i
VDart
Filter interviews by
I applied via Campus Placement
The topic is about social media
Any general topic would suffice, such as artificial intelligence.
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
I applied via Walk-in and was interviewed in Mar 2022. There was 1 interview round.
I applied via Naukri.com and was interviewed before May 2021. There were 4 interview rounds.
It was mixed like aptitude and from technical.
I applied via Campus Placement and was interviewed before Aug 2021. There were 4 interview rounds.
Coding cum aptitude test on Hackerrank
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
To switch variable values, use a temporary variable to hold one value while swapping the other.
Create a temporary variable to hold the value of one variable
Assign the value of the second variable to the first variable
Assign the value of the temporary variable to the second variable
Create a small code
posted on 22 Jun 2022
I applied via Campus Placement and was interviewed in May 2022. There were 2 interview rounds.
I am a software developer with experience in web development and a passion for problem-solving.
Experienced in web development using HTML, CSS, and JavaScript
Proficient in programming languages such as Java and Python
Familiar with frameworks like React and Angular
Strong problem-solving and analytical skills
Ability to work well in a team and communicate effectively
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
based on 1 interview
Interview experience
Technical Recruiter
111
salaries
| ₹1 L/yr - ₹4 L/yr |
US IT Recruiter
68
salaries
| ₹1.5 L/yr - ₹4 L/yr |
Senior Technical Recruiter
50
salaries
| ₹2.3 L/yr - ₹5 L/yr |
Senior Recruiter
32
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate - Team Lead
22
salaries
| ₹3 L/yr - ₹6 L/yr |
Apisero
Actalent Services
Cyber Infrastructure
TestingXperts