Add office photos
Employer?
Claim Account for FREE

Accenture

3.9
based on 52.4k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

20+ Interview Questions and Answers

Updated 7 Jul 2024
Popular Designations

Q1. Give a practical example of Broken Authentication & authorisation? How u will exploit that?

Ans.

Broken authentication & authorization is when an attacker gains access to a user's account or system without proper credentials.

  • An attacker can exploit this by guessing or stealing a user's login credentials.

  • They can also use brute force attacks to crack weak passwords.

  • Another way is to exploit vulnerabilities in the authentication process, such as session hijacking or cookie theft.

  • Once the attacker gains access, they can steal sensitive data, modify or delete data, or perfor...read more

Add your answer

Q2. What is the approach of your WAPT?

Ans.

Our WAPT approach involves a comprehensive testing methodology to identify and address vulnerabilities in web applications.

  • We use a combination of automated and manual testing techniques

  • We prioritize vulnerabilities based on their severity and potential impact

  • We work closely with development teams to ensure timely remediation

  • We conduct regular retesting to ensure vulnerabilities have been properly addressed

View 1 answer

Q3. Explain the scenario & What u do with CSRF Vulnerability

Ans.

CSRF vulnerability allows attackers to perform actions on behalf of a user without their consent.

  • CSRF attacks can be prevented by implementing CSRF tokens

  • The token is generated by the server and included in the form or URL

  • When the form is submitted, the token is verified to ensure it matches the one generated by the server

  • If the token is invalid, the request is rejected

  • CSRF vulnerabilities can be exploited to perform actions such as changing passwords, making purchases, or de...read more

Add your answer

Q4. How can broken authorisation vulnerability be extended

Ans.

Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.

  • Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access

  • Using stolen credentials to bypass authorization checks

  • Exploiting misconfigured access controls to gain elevated privileges

  • Using brute force attacks to guess valid credentials

  • Exploiting session management vulnerabilities to hijack user sessions

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. What type of vulnerabilities are over there?

Ans.

There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.

  • SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database

  • Cross-site scripting: attackers inject malicious scripts into a website to steal user data

  • Buffer overflow: attackers exploit a program's buffer to execute malicious code

  • Other types include CSRF, DoS, and privilege escalation

  • Vulnerabilities can exist in software, hardware, and ...read more

Add your answer

Q6. What type of mobile application did u test?

Ans.

I have tested various types of mobile applications including social media, e-commerce, and banking apps.

  • I have tested social media apps like Facebook, Twitter, and Instagram

  • I have tested e-commerce apps like Amazon, Flipkart, and eBay

  • I have tested banking apps like Chase, Bank of America, and Wells Fargo

Add your answer
Are these interview questions helpful?

Q7. What are secure software development frameworks? Which have you worked on?

Ans.

Secure software development frameworks are methodologies used to develop software with security in mind.

  • Secure software development frameworks are designed to integrate security into the software development process

  • They provide guidelines and best practices for secure coding, testing, and deployment

  • Examples include Microsoft's Security Development Lifecycle (SDL), OWASP's Software Assurance Maturity Model (SAMM), and NIST's Secure Software Development Framework (SSDF)

Add your answer

Q8. Explain one of the vulnerabilities from OWASP API top 10?

Ans.

Broken Object Level Authorization (BOLA) is a vulnerability where an attacker can access unauthorized data by manipulating object references.

  • BOLA occurs when an application fails to enforce proper access controls on object references.

  • Attackers can exploit BOLA to access sensitive data or functionality by manipulating object references.

  • Examples of BOLA include accessing other users' data, modifying data that should be read-only, and accessing administrative functions without p...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Write a SQL Payload, other than basic. Explain the payload

Ans.

SQL Payload to extract sensitive data from a database

  • Use UNION SELECT to combine data from different tables

  • Use subqueries to extract specific data

  • Use SQL injection to bypass authentication and access data

  • Use ORDER BY to sort data in a specific way and extract specific data

  • Use GROUP BY to group data and extract specific data

Add your answer

Q10. Which kind of api you are tested?

Ans.

I have tested various kinds of APIs including REST, SOAP, GraphQL, and more.

  • I have experience testing REST APIs which use HTTP methods like GET, POST, PUT, DELETE.

  • I have also tested SOAP APIs which use XML for data exchange.

  • I have worked with GraphQL APIs which allow clients to specify the data they need.

  • I am familiar with testing APIs that use authentication and authorization mechanisms.

  • I have tested APIs that integrate with third-party services like payment gateways, social...read more

Add your answer

Q11. What is XSS? Type of that.

Ans.

XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • XSS attacks can be classified into three types: Stored, Reflected, and DOM-based.

  • Attackers can use XSS to steal sensitive information, such as login credentials or session tokens.

  • Preventing XSS requires input validation, output encoding, and proper use of security headers.

  • Example of an XSS attack:

View 1 answer

Q12. What have you done in API Security?

Ans.

Implemented various security measures in API development and testing.

  • Implemented authentication and authorization mechanisms such as OAuth2 and JWT.

  • Implemented rate limiting and throttling to prevent DDoS attacks.

  • Implemented input validation and output encoding to prevent injection attacks.

  • Conducted API penetration testing to identify vulnerabilities and remediate them.

  • Implemented encryption and decryption mechanisms to protect sensitive data in transit and at rest.

Add your answer

Q13. Explain the concept of Bruit forcing?

Ans.

Brute forcing is a method of guessing a password or encryption key by trying all possible combinations.

  • Brute forcing is a trial-and-error method used to crack passwords or encryption keys.

  • It involves trying all possible combinations until the correct one is found.

  • This method can be time-consuming and resource-intensive.

  • Brute forcing can be used for both online and offline attacks.

  • Examples of tools used for brute forcing include John the Ripper and Hashcat.

Add your answer

Q14. What is the concept of frida?

Ans.

Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

  • Frida allows you to inject JavaScript or native code into an application to perform dynamic analysis.

  • It can be used to hook functions, intercept network traffic, and bypass SSL pinning.

  • Frida supports both iOS and Android platforms.

  • It can be used for both offensive and defensive security purposes.

Add your answer

Q15. What are scops are there?

Ans.

Scopes refer to the boundaries or limits of a particular security system or protocol.

  • Scopes define the extent of access or control that a user or system has within a security system.

  • Scopes can be defined by user roles, permissions, or other criteria.

  • Examples of scopes include network access, file permissions, and application privileges.

Add your answer

Q16. complete security testing performed throught SDLC life cycle

Ans.

Security testing should be performed at every stage of SDLC to ensure a secure product.

  • Security requirements should be defined at the planning stage

  • Threat modeling should be done during the design phase

  • Code review and vulnerability scanning should be done during the development phase

  • Penetration testing and security acceptance testing should be done during the testing phase

  • Security monitoring and incident response planning should be done during the deployment and maintenance p...read more

Add your answer

Q17. How to bypass ssl pinning?

Ans.

SSL pinning can be bypassed by modifying the app's code or using a tool to intercept and modify the SSL traffic.

  • Modify the app's code to disable SSL pinning

  • Use a tool like Frida or Cydia Substrate to intercept and modify SSL traffic

  • Use a man-in-the-middle attack to intercept and modify SSL traffic

  • Use a custom SSL certificate to bypass SSL pinning

  • Use a debugger to bypass SSL pinning

Add your answer

Q18. write a commend of nmap? Now explain it

Ans.

nmap is a network exploration tool used to scan and map networks and identify open ports and services.

  • nmap can be used to identify hosts and services on a network

  • It can also be used to identify open ports and vulnerabilities

  • nmap can be used to perform ping scans, TCP scans, and UDP scans

  • It can also be used to perform OS detection and version detection

  • nmap can be used with various options and flags to customize the scan

Add your answer

Q19. How registry patch is pushed when the machine is vulnerable?

Ans.

Registry patches can be pushed using patch management tools like SCCM or WSUS, or manually through Group Policy or scripts.

  • Use patch management tools like SCCM or WSUS to push registry patches automatically

  • Manually push registry patches through Group Policy or scripts

  • Ensure proper testing before pushing patches to avoid any issues

Add your answer

Q20. Write a basic XSS payload

Ans.

A basic XSS payload is a script injected into a website to execute malicious code on a victim's browser.

  • Use the

View 3 more answers

Q21. What is SQL Injection? Type?

Ans.

SQL Injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.

  • Attackers use SQL Injection to gain unauthorized access to sensitive data

  • It can be prevented by using parameterized queries and input validation

  • Types include In-band, Inferential, and Out-of-band

  • Examples of SQL Injection attacks include UNION-based and Error-based attacks

Add your answer

Q22. what is oX in nmap?

Ans.

oX in nmap is used to specify the IP protocol number to use for scanning.

  • oX is followed by the protocol number (e.g. oX1 for ICMP protocol)

  • It can be used with other nmap options like -sS or -sU

  • It is useful for scanning non-standard protocols

Add your answer

Q23. Explain the concept of XSS.

Ans.

XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • XSS attacks can be used to steal sensitive information, such as login credentials or personal data.

  • Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.

  • XSS vulnerabilities can be prevented by properly sanitizing user input and using output encoding to prevent ...read more

Add your answer

Q24. OWASP top 10 with mitigation

Ans.

OWASP top 10 is a list of common web application vulnerabilities. Mitigation involves implementing security controls to prevent or reduce the impact of these vulnerabilities.

  • Injection attacks can be mitigated by input validation and parameterized queries

  • Cross-site scripting (XSS) can be mitigated by input validation and output encoding

  • Broken authentication and session management can be mitigated by implementing strong password policies and session timeouts

  • Insecure direct obje...read more

Add your answer

Q25. What is DDos attack

Ans.

DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.

  • DDoS stands for Distributed Denial of Service

  • Attackers use multiple compromised systems to flood the target with traffic

  • Goal is to make the target server or network unavailable to legitimate users

  • Common types include UDP flood, SYN flood, and HTTP flood

  • Examples: Mirai botnet attack on Dyn DNS in 2016, GitHub DDoS attack in 2018

Add your answer

More about working at Accenture

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 3 interviews in the last 1 year
1 Interview rounds
Technical Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Security Engineer Interview Questions from Similar Companies

4.1
 • 15 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter