i
Virtual Employee
Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed before Jul 2021. There were 3 interview rounds.
Basic terminologies in cyber security
Malware
Phishing
Firewall
Encryption
Vulnerability
Patch
Intrusion Detection System
Social Engineering
Two-Factor Authentication
The OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application
Each layer has a specific function and communicates with adjacent layers
The model helps ensure interoperability between different network devices and software
Example: HTTP operates at the Appli...
HTTP is unencrypted while HTTPS is encrypted. HTTPS provides secure communication over the internet.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure
HTTP is vulnerable to attacks like man-in-the-middle while HTTPS is secure
HTTPS uses SSL/TLS certificates to encrypt data while HTTP does not
HTTPS is used for secure online transactions like online banking, e-commerce, et...
The OWASP Top 10 is a list of the most critical web application security risks.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
Common cyber attacks include phishing, malware, ransomware, DDoS, and social engineering.
Phishing: fraudulent emails or websites that trick users into giving sensitive information
Malware: malicious software that can damage or control a computer system
Ransomware: malware that encrypts files and demands payment for their release
DDoS: Distributed Denial of Service attacks overwhelm a website or network with traffic
Social ...
Mitigating common cyber attacks involves implementing strong passwords, regular software updates, and employee training.
Use strong passwords and two-factor authentication
Regularly update software and operating systems
Train employees on how to identify and avoid phishing scams
Implement firewalls and antivirus software
Limit access to sensitive data and regularly backup important files
Top trending discussions
I applied via Walk-in and was interviewed in Mar 2021. There was 1 interview round.
C is a general-purpose programming language known for its efficiency and low-level control.
C was developed by Dennis Ritchie at Bell Labs in the 1970s.
It is widely used for system programming, embedded systems, and developing operating systems.
C is known for its simplicity, allowing direct memory manipulation and efficient code execution.
It influenced the development of many other programming languages, such as C++, Ja
Java is a high-level programming language known for its platform independence and object-oriented approach.
Java is widely used for developing desktop, web, and mobile applications.
It is known for its write once, run anywhere (WORA) principle.
Java programs are compiled into bytecode and executed on a Java Virtual Machine (JVM).
It supports multithreading, exception handling, and automatic memory management.
Popular framew...
Lambda is a function that allows you to write and use small, anonymous functions in programming languages.
Lambda functions are often used in functional programming languages.
They are anonymous, meaning they don't have a name.
Lambdas can be used as arguments to higher-order functions.
They are commonly used for tasks that require a short, one-time function.
Lambda functions can be written in various programming languages,
I applied via Job Fair
Java 8 programs, string buffer and builder
About traffic in Banglore and the project
I applied via Campus Placement and was interviewed in Nov 2021. There were 3 interview rounds.
Reversing a string involves flipping the order of characters in a given string.
Create an empty string to store the reversed string
Iterate through the original string from the end to the beginning
Append each character to the empty string
Return the reversed string
I applied via Recruitment Consultant and was interviewed in May 2021. There were 4 interview rounds.
Redux is a predictable state container for JavaScript apps.
Actions are dispatched to the store
Reducers update the state based on the action
Components subscribe to the store to get updated state
I applied via Naukri.com and was interviewed in Jan 2021. There was 1 interview round.
I applied via Company Website and was interviewed in Apr 2024. There were 2 interview rounds.
2 coding questions, Java
Create a website, 7 days
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
based on 5 reviews
Rating in categories
Software Engineer
242
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
140
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
138
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Executive
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Digital Marketing Expert
53
salaries
| ₹0 L/yr - ₹0 L/yr |
Upwork
Remote
Gurit India
PeoplePerHour