to identify and capitalize on market opportunities.
I have developed and maintained strong relationships with key clients, resulting in repeat business and referrals.
I am skilled in market research a...
I appeared for an interview before Apr 2021.
Last company about
I applied via Referral and was interviewed in Nov 2020. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed before Apr 2021. There was 1 interview round.
I appeared for an interview before Nov 2022.
Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers.
Blockchain is a chain of blocks containing transaction data.
Each block is linked to the previous one using cryptographic hashes.
Transactions are verified by network participants through consensus mechanisms like Proof of Work or Proof of Stake.
Once added to the blockchain, data is immutable and cann...
A man in the middle attack is when a hacker intercepts communication between two parties without their knowledge.
Occurs when a hacker secretly intercepts and possibly alters the communication between two parties
Commonly seen in public Wi-Fi networks where the hacker positions themselves between the user and the network
Can lead to sensitive information being stolen or manipulated
RSA is a public-key encryption algorithm used for secure communication over the internet.
RSA stands for Rivest-Shamir-Adleman, named after its inventors.
It uses a pair of keys - a public key for encryption and a private key for decryption.
RSA is widely used in secure communication protocols like HTTPS for secure browsing.
It is based on the difficulty of factoring large prime numbers.
RSA keys are typically 1024 or 2048
Security attacks are malicious activities aimed at compromising the confidentiality, integrity, or availability of information.
Types of security attacks include malware, phishing, ransomware, DDoS attacks, and man-in-the-middle attacks.
Attackers may exploit vulnerabilities in software or systems to gain unauthorized access or steal sensitive data.
Common goals of security attacks are financial gain, data theft, disrupti...
Active attacks involve the attacker directly interacting with the target system, while passive attacks involve monitoring and eavesdropping.
Active attacks involve modifying data, injecting malware, or disrupting services.
Passive attacks involve listening in on communications, capturing data, or analyzing traffic.
Examples of active attacks include denial of service (DoS) attacks and man-in-the-middle attacks.
Examples of...
based on 1 review
Rating in categories
Varun Beverages
AB InBev India
Bisleri
Coca-Cola Company