i
Cyber
Infrastructure
Filter interviews by
protected is an access modifier in object-oriented programming that restricts access to members within the same package or subclasses.
protected is one of the four access modifiers in Java, along with public, private, and default.
Members declared as protected can be accessed within the same package or by subclasses.
Protected members are not accessible outside the package unless accessed through inheritance.
Example:...
An object is a self-contained entity that consists of both data and behavior.
Objects are instances of classes in object-oriented programming.
They encapsulate data and provide methods to manipulate that data.
Objects can interact with each other through method calls and message passing.
Examples of objects include a car, a person, or a bank account.
Public is a keyword in programming languages that denotes the accessibility of a class, method, or variable.
Public is one of the access modifiers in object-oriented programming.
It allows the class, method, or variable to be accessed from any other class or package.
Public members are part of the public API of a software component.
Example: public class MyClass { ... }
Example: public void myMethod() { ... }
Example: p...
To switch variable values, use a temporary variable to hold one value while swapping the other.
Create a temporary variable to hold the value of one variable
Assign the value of the second variable to the first variable
Assign the value of the temporary variable to the second variable
I have worked on various projects, including web applications and algorithms, showcasing my skills in software development.
Project 1: A task management web application using React and Node.js, allowing users to create, update, and delete tasks.
Project 2: A personal portfolio website built with HTML, CSS, and JavaScript, highlighting my skills and projects.
Array Sorting: I used the built-in sort() function in JavaS...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a...
A class is a blueprint for creating objects, while an object is an instance of a class. Private, protected, public, and default are access modifiers in object-oriented programming.
A class is a template or blueprint that defines the properties and behaviors of objects.
An object is an instance of a class, created using the class blueprint.
Private access modifier restricts access to class members within the same clas...
I appeared for an interview in Apr 2025, where I was asked the following questions.
You can remove duplicates from a list in Python using various methods like set(), list comprehension, or loops.
Use set(): Convert the list to a set and back to a list. Example: list(set([1, 2, 2, 3])) results in [1, 2, 3].
List comprehension: Create a new list while checking for duplicates. Example: [x for i, x in enumerate(original_list) if x not in original_list[:i]].
Using a loop: Iterate through the list and append u...
Count common words in two strings by splitting, using sets, and finding intersections.
Split both strings into lists of words using the split() method.
Convert the lists to sets to eliminate duplicates.
Use set intersection to find common words.
Example: 'hello world' and 'world of python' -> common words: {'world'}.
A module is a single file of Python code, while a package is a collection of modules organized in a directory structure.
A module is a single Python file (e.g., `math.py`).
A package is a directory containing multiple modules and a special `__init__.py` file (e.g., `mypackage/`).
Modules can be imported directly (e.g., `import math`).
Packages allow for hierarchical organization of modules (e.g., `from mypackage import mym...
Accessing an HTTP URL can be done using various methods like web scraping, browser automation, or direct HTTP requests.
Use the 'requests' library in Python to make GET or POST requests to the URL.
Example: response = requests.get('http://example.com')
Utilize web scraping tools like BeautifulSoup to extract data from HTML pages.
Example: soup = BeautifulSoup(response.content, 'html.parser')
Employ browser automation tools ...
I applied via Campus Placement
Normal apti reasoning test checking normal intelligence with some basic technical questions.
Topic was physical cash V/s Digital cash.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Oop concept, Multithread, String
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Passionate Jr. Designer with a background in UX/UI design and a strong eye for detail.
Graduated with a degree in Graphic Design
Proficient in Adobe Creative Suite
Experience with wireframing and prototyping tools like Sketch and InVision
Strong understanding of user-centered design principles
Worked on projects involving mobile app design and website development
I am familiar with tools such as Adobe XD, Sketch, Figma, InVision, and Zeplin.
Adobe XD
Sketch
Figma
InVision
Zeplin
UI is the user interface, focusing on the look and feel of a product, while UX is the user experience, focusing on the overall experience of the user interacting with the product.
UI is the visual aspect of a product, including colors, typography, and layout.
UX is the overall experience of a user interacting with a product, including ease of use, efficiency, and satisfaction.
UI design focuses on creating visually appeal...
My last project was designing a mobile app for a fitness tracking platform.
Researched user needs and preferences for fitness tracking apps
Created wireframes and prototypes for user testing
Designed a clean and intuitive user interface with a focus on usability
Collaborated with developers to ensure smooth implementation of design elements
The most critical part of the project was ensuring seamless user experience through intuitive navigation and clear visual hierarchy.
Creating user personas to understand target audience needs
Conducting usability testing to identify pain points and areas for improvement
Iterating on design based on feedback received from stakeholders
Implementing responsive design principles for optimal user experience across devices
Both UI and UX have their own challenges, but I find UX more challenging due to the need for in-depth research and understanding of user behavior.
Understanding user needs and behavior
Creating user personas and user flows
Conducting usability testing and gathering feedback
Revamp the UI of a given website using Figma/XD
Analyze the current website's UI to identify areas for improvement
Create wireframes and mockups of the new UI design in Figma/XD
Focus on improving user experience and usability
Use consistent design elements and color schemes
Seek feedback from stakeholders for iterative improvements
I applied via Campus Placement and was interviewed in Dec 2023. There was 1 interview round.
A class is a blueprint for creating objects, while an object is an instance of a class. Private, protected, public, and default are access modifiers in object-oriented programming.
A class is a template or blueprint that defines the properties and behaviors of objects.
An object is an instance of a class, created using the class blueprint.
Private access modifier restricts access to class members within the same class.
Pro...
An object is a self-contained entity that consists of both data and behavior.
Objects are instances of classes in object-oriented programming.
They encapsulate data and provide methods to manipulate that data.
Objects can interact with each other through method calls and message passing.
Examples of objects include a car, a person, or a bank account.
Public is a keyword in programming languages that denotes the accessibility of a class, method, or variable.
Public is one of the access modifiers in object-oriented programming.
It allows the class, method, or variable to be accessed from any other class or package.
Public members are part of the public API of a software component.
Example: public class MyClass { ... }
Example: public void myMethod() { ... }
Example: public...
In programming, private is an access modifier that restricts the visibility of a class member to within its own class.
Private is used to encapsulate data and prevent direct access from outside the class.
Private members can only be accessed through public methods or properties.
Private variables are often used to store internal state or implementation details.
Private methods are used for internal logic and are not meant ...
protected is an access modifier in object-oriented programming that restricts access to members within the same package or subclasses.
protected is one of the four access modifiers in Java, along with public, private, and default.
Members declared as protected can be accessed within the same package or by subclasses.
Protected members are not accessible outside the package unless accessed through inheritance.
Example: prot...
Pattern, star , hollow pattern
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an...
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of...
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Company Website and was interviewed before Jan 2024. There were 3 interview rounds.
Good questions and dsa arrays and string questions
Top trending discussions
Some of the top questions asked at the Cyber Infrastructure interview -
The duration of Cyber Infrastructure interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 30 interview experiences
Difficulty level
Duration
based on 283 reviews
Rating in categories
Software Developer
269
salaries
| ₹3.3 L/yr - ₹8 L/yr |
Junior Software Developer
105
salaries
| ₹2 L/yr - ₹5 L/yr |
Senior Software Developer
47
salaries
| ₹5.4 L/yr - ₹11.5 L/yr |
Junior Developer
46
salaries
| ₹2.5 L/yr - ₹5.9 L/yr |
Senior Developer
28
salaries
| ₹4.5 L/yr - ₹9 L/yr |
AgreeYa Solutions
Apisero
Actalent Services
Stefanini