Filter interviews by
Be the first one to contribute and help others!
posted on 14 Dec 2024
I applied via Referral and was interviewed in Nov 2024. There were 4 interview rounds.
Social Media Intelligence, Crimes through social media , Digital risk protection, Executive and Brand logo infringement
Trademarks protect brand names and logos, copyrights protect creative works, and patents protect inventions.
Trademarks are used to protect brand names, logos, and slogans from being used by others in a way that could confuse consumers.
Copyrights protect original creative works such as books, music, and artwork from being copied or used without permission.
Patents protect inventions and grant the inventor exclusive right...
Threat is a potential danger, vulnerability is a weakness that can be exploited, and risk is the likelihood of a threat exploiting a vulnerability.
Threat: potential danger or harm that can exploit vulnerabilities
Vulnerability: weakness in a system that can be exploited by threats
Risk: likelihood of a threat exploiting a vulnerability
Example: A threat could be a cyber attack, a vulnerability could be outdated software, ...
I tackle fraudulent accounts on social media by using a combination of technology, data analysis, and manual review.
Utilize automated tools to detect suspicious activity and patterns
Analyze user behavior and engagement metrics to identify anomalies
Investigate flagged accounts manually to verify authenticity
Collaborate with security teams and law enforcement if necessary
Implement account verification processes to preven
In 5 years, I see myself as a seasoned Platform Operations Specialist leading a team and implementing innovative strategies.
Leading a team of platform operations specialists
Implementing innovative strategies to improve platform efficiency
Continuing to learn and grow in the field of platform operations
I am excited to join Zerofox because I am passionate about disaster recovery planning and believe in the company's mission.
I am drawn to the unique focus on DRP at Zerofox and see it as a valuable opportunity to expand my skills in a different area of cybersecurity.
I am impressed by Zerofox's innovative approach to protecting organizations from digital risks, and I am eager to contribute to their mission.
I believe that...
posted on 11 Sep 2024
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Different data formats in big data are used for various purposes like storage efficiency, data processing speed, and compatibility with different systems.
JSON: Lightweight, human-readable, and widely supported for web applications.
Parquet: Columnar storage format for efficient querying and processing of large datasets.
Avro: Schema-based serialization format with support for complex data types.
ORC: Optimized Row Columna...
Find the most frequent element in a list of strings.
Iterate through the list and count the frequency of each element using a dictionary.
Track the element with the highest frequency as you iterate.
Return the element with the highest frequency.
posted on 25 Sep 2024
To check if a linked list is a palindrome, compare the first half of the list with the reversed second half.
Traverse the linked list to find the middle node
Reverse the second half of the linked list
Compare the first half with the reversed second half to check for palindrome
posted on 25 Sep 2024
There were around 60 questions and negative marking was also there
I am a Full Stack Developer with experience in front-end and back-end technologies.
Proficient in HTML, CSS, JavaScript for front-end development
Skilled in Node.js, Express, MongoDB for back-end development
Experience with React.js and Angular for building interactive web applications
Diamond problem is a common issue in multiple inheritance where a class inherits from two classes that have a common ancestor.
Occurs in languages that support multiple inheritance like C++
Results in ambiguity when calling methods or accessing attributes from the common ancestor class
Can be resolved using virtual inheritance or interfaces
Run length encoding is a data compression technique that replaces repeated characters with a count and single character.
Iterate through the input array of strings
Count the number of consecutive characters in each string
Replace consecutive characters with count and character
Rotate an array of strings by d times
Create a new array and copy elements from original array based on rotation index
Use modulo operator to handle cases where d is greater than array length
Handle edge cases like empty array or d being negative
Scenarios for business development involve identifying market opportunities, analyzing competition, and creating strategies for growth.
Identify market trends and opportunities for expansion
Analyze competition to understand strengths and weaknesses
Develop strategies for growth and market penetration
Implement marketing campaigns to attract new customers
Evaluate the success of business development initiatives
Worked as a Business Analyst at XYZ Company, focusing on data analysis and process improvement.
Analyzed sales data to identify trends and opportunities for growth
Collaborated with cross-functional teams to streamline processes and improve efficiency
Created reports and presentations for senior management to support decision-making
Implemented new software tools to enhance data collection and analysis
I am passionate about analyzing data and solving complex business problems.
I have a strong background in data analysis and problem-solving.
I enjoy working with stakeholders to understand their needs and provide valuable insights.
I am excited about the opportunity to contribute to the success of the company through my analytical skills.
I am eager to learn and grow in a dynamic business environment.
Networking and testing techniques are essential for ensuring the functionality and performance of software applications.
Understanding of networking protocols such as TCP/IP, HTTP, and DNS is crucial for testing network-based applications.
Knowledge of testing techniques like black box testing, white box testing, and regression testing is important for ensuring comprehensive test coverage.
Experience with tools like Wires...
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
posted on 13 Sep 2024
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
posted on 8 Oct 2024
I applied via campus placement at RV College Of Engineering (RVCE) and was interviewed in Jul 2024. There were 2 interview rounds.
It includes two DSA questions and some aptitude questions
based on 23 reviews
Rating in categories
Network Engineer
35
salaries
| ₹1.8 L/yr - ₹8.5 L/yr |
Senior Operations Engineer
11
salaries
| ₹8 L/yr - ₹16 L/yr |
Associate Solution Architect
7
salaries
| ₹12.5 L/yr - ₹17.5 L/yr |
Technical Consulting Engineer
5
salaries
| ₹2.8 L/yr - ₹3.2 L/yr |
Network Engineer L1
5
salaries
| ₹1.7 L/yr - ₹3.3 L/yr |
Nokia Networks
Vindhya Telelinks
Presto Infosolutions
Accord Synergy