Faster and better experience!
Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2022. There were 2 interview rounds.
TSL is a protocol used to secure communication over the internet. Three-way handshake is a method used to establish a connection. Cyber attacks are malicious activities aimed at disrupting or damaging computer systems.
TSL (Transport Layer Security) is a cryptographic protocol used to secure communication over the internet.
Three-way handshake is a method used to establish a connection between two devices. It involves th...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic.
It acts as a barrier between a trusted internal network and an untrusted external network.
It can be hardware, software, or a combination of both.
It can be configured to allow or block specific traffic based on predefined rules.
Examples include Cisco ASA, Fortinet FortiGate, and pfSense.
A proxy server acts as an intermediary between a client and a server, forwarding requests and responses.
It can be used to improve security and privacy by hiding the client's IP address.
It can also be used to bypass content filters or access geographically restricted content.
Examples include Squid, Nginx, and Apache.
Proxy servers can be configured to allow or block certain types of traffic.
I applied via Recruitment Consulltant and was interviewed before Apr 2022. There were 2 interview rounds.
Top trending discussions
posted on 6 Mar 2025
I applied via Company Website and was interviewed before Dec 2019. There were 3 interview rounds.
posted on 13 Jan 2021
I applied via Referral and was interviewed before Jan 2020. There was 1 interview round.
We are using a variety of technologies, including some of the latest ones.
We are using React for our front-end development.
We are also using Node.js for our back-end development.
We are using Docker for containerization.
We are using Kubernetes for orchestration.
We are using AWS for cloud hosting.
We are constantly evaluating new technologies to see if they can improve our development process.
It depends on the specific requirements and constraints of the project.
Consider the project's goals and objectives
Evaluate the available technologies and their capabilities
Assess the project's budget and timeline
Consult with stakeholders and experts in the field
Examples: React vs Angular, MySQL vs MongoDB, Java vs Python
posted on 25 Aug 2021
posted on 11 Feb 2022
I applied via Campus Placement and was interviewed in Aug 2021. There were 4 interview rounds.
1st test was aptitude and a easy coding test
The 2nd test was pure coding based test on hacker rank platform and contains 2 easy and 2 medium question
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions on DSA and DBMS mainly.
Given an array ARR
consisting of N
integers, determine the sum of the subarray with the maximum sum, including the possibility of an empty subarray.
A subarray is a...
Find the sum of the subarray with the maximum sum in a given array.
Iterate through the array and keep track of the current sum and maximum sum.
Update the maximum sum if the current sum becomes greater.
Handle cases where the array has all negative numbers or empty subarray.
Example: For input [-2, 1, -3, 4, -1], the maximum sum subarray is [4] with sum 4.
Given a positive integer N
, your task is to identify all prime numbers less than or equal to N
.
A prime number is a natural number greater than 1 that has no po...
Identify all prime numbers less than or equal to a given positive integer N.
Iterate from 2 to N and check if each number is prime
Use the Sieve of Eratosthenes algorithm for efficient prime number identification
Optimize by only checking numbers up to square root of N for divisibility
Joins in databases are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right ta...
Round duration - 30 minutes
Round difficulty - Easy
Typical HR round with behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 3 interview experiences
Difficulty level
Duration
based on 37 reviews
Rating in categories
Mumbai,
Saudi arabia
+13-7 Yrs
₹ 7-10 LPA
Cyber Security Analyst
19
salaries
| ₹2.7 L/yr - ₹4 L/yr |
Security Analyst
17
salaries
| ₹2.7 L/yr - ₹4.4 L/yr |
Network Security Analyst
14
salaries
| ₹1.8 L/yr - ₹7 L/yr |
Junior Analyst
6
salaries
| ₹3 L/yr - ₹3 L/yr |
Analyst
5
salaries
| ₹3 L/yr - ₹5.5 L/yr |
Accel Frontline
Northcorp Software
Zidio Development
Elentec Power India (EPI) Pvt. Ltd.