Filter interviews by
I applied via Approached by Company and was interviewed before Jul 2022. There were 3 interview rounds.
posted on 20 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
I applied via Company Website and was interviewed before Jul 2021. There was 1 interview round.
I appeared for an interview before Jan 2024.
I have 5 years of experience as a Senior Analyst in the finance industry.
Led a team of analysts to conduct financial analysis and forecasting
Developed complex financial models to support strategic decision-making
Presented findings and recommendations to senior management
Collaborated with cross-functional teams to drive business initiatives
I appeared for an interview before Jan 2024.
I have over 5 years of experience in data analysis, financial modeling, and market research.
5+ years experience in data analysis
Skilled in financial modeling
Proficient in market research
Strong analytical and problem-solving skills
posted on 25 Jun 2024
I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.
Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.
Developed by MIT in the 1980s
Uses symmetric key cryptography
Involves a Key Distribution Center (KDC)
Prevents eavesdropping and replay attacks
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.
Client sends a SYN (synchronize) packet to the server to initiate a connection
Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request
Client sends an ACK (acknowledgment) packet back to the server to confirm the connection
TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.
TLS encrypts data to ensure confidentiality during transmission.
It uses cryptographic algorithms to authenticate the parties involved in the communication.
TLS also provides mechanisms for data integrity to prevent tampering.
Handshake process involves negotiation of encryption algorithms and exchange o...
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
They gave list of case based question of day to day soc activity and asked to resolve it
I applied via Walk-in and was interviewed in Dec 2024. There were 2 interview rounds.
Nothing much gave some random IP and gave an email for analysis
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection allows attackers to access, modify, or delete data in a database.
Attackers can also execute commands on the database server.
Preventing SQL injection involves using parameterized queries and input validation.
Example: Inputting ' OR 1=1 --' into a login form to bypass authentication.
Really nice interviewer, explained the process thoroughly
Coding test, a problem was given and i was asked to solve
I received feedback from my manager on a project presentation.
Requested feedback from manager after presenting project
Listened attentively to the feedback given
Implemented suggested changes to improve presentation
Followed up with manager to ensure satisfaction with revisions
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Software Engineer
30
salaries
| ₹3.2 L/yr - ₹9.2 L/yr |
SEO Executive
25
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
Technical Content Writer
16
salaries
| ₹1.5 L/yr - ₹3.4 L/yr |
Technical Analyst
14
salaries
| ₹1.8 L/yr - ₹3.1 L/yr |
Product Engineer
12
salaries
| ₹3.5 L/yr - ₹6.6 L/yr |
Microsoft Corporation
SAP
24/7 Customer