Software Interview Questions
Questions Answers Views Company eMail

What are the vulnerabilities according to the extended CERT Taxonomy?

1 3595

What are the possible means of Internet attacks?

2 4951

What is phishing?

Global Logic,

4 9310

What are the methods of defense (in context to IT-Security)?

Taylor Engineering,

2 4448

What is a security policy?

Airtel, Techworld,

1 5426

What is a security mechanism?

2 4513

what is pulse code modulation?

Wipro,

2 9491

What is a security policy?

1 4885

What are the two types of security policies?

3 9760

What is the idea behind the Bell-La Padula model?

1800

What protects and describes the Chinese Wall model?

1 5138

What protects the Clark Wilson model?

Airtel,

1 4418

Name components of a firewall system?

HCL, SafariCom,

2 12709

Describe the term intrusion detection in the context of IT- security?

4 6839

Name firewall architectures?

4 7856


Un-Answered Questions { Software }

Explain how linq with databases can be used?

60


Is 4gb ram enough for windows 10?

419


How do I align multiple tables in word 2016?

353


How do you connect your project to a source control system like svn and tfs in uipath?

252


Explain what is angular expression? Explain what is key difference between angular expressions and javascript expressions?

416






The purpose of the requirement phase is

615


Where is mongodb stored windows?

1


what is data access? : Sas-di

595


Describe your ideal company, location & job.

696


What is two-phase commit in the database?

512


What are the benefits of the traffic manager in windows azure?

293


How do I match two columns in excel?

309


What is java netbeans?

488


when MSQL8.0 is in market

1592


Why denormalization is promoted in universe designing?

548