Filter interviews by
Selenium is a popular automation testing tool used for web applications.
Supports multiple programming languages like Java, Python, C#, etc.
Can automate web browsers across different platforms.
Allows for parallel test execution.
Integrates with popular CI/CD tools like Jenkins.
Supports various browsers like Chrome, Firefox, Safari, etc.
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent com...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an ema...
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
SQL queries can be executed in C# using ADO.NET or Entity Framework to interact with databases.
Use SqlConnection to establish a connection to the database.
Create SqlCommand to execute SQL queries, e.g., SELECT, INSERT.
Use SqlDataReader to read data returned from a query.
Entity Framework allows for LINQ queries, simplifying data access.
I will implement various security measures such as firewalls, access controls, regular updates, and backups.
Install and configure firewalls to prevent unauthorized access
Implement access controls to restrict access to sensitive data
Regularly update software and operating systems to patch vulnerabilities
Perform regular backups to ensure data can be restored in case of a security breach
The default Mysql port is 3306.
Mysql uses port 3306 by default for communication.
The port number can be changed in the configuration file.
To connect to a Mysql server, the client must specify the correct port number.
Logical Volume Management (LVM) is a method of allocating space on mass storage devices that allows for flexible partitioning.
LVM allows for the creation of logical volumes that can span multiple physical disks.
It provides features such as resizing volumes on-the-fly and creating snapshots for backups.
LVM is commonly used in enterprise environments to manage large amounts of data.
Examples of LVM tools include pvcr...
Server hardening is the process of securing a server by reducing its attack surface and minimizing vulnerabilities.
Server hardening involves configuring the server to reduce the risk of unauthorized access, data theft, and other security threats.
This can include installing security patches and updates, disabling unnecessary services and ports, and implementing access controls.
Examples of server hardening measures ...
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
I expect a competitive salary based on my skills, experience, and industry standards.
Research industry standards: For example, Glassdoor or Payscale can provide insights into average salaries for similar roles.
Consider my experience level: With 5 years of experience, I would expect a salary in the range of $80,000 to $100,000.
Factor in location: Salaries can vary significantly based on the cost of living in different c...
Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.
Implement strong encryption protocols to protect data in transit and at rest
Use firewalls to monitor and control incoming and outgoing traffic
Regularly conduct security audits and penetration testing to identify vulnerabilities
Implement secure coding practices to prevent common s...
I appeared for an interview in Dec 2024.
I am an Office Support Assistant with a passion for technology and a strong background in administrative tasks and customer service.
Administrative Skills: I have experience managing schedules, organizing files, and handling correspondence efficiently.
Technical Proficiency: I am proficient in Microsoft Office Suite, including Word, Excel, and PowerPoint, which I use to create reports and presentations.
Customer Service: ...
I was given an assignment on Audiobased attendance system.
I applied via Referral
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
Reverse the string, Reverse of an array, Data base related queries
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
I am a passionate Java Full Stack Developer with a strong foundation in Java, Spring, and front-end technologies like React.
Educational Background: I hold a degree in Computer Science, where I developed a solid understanding of software development principles.
Technical Skills: Proficient in Java, Spring Boot for backend development, and React for building dynamic user interfaces.
Project Experience: Developed a full-sta...
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
I applied via Walk-in and was interviewed in Feb 2024. There was 1 interview round.
Server hardening is the process of securing a server by reducing its attack surface and minimizing vulnerabilities.
Server hardening involves configuring the server to reduce the risk of unauthorized access, data theft, and other security threats.
This can include installing security patches and updates, disabling unnecessary services and ports, and implementing access controls.
Examples of server hardening measures inclu...
The default Mysql port is 3306.
Mysql uses port 3306 by default for communication.
The port number can be changed in the configuration file.
To connect to a Mysql server, the client must specify the correct port number.
SSH is a secure network protocol used for remote access to servers. SSL is a security protocol used for secure communication over the internet.
SSH stands for Secure Shell and is used for secure remote access to servers
SSH uses encryption to secure the communication between the client and server
SSL stands for Secure Sockets Layer and is used for secure communication over the internet
SSL uses encryption to secure the com...
Logical Volume Management (LVM) is a method of allocating space on mass storage devices that allows for flexible partitioning.
LVM allows for the creation of logical volumes that can span multiple physical disks.
It provides features such as resizing volumes on-the-fly and creating snapshots for backups.
LVM is commonly used in enterprise environments to manage large amounts of data.
Examples of LVM tools include pvcreate,...
I will implement various security measures such as firewalls, access controls, regular updates, and backups.
Install and configure firewalls to prevent unauthorized access
Implement access controls to restrict access to sensitive data
Regularly update software and operating systems to patch vulnerabilities
Perform regular backups to ensure data can be restored in case of a security breach
I applied via Recruitment Consulltant and was interviewed before Jan 2024. There were 2 interview rounds.
CRUD operations in a known programming language.
Arrays & Strings are data structures used to store multiple values in a single variable.
Arrays store multiple values of the same data type in a contiguous memory location.
Strings are arrays of characters used to represent text.
Example: int[] numbers = {1, 2, 3}; String name = 'John';
Top trending discussions
Some of the top questions asked at the National Informatics Centre interview -
The duration of National Informatics Centre interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 24 interview experiences
Difficulty level
Duration
based on 644 reviews
Rating in categories
Software Developer
671
salaries
| ₹2 L/yr - ₹10 L/yr |
Senior Software Developer
174
salaries
| ₹3.6 L/yr - ₹11.4 L/yr |
Software Engineer
158
salaries
| ₹3 L/yr - ₹9 L/yr |
Java Developer
128
salaries
| ₹2.4 L/yr - ₹8.4 L/yr |
Programmer
111
salaries
| ₹2 L/yr - ₹6 L/yr |
Government of India
Csc E Governance Services
Central Reserve Police Force
Ministry of Defence