i
Wipro
Filter interviews by
I applied via Naukri.com and was interviewed in Feb 2022. There was 1 interview round.
Risk assessment methods are used to identify and evaluate potential threats and vulnerabilities to an organization's assets.
Qualitative risk assessment
Quantitative risk assessment
Delphi method
Scenario analysis
Threat modeling
Vulnerability scanning
Penetration testing
I applied via Approached by Company and was interviewed before Oct 2022. There were 2 interview rounds.
I applied via LinkedIn and was interviewed before Oct 2021. There were 4 interview rounds.
Aptitude test contains questions from English verbal and non verbal reasoning. Maths. Computer literacy
SDLC is a process followed by software development teams to design, develop and test high-quality software.
SDLC stands for Software Development Life Cycle
It includes planning, designing, coding, testing, and maintenance of software
It ensures that the software is developed efficiently and meets the requirements of the stakeholders
Examples of SDLC models are Waterfall, Agile, and DevOps
I was interviewed in Jan 2025.
About the networking issues
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is online test. In this test there is question of apti and also coding and from 5g question.
There are two questions asked and time is enough to solve 60 minutes
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Check if the reversed string is equal to the original string
Create a function to add two numbers
Define a function that takes two parameters as input
Inside the function, add the two numbers together and return the result
Example: function addNumbers(num1, num2) { return num1 + num2; }
Binary search code implementation in Python
Define a function that takes a sorted array and a target value as input
Initialize two pointers, low and high, to the start and end of the array respectively
While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target
If array[mid] is equal to target, return mid
If array[mid] is less than target, update low to mid + 1
If array[mid]...
A program to check if a given name is a palindrome or not.
Convert the name to lowercase to handle case-insensitivity
Remove any spaces or special characters from the name
Reverse the name and compare it with the original name to check for palindrome
malloc and calloc are functions in C programming used for dynamic memory allocation.
malloc function is used to allocate a single block of memory of a specified size.
calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I would like simple test
I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.
Configured routers and switches to optimize network performance
Assisted in setting up VLANs and implementing security protocols
Troubleshooted network connectivity issues for end users
Participated in network infrastructure upgrades and maintenance
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
Normal aptitude group discussion assignment case study
Coding test assignment one on one round
Technical skills are essential for a Network Engineer, but soft skills are also important for effective communication and teamwork.
Technical skills are necessary for configuring and troubleshooting network devices.
Soft skills like communication, teamwork, and problem-solving are crucial for working effectively with colleagues and clients.
Balancing technical expertise with interpersonal skills is key to success in the r...
DHCP is a protocol used to assign IP addresses dynamically to devices on a network, while DNS is a system that translates domain names to IP addresses.
DHCP assigns IP addresses to devices on a network dynamically
DNS translates domain names to IP addresses
RDP (Remote Desktop Protocol) allows users to remotely connect to a computer
FRP (Fiberglass Reinforced Plastic) is a material used in construction
30nd does not seem to
based on 6 reviews
Rating in categories
Project Engineer
32.8k
salaries
| ₹1.8 L/yr - ₹8.2 L/yr |
Senior Software Engineer
23.1k
salaries
| ₹5.8 L/yr - ₹23 L/yr |
Senior Associate
21.3k
salaries
| ₹0.9 L/yr - ₹5.5 L/yr |
Senior Project Engineer
20.4k
salaries
| ₹5 L/yr - ₹19.5 L/yr |
Technical Lead
18.7k
salaries
| ₹8.3 L/yr - ₹36.5 L/yr |
TCS
Infosys
Tesla
Amazon