Upload Button Icon Add office photos

Filter interviews by

National Informatics Centre Interview Questions and Answers

Updated 23 Jan 2025
Popular Designations

33 Interview questions

A Senior Software Engineer was asked 6mo ago
Q. What are the features of Selenium?
Ans. 

Selenium is a popular automation testing tool used for web applications.

  • Supports multiple programming languages like Java, Python, C#, etc.

  • Can automate web browsers across different platforms.

  • Allows for parallel test execution.

  • Integrates with popular CI/CD tools like Jenkins.

  • Supports various browsers like Chrome, Firefox, Safari, etc.

View all Senior Software Engineer interview questions
A Software Engineer was asked 10mo ago
Q. How do you handle cyber threats in web applications?
Ans. 

Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.

  • Implement strong encryption protocols to protect data in transit and at rest

  • Use firewalls to monitor and control incoming and outgoing traffic

  • Regularly conduct security audits and penetration testing to identify vulnerabilities

  • Implement secure coding practices to prevent com...

View all Software Engineer interview questions
An Intern was asked
Q. How can you mitigate a MITM attack?
Ans. 

To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.

  • Use encryption to protect data in transit

  • Implement secure communication protocols like HTTPS

  • Verify server certificates to ensure the authenticity of the server

  • Use VPNs for secure remote access

View all Intern interview questions
An Intern was asked
Q. Describe the OSI model.
Ans. 

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with the adjacent layers.

  • Example: When you send an ema...

View all Intern interview questions
An Intern was asked
Q. Develop a RAT using MSF
Ans. 

Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)

  • Use Metasploit Framework to create a payload for the RAT

  • Set up a listener to receive connections from the compromised machines

  • Utilize post-exploitation modules in MSF for advanced functionality

  • Ensure proper evasion techniques to avoid detection by antivirus software

View all Intern interview questions
A Software Developer was asked
Q. Write an SQL query and a C# program.
Ans. 

SQL queries can be executed in C# using ADO.NET or Entity Framework to interact with databases.

  • Use SqlConnection to establish a connection to the database.

  • Create SqlCommand to execute SQL queries, e.g., SELECT, INSERT.

  • Use SqlDataReader to read data returned from a query.

  • Entity Framework allows for LINQ queries, simplifying data access.

View all Software Developer interview questions
A Server Administrator was asked
Q. What security measures would you take to secure a server?
Ans. 

I will implement various security measures such as firewalls, access controls, regular updates, and backups.

  • Install and configure firewalls to prevent unauthorized access

  • Implement access controls to restrict access to sensitive data

  • Regularly update software and operating systems to patch vulnerabilities

  • Perform regular backups to ensure data can be restored in case of a security breach

View all Server Administrator interview questions
Are these interview questions helpful?
A Server Administrator was asked
Q. What is the default MySQL port?
Ans. 

The default Mysql port is 3306.

  • Mysql uses port 3306 by default for communication.

  • The port number can be changed in the configuration file.

  • To connect to a Mysql server, the client must specify the correct port number.

View all Server Administrator interview questions
A Server Administrator was asked
Q. What is Logical Volume Management?
Ans. 

Logical Volume Management (LVM) is a method of allocating space on mass storage devices that allows for flexible partitioning.

  • LVM allows for the creation of logical volumes that can span multiple physical disks.

  • It provides features such as resizing volumes on-the-fly and creating snapshots for backups.

  • LVM is commonly used in enterprise environments to manage large amounts of data.

  • Examples of LVM tools include pvcr...

View all Server Administrator interview questions
A Server Administrator was asked
Q. What is server hardening?
Ans. 

Server hardening is the process of securing a server by reducing its attack surface and minimizing vulnerabilities.

  • Server hardening involves configuring the server to reduce the risk of unauthorized access, data theft, and other security threats.

  • This can include installing security patches and updates, disabling unnecessary services and ports, and implementing access controls.

  • Examples of server hardening measures ...

View all Server Administrator interview questions

National Informatics Centre Interview Experiences

39 interviews found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - HR 

(4 Questions)

  • Q1. Work experience
  • Q2. Expected salary
  • Ans. 

    I expect a competitive salary based on my skills, experience, and industry standards.

    • Research industry standards: For example, Glassdoor or Payscale can provide insights into average salaries for similar roles.

    • Consider my experience level: With 5 years of experience, I would expect a salary in the range of $80,000 to $100,000.

    • Factor in location: Salaries can vary significantly based on the cost of living in different c...

  • Answered by AI
  • Q3. Domain knowledge
  • Q4. About Notice period
Round 2 - Online interview with Scientists 

(1 Question)

  • Q1. How to handle cyber threads in web application
  • Ans. 

    Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.

    • Implement strong encryption protocols to protect data in transit and at rest

    • Use firewalls to monitor and control incoming and outgoing traffic

    • Regularly conduct security audits and penetration testing to identify vulnerabilities

    • Implement secure coding practices to prevent common s...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for National Informatics Centre Software Engineer interview:
  • Cybersecurity
  • Laravel
  • PHP
Interview preparation tips for other job seekers - Software Application Support Engineer (0 -2 years) was the post. Asked about the projects handled on the previous job. And technologies used over the project and my contribution over the project and asked about the web application security issues and it's a online interview conducted by the NiC scientists. It's a contract position in nic developers are placed via contract on trivandrum office. Onboarding was smooth.

Skills evaluated in this interview

PHP Developer Interview Questions & Answers

user image priyanka aharwar

posted on 23 Jan 2025

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview in Dec 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. PHP OOPS concept
  • Q2. Session and cookie related question with example and code

Interview Questions & Answers

user image Anonymous

posted on 26 Jun 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Introduce yourself
  • Ans. 

    I am an Office Support Assistant with a passion for technology and a strong background in administrative tasks and customer service.

    • Administrative Skills: I have experience managing schedules, organizing files, and handling correspondence efficiently.

    • Technical Proficiency: I am proficient in Microsoft Office Suite, including Word, Excel, and PowerPoint, which I use to create reports and presentations.

    • Customer Service: ...

  • Answered by AI
  • Q2. Question related projects and internship
Round 2 - Assignment 

I was given an assignment on Audiobased attendance system.

Round 3 - One-on-one 

(2 Questions)

  • Q1. What was done in that given assignment?
  • Q2. Question related domain knowledge
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Questions they asked about my previous company rolls and responsibilities
  • Q2. Most of the interview questions were asked is what i was mentioned in the resume..
Round 3 - Technical 

(2 Questions)

  • Q1. Asked about certifications,
  • Q2. CCNA Questions routing and switching, Asked about ospf & Bgp
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. BGP commands Vlan configuration
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Coding Test 

Reverse the string, Reverse of an array, Data base related queries

Intern Interview Questions & Answers

user image Adit Vats

posted on 29 Feb 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. Introduce Yourself
  • Ans. 

    I am a passionate Java Full Stack Developer with a strong foundation in Java, Spring, and front-end technologies like React.

    • Educational Background: I hold a degree in Computer Science, where I developed a solid understanding of software development principles.

    • Technical Skills: Proficient in Java, Spring Boot for backend development, and React for building dynamic user interfaces.

    • Project Experience: Developed a full-sta...

  • Answered by AI
  • Q2. What are types of cyber attacks
  • Ans. 

    Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.

    • Malware: malicious software designed to damage or gain unauthorized access to a computer system.

    • Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

    • Ransomware: malware that encrypts a user's files and demands payment for their release.

    • DDoS attacks: flooding a network or serv...

  • Answered by AI
  • Q3. How to mitigate MITM attack
  • Ans. 

    To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.

    • Use encryption to protect data in transit

    • Implement secure communication protocols like HTTPS

    • Verify server certificates to ensure the authenticity of the server

    • Use VPNs for secure remote access

  • Answered by AI
  • Q4. Develop a RAT using MSF
  • Ans. 

    Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)

    • Use Metasploit Framework to create a payload for the RAT

    • Set up a listener to receive connections from the compromised machines

    • Utilize post-exploitation modules in MSF for advanced functionality

    • Ensure proper evasion techniques to avoid detection by antivirus software

  • Answered by AI
  • Q5. Describe OSI model
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Example: When you send an email, t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Stay updated with the current scenarios and knowledge in the market

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Linux distributions
  • Q2. Linux networking
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Walk-in and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - HR 

(4 Questions)

  • Q1. General knowledge
  • Q2. Simple question
  • Q3. Science Technology
  • Q4. Health care and Insurance

Interview Preparation Tips

Interview preparation tips for other job seekers - Very easy asked questions for answer
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is server hardening?
  • Ans. 

    Server hardening is the process of securing a server by reducing its attack surface and minimizing vulnerabilities.

    • Server hardening involves configuring the server to reduce the risk of unauthorized access, data theft, and other security threats.

    • This can include installing security patches and updates, disabling unnecessary services and ports, and implementing access controls.

    • Examples of server hardening measures inclu...

  • Answered by AI
  • Q2. Which is the default Mysql port
  • Ans. 

    The default Mysql port is 3306.

    • Mysql uses port 3306 by default for communication.

    • The port number can be changed in the configuration file.

    • To connect to a Mysql server, the client must specify the correct port number.

  • Answered by AI
  • Q3. What is ssh? What is ssl?
  • Ans. 

    SSH is a secure network protocol used for remote access to servers. SSL is a security protocol used for secure communication over the internet.

    • SSH stands for Secure Shell and is used for secure remote access to servers

    • SSH uses encryption to secure the communication between the client and server

    • SSL stands for Secure Sockets Layer and is used for secure communication over the internet

    • SSL uses encryption to secure the com...

  • Answered by AI
Round 3 - Technical 

(2 Questions)

  • Q1. What is Logical volume management?
  • Ans. 

    Logical Volume Management (LVM) is a method of allocating space on mass storage devices that allows for flexible partitioning.

    • LVM allows for the creation of logical volumes that can span multiple physical disks.

    • It provides features such as resizing volumes on-the-fly and creating snapshots for backups.

    • LVM is commonly used in enterprise environments to manage large amounts of data.

    • Examples of LVM tools include pvcreate,...

  • Answered by AI
  • Q2. What are the security measures you will take to secure server
  • Ans. 

    I will implement various security measures such as firewalls, access controls, regular updates, and backups.

    • Install and configure firewalls to prevent unauthorized access

    • Implement access controls to restrict access to sensitive data

    • Regularly update software and operating systems to patch vulnerabilities

    • Perform regular backups to ensure data can be restored in case of a security breach

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be thorough with the linux server management basics, commands etc

Skills evaluated in this interview

Senior Software Developer Interview Questions & Answers

user image Rajesh Radhakrishnan

posted on 3 Jan 2025

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed before Jan 2024. There were 2 interview rounds.

Round 1 - Coding Test 

CRUD operations in a known programming language.

Round 2 - Technical 

(2 Questions)

  • Q1. Arrays & Strings explanation
  • Ans. 

    Arrays & Strings are data structures used to store multiple values in a single variable.

    • Arrays store multiple values of the same data type in a contiguous memory location.

    • Strings are arrays of characters used to represent text.

    • Example: int[] numbers = {1, 2, 3}; String name = 'John';

  • Answered by AI
  • Q2. Cors origin and security & hashing techniques & cross site forgery & sql injection

Interview Preparation Tips

Topics to prepare for National Informatics Centre Senior Software Developer interview:
  • Core PHP
  • SQL
  • HTML
  • JQuery
  • Javascript
  • CSS3
  • Postgresql
Interview preparation tips for other job seekers - Please ensure that all topics are covered along with coding practice, as this will be truly helpful.

Top trending discussions

View All
Interview Tips & Stories
1w
toobluntforu
·
works at
Cvent
Can speak English, can’t deliver in interviews
I feel like I can't speak fluently during interviews. I do know english well and use it daily to communicate, but the moment I'm in an interview, I just get stuck. since it's not my first language, I struggle to express what I actually feel. I know the answer in my head, but I just can’t deliver it properly at that moment. Please guide me
Got a question about National Informatics Centre?
Ask anonymously on communities.

National Informatics Centre Interview FAQs

How many rounds are there in National Informatics Centre interview?
National Informatics Centre interview process usually has 2-3 rounds. The most common rounds in the National Informatics Centre interview process are Technical, Resume Shortlist and HR.
What are the top questions asked in National Informatics Centre interview?

Some of the top questions asked at the National Informatics Centre interview -

  1. What is class, object? Oops concepts in java? Struts flow.. Database ddl and dm...read more
  2. what are problems in india about IT industry... ? job opportunities in IT ? wha...read more
  3. What are the security measures you will take to secure ser...read more
How long is the National Informatics Centre interview process?

The duration of National Informatics Centre interview process can vary, but typically it takes about less than 2 weeks to complete.

Tell us how to improve this page.

Overall Interview Experience Rating

4.4/5

based on 24 interview experiences

Difficulty level

Easy 21%
Moderate 79%

Duration

Less than 2 weeks 64%
2-4 weeks 29%
6-8 weeks 7%
View more

National Informatics Centre Reviews and Ratings

based on 644 reviews

3.9/5

Rating in categories

3.6

Skill development

3.9

Work-life balance

3.3

Salary

3.4

Job security

3.5

Company culture

3.1

Promotions

3.6

Work satisfaction

Explore 644 Reviews and Ratings
Software Developer
671 salaries
unlock blur

₹2 L/yr - ₹10 L/yr

Senior Software Developer
174 salaries
unlock blur

₹3.6 L/yr - ₹11.4 L/yr

Software Engineer
158 salaries
unlock blur

₹3 L/yr - ₹9 L/yr

Java Developer
128 salaries
unlock blur

₹2.4 L/yr - ₹8.4 L/yr

Programmer
111 salaries
unlock blur

₹2 L/yr - ₹6 L/yr

Explore more salaries
Compare National Informatics Centre with

Government of India

4.3
Compare

Csc E Governance Services

3.8
Compare

Central Reserve Police Force

4.7
Compare

Ministry of Defence

4.3
Compare
write
Share an Interview