Filter interviews by
I applied via Referral and was interviewed in May 2022. There were 2 interview rounds.
I am passionate about making a positive impact on global issues and believe in the UN's mission.
Believe in the UN's mission to promote peace, human rights, and sustainable development
Opportunity to contribute to global issues and make a positive impact
Access to diverse and multicultural work environment
Opportunity for professional growth and development
Inspired by the UN's track record of successful initiatives
Desire t...
The best-suited job for a refugee depends on their skills, qualifications, and interests.
Consider the refugee's skills and qualifications to match them with suitable job opportunities.
Identify the demand for certain jobs in the local market to increase the chances of employment.
Take into account the refugee's interests and preferences to ensure job satisfaction and motivation.
Provide training and support to help refuge...
Top trending discussions
posted on 27 Apr 2025
I appeared for an interview before Apr 2024, where I was asked the following questions.
posted on 24 May 2025
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
I am a passionate Java Full Stack Developer with a strong foundation in Java, Spring, and front-end technologies like React.
Educational Background: I hold a degree in Computer Science, where I developed a solid understanding of software development principles.
Technical Skills: Proficient in Java, Spring Boot for backend development, and React for building dynamic user interfaces.
Project Experience: Developed a full-sta...
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
I'm sorry, but I cannot answer that question without more information.
I prefer not to disclose my age as it is not relevant to my qualifications and experience for this position.
Age should not be a factor in determining one's ability to perform a job
Experience, skills, and qualifications are more important than age
Employers are not allowed to discriminate based on age
I am confident that my qualifications and experience make me a strong candidate for this position
I oversee daily operations, manage staff, and ensure customer satisfaction.
Manage and supervise staff
Ensure customer satisfaction
Create and implement policies and procedures
Monitor inventory and sales
Handle customer complaints and resolve issues
Train new employees
Collaborate with upper management
posted on 17 Aug 2024
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
I expect a competitive salary based on my skills, experience, and industry standards.
Research industry standards: For example, Glassdoor or Payscale can provide insights into average salaries for similar roles.
Consider my experience level: With 5 years of experience, I would expect a salary in the range of $80,000 to $100,000.
Factor in location: Salaries can vary significantly based on the cost of living in different c...
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
posted on 20 Dec 2024
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Selenium is a popular automation testing tool used for web applications.
Supports multiple programming languages like Java, Python, C#, etc.
Can automate web browsers across different platforms.
Allows for parallel test execution.
Integrates with popular CI/CD tools like Jenkins.
Supports various browsers like Chrome, Firefox, Safari, etc.
My salary expectations are based on my experience, skills, and the market rate for Senior Software Engineers.
Research the average salary for Senior Software Engineers in the specific location and industry
Consider your years of experience and relevant skills
Be prepared to negotiate based on the company's offer and benefits package
posted on 5 Nov 2021
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Validations used in project
Input validation to ensure correct data type and format
Data validation to ensure data integrity and consistency
Business rule validation to ensure compliance with requirements
Authentication and authorization validation to ensure secure access
Error handling and exception validation to ensure proper handling of errors
Stored procedures are precompiled SQL statements that can be saved and reused in a database.
Stored procedures can improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic and provide a consistent interface to the database.
Parameters can be passed to stored procedures, allowing for dynamic queries.
Examples of stored procedures include ones that retrieve data, ...
Views in SQL are virtual tables that are based on the result of an SQL statement.
Views are created using the CREATE VIEW statement.
They can be used to simplify complex queries.
They can also be used to restrict access to sensitive data.
Views are updated automatically when the underlying tables are updated.
They can be used to join multiple tables into a single view.
posted on 26 Feb 2023
SQL queries can be executed in C# using ADO.NET or Entity Framework to interact with databases.
Use SqlConnection to establish a connection to the database.
Create SqlCommand to execute SQL queries, e.g., SELECT, INSERT.
Use SqlDataReader to read data returned from a query.
Entity Framework allows for LINQ queries, simplifying data access.
posted on 23 Feb 2024
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
To create a web page
Consultant
7
salaries
| ₹12.4 L/yr - ₹25 L/yr |
Center Head
6
salaries
| ₹3.6 L/yr - ₹15.1 L/yr |
Software Developer
4
salaries
| ₹13 L/yr - ₹18 L/yr |
Portfolio Manager
4
salaries
| ₹50 L/yr - ₹51 L/yr |
Programme Officer
4
salaries
| ₹6 L/yr - ₹30 L/yr |
Government of India
National Informatics Centre
Csc E Governance Services
Central Reserve Police Force