Filter interviews by
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Jan 2022. There was 1 interview round.
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is online test. In this test there is question of apti and also coding and from 5g question.
There are two questions asked and time is enough to solve 60 minutes
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Check if the reversed string is equal to the original string
Create a function to add two numbers
Define a function that takes two parameters as input
Inside the function, add the two numbers together and return the result
Example: function addNumbers(num1, num2) { return num1 + num2; }
Binary search code implementation in Python
Define a function that takes a sorted array and a target value as input
Initialize two pointers, low and high, to the start and end of the array respectively
While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target
If array[mid] is equal to target, return mid
If array[mid] is less than target, update low to mid + 1
If array[mid]...
A program to check if a given name is a palindrome or not.
Convert the name to lowercase to handle case-insensitivity
Remove any spaces or special characters from the name
Reverse the name and compare it with the original name to check for palindrome
malloc and calloc are functions in C programming used for dynamic memory allocation.
malloc function is used to allocate a single block of memory of a specified size.
calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.
Configured routers and switches to optimize network performance
Assisted in setting up VLANs and implementing security protocols
Troubleshooted network connectivity issues for end users
Participated in network infrastructure upgrades and maintenance
posted on 21 May 2024
I applied via Naukri.com and was interviewed in Apr 2024. There were 7 interview rounds.
An aptitude is a component of a competence to do a certain kind of work at a certain level. Outstanding aptitude can be considered "talent", or "skill". Aptitude is inborn potential to perform certain kinds of activities, whether physical or mental, and whether developed or undeveloped
Coding is the process of allowing humans to speak to computers. As computers only understand binary language — a series of zeros and ones — humans need to use a programming language as a translator of sorts.
Group discussion is a discussion between a group of participants on a given subject. A group discussion typically forms a part of the selection process used by organisations and educational institutions. The candidates talk about the given topic to present facts, opinions and conclusions.
An assignment is a task that someone in authority has asked you to do. The word assignment is just the noun form of the common verb assign, which you use when you want to give someone a duty or a job. When you assign something, that something is called an assignment.
Case study is an appropriate research design when you want to gain concrete, contextual, in-depth knowledge about a specific real-world subject. It allows you to explore the key characteristics, meanings, and implications of the case. Case studies are often a good choice in a
Technical skills often require specific education, such as programming languages, technical writing, or data analysis.
Programming languages: Examples include Java, Python, C++, etc.
Technical writing: Ability to write technical documentation, manuals, and reports.
Data analysis: Skills in analyzing and interpreting data using tools like Excel, SQL, or R.
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.
DNS servers store records of domain names and their corresponding IP addresses, allowing for effi...
DHCP stands for Dynamic Host Configuration Protocol, used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It assigns IP addresses dynamically, allowing for efficient use of available addresses
DHCP servers lease IP addresses to devices for a specific period of time
DHCP also provides other network configuration information, such as su...
RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.
RSA is a public-key cryptosystem used for secure data transmission.
It involves generating a public key and a private key for encryption and decryption.
RSA encryption is based on the difficulty of factoring large prime numbers.
It is commonly used in secure communication protocols like HTTPS.
RSA can be used for digital signa
Basic principles of security management involve risk assessment, access control, incident response, and security awareness.
Risk assessment: Identifying and evaluating potential risks to the organization's security.
Access control: Implementing measures to control who has access to sensitive information or resources.
Incident response: Developing plans and procedures to respond to security incidents effectively.
Security a...
based on 1 interview
Interview experience
Senior Software Engineer
282
salaries
| ₹10.1 L/yr - ₹32 L/yr |
Technical Lead
281
salaries
| ₹14.9 L/yr - ₹40 L/yr |
Software Engineer
180
salaries
| ₹4.8 L/yr - ₹19.7 L/yr |
Senior Engineer
80
salaries
| ₹8.5 L/yr - ₹23 L/yr |
Senior Technical Lead
77
salaries
| ₹24.8 L/yr - ₹57 L/yr |
AIRBUS
Tata Lockheed Martin Aerostructures
Raytheon
BAE Systems