Filter interviews by
Registry patches can be pushed using patch management tools like SCCM or WSUS, or manually through Group Policy or scripts.
Use patch management tools like SCCM or WSUS to push registry patches automatically
Manually push registry patches through Group Policy or scripts
Ensure proper testing before pushing patches to avoid any issues
Brute forcing is a method of guessing a password or encryption key by trying all possible combinations.
Brute forcing is a trial-and-error method used to crack passwords or encryption keys.
It involves trying all possible combinations until the correct one is found.
This method can be time-consuming and resource-intensive.
Brute forcing can be used for both online and offline attacks.
Examples of tools used for brute f...
SSL pinning can be bypassed by modifying the app's code or using a tool to intercept and modify the SSL traffic.
Modify the app's code to disable SSL pinning
Use a tool like Frida or Cydia Substrate to intercept and modify SSL traffic
Use a man-in-the-middle attack to intercept and modify SSL traffic
Use a custom SSL certificate to bypass SSL pinning
Use a debugger to bypass SSL pinning
oX in nmap is used to specify the IP protocol number to use for scanning.
oX is followed by the protocol number (e.g. oX1 for ICMP protocol)
It can be used with other nmap options like -sS or -sU
It is useful for scanning non-standard protocols
What people are saying about Accenture
A basic XSS payload is a script injected into a website to execute malicious code on a victim's browser.
Use the
Scopes refer to the boundaries or limits of a particular security system or protocol.
Scopes define the extent of access or control that a user or system has within a security system.
Scopes can be defined by user roles, permissions, or other criteria.
Examples of scopes include network access, file permissions, and application privileges.
SQL Payload to extract sensitive data from a database
Use UNION SELECT to combine data from different tables
Use subqueries to extract specific data
Use SQL injection to bypass authentication and access data
Use ORDER BY to sort data in a specific way and extract specific data
Use GROUP BY to group data and extract specific data
I have tested various kinds of APIs including REST, SOAP, GraphQL, and more.
I have experience testing REST APIs which use HTTP methods like GET, POST, PUT, DELETE.
I have also tested SOAP APIs which use XML for data exchange.
I have worked with GraphQL APIs which allow clients to specify the data they need.
I am familiar with testing APIs that use authentication and authorization mechanisms.
I have tested APIs that in...
Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.
Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access
Using stolen credentials to bypass authorization checks
Exploiting misconfigured access controls to gain elevated privileges
Using brute force attacks to guess valid credentials
Exploiting session...
There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.
SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database
Cross-site scripting: attackers inject malicious scripts into a website to steal user data
Buffer overflow: attackers exploit a program's buffer to execute malicious code
Other types include CSRF, DoS, and privilege ...
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target server or network unavailable to legitimate users
Common types include UDP flood, SYN flood, and HTTP flood
Examples: Mirai botnet a...
As a Security Engineer, my roles include designing and implementing security measures, conducting security assessments, monitoring for security breaches, and responding to incidents.
Designing and implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and risks
Monitoring for security breaches and unauthorized access
Responding to security incidents and implem...
Registry patches can be pushed using patch management tools like SCCM or WSUS, or manually through Group Policy or scripts.
Use patch management tools like SCCM or WSUS to push registry patches automatically
Manually push registry patches through Group Policy or scripts
Ensure proper testing before pushing patches to avoid any issues
I applied via Naukri.com and was interviewed in Jun 2021. There were 3 interview rounds.
Scopes refer to the boundaries or limits of a particular security system or protocol.
Scopes define the extent of access or control that a user or system has within a security system.
Scopes can be defined by user roles, permissions, or other criteria.
Examples of scopes include network access, file permissions, and application privileges.
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be used to steal sensitive information, such as login credentials or personal data.
Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.
XSS vulnerabilities can be prevented by properly s...
SQL Injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.
Attackers use SQL Injection to gain unauthorized access to sensitive data
It can be prevented by using parameterized queries and input validation
Types include In-band, Inferential, and Out-of-band
Examples of SQL Injection attacks include UNION-based and Error-based attacks
SQL Payload to extract sensitive data from a database
Use UNION SELECT to combine data from different tables
Use subqueries to extract specific data
Use SQL injection to bypass authentication and access data
Use ORDER BY to sort data in a specific way and extract specific data
Use GROUP BY to group data and extract specific data
Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.
Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access
Using stolen credentials to bypass authorization checks
Exploiting misconfigured access controls to gain elevated privileges
Using brute force attacks to guess valid credentials
Exploiting session mana...
Broken authentication & authorization is when an attacker gains access to a user's account or system without proper credentials.
An attacker can exploit this by guessing or stealing a user's login credentials.
They can also use brute force attacks to crack weak passwords.
Another way is to exploit vulnerabilities in the authentication process, such as session hijacking or cookie theft.
Once the attacker gains access, they ...
Implemented various security measures in API development and testing.
Implemented authentication and authorization mechanisms such as OAuth2 and JWT.
Implemented rate limiting and throttling to prevent DDoS attacks.
Implemented input validation and output encoding to prevent injection attacks.
Conducted API penetration testing to identify vulnerabilities and remediate them.
Implemented encryption and decryption mechanisms t...
I have tested various kinds of APIs including REST, SOAP, GraphQL, and more.
I have experience testing REST APIs which use HTTP methods like GET, POST, PUT, DELETE.
I have also tested SOAP APIs which use XML for data exchange.
I have worked with GraphQL APIs which allow clients to specify the data they need.
I am familiar with testing APIs that use authentication and authorization mechanisms.
I have tested APIs that integra...
There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.
SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database
Cross-site scripting: attackers inject malicious scripts into a website to steal user data
Buffer overflow: attackers exploit a program's buffer to execute malicious code
Other types include CSRF, DoS, and privilege escal...
Broken Object Level Authorization (BOLA) is a vulnerability where an attacker can access unauthorized data by manipulating object references.
BOLA occurs when an application fails to enforce proper access controls on object references.
Attackers can exploit BOLA to access sensitive data or functionality by manipulating object references.
Examples of BOLA include accessing other users' data, modifying data that should be r...
I have tested various types of mobile applications including social media, e-commerce, and banking apps.
I have tested social media apps like Facebook, Twitter, and Instagram
I have tested e-commerce apps like Amazon, Flipkart, and eBay
I have tested banking apps like Chase, Bank of America, and Wells Fargo
SSL pinning can be bypassed by modifying the app's code or using a tool to intercept and modify the SSL traffic.
Modify the app's code to disable SSL pinning
Use a tool like Frida or Cydia Substrate to intercept and modify SSL traffic
Use a man-in-the-middle attack to intercept and modify SSL traffic
Use a custom SSL certificate to bypass SSL pinning
Use a debugger to bypass SSL pinning
Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
Frida allows you to inject JavaScript or native code into an application to perform dynamic analysis.
It can be used to hook functions, intercept network traffic, and bypass SSL pinning.
Frida supports both iOS and Android platforms.
It can be used for both offensive and defensive security purposes.
nmap is a network exploration tool used to scan and map networks and identify open ports and services.
nmap can be used to identify hosts and services on a network
It can also be used to identify open ports and vulnerabilities
nmap can be used to perform ping scans, TCP scans, and UDP scans
It can also be used to perform OS detection and version detection
nmap can be used with various options and flags to customize the scan
oX in nmap is used to specify the IP protocol number to use for scanning.
oX is followed by the protocol number (e.g. oX1 for ICMP protocol)
It can be used with other nmap options like -sS or -sU
It is useful for scanning non-standard protocols
I applied via Naukri.com and was interviewed in Dec 2021. There was 1 interview round.
Secure software development frameworks are methodologies used to develop software with security in mind.
Secure software development frameworks are designed to integrate security into the software development process
They provide guidelines and best practices for secure coding, testing, and deployment
Examples include Microsoft's Security Development Lifecycle (SDL), OWASP's Software Assurance Maturity Model (SAMM), and N...
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
Security testing should be performed at every stage of SDLC to ensure a secure product.
Security requirements should be defined at the planning stage
Threat modeling should be done during the design phase
Code review and vulnerability scanning should be done during the development phase
Penetration testing and security acceptance testing should be done during the testing phase
Security monitoring and incident response plann...
OWASP top 10 is a list of common web application vulnerabilities. Mitigation involves implementing security controls to prevent or reduce the impact of these vulnerabilities.
Injection attacks can be mitigated by input validation and parameterized queries
Cross-site scripting (XSS) can be mitigated by input validation and output encoding
Broken authentication and session management can be mitigated by implementing strong ...
COVID has reshaped my work-life balance, enhanced my adaptability, and deepened my focus on cybersecurity challenges.
Increased remote work led to a greater emphasis on securing home networks and personal devices.
Adapted to new collaboration tools like Zoom and Slack, ensuring secure communication channels.
Participated in online training and webinars to stay updated on emerging cybersecurity threats during the pandemic.
...
To debug a particular program without affecting others, use breakpoints and step through the code.
Set a breakpoint in the program you want to debug
Step through the code using a debugger to identify the issue
Use logging statements to track the flow of the program
Check the call stack to see which functions are being called
Use conditional breakpoints to stop the program at specific points
I applied via Campus Placement and was interviewed before Feb 2020. There were 4 interview rounds.
If and Switch Case statements are used for conditional branching in programming.
If statements are used for simple conditional branching.
Switch Case statements are used for multiple conditional branching.
If statements are more flexible than Switch Case statements.
Switch Case statements are more efficient than If statements for large number of conditions.
If statements can be nested, but Switch Case statements cannot.
Exam...
Yes, algorithms and pseudocodes are still important in IT Services.
Algorithms are used in various fields of IT such as machine learning, data analysis, and cryptography.
Pseudocodes are used to plan and design algorithms before coding them.
Understanding algorithms and pseudocodes is essential for software engineers to write efficient and optimized code.
Examples of algorithms include sorting algorithms, search algorithms...
Yes, I am comfortable using both CLIs and IDEs for my daily tasks.
I have experience using various CLIs such as Git Bash, Windows Command Prompt, and Terminal on macOS.
I am proficient in using IDEs such as Visual Studio Code, Eclipse, and IntelliJ IDEA.
I understand the benefits and drawbacks of both CLIs and IDEs and can choose the appropriate tool for the task at hand.
based on 3 interview experiences
Difficulty level
Duration
based on 9 reviews
Rating in categories
Application Development Analyst
39.3k
salaries
| ₹4.8 L/yr - ₹11 L/yr |
Application Development - Senior Analyst
27.7k
salaries
| ₹8.3 L/yr - ₹16.1 L/yr |
Team Lead
26.6k
salaries
| ₹12.6 L/yr - ₹22.5 L/yr |
Senior Analyst
19.5k
salaries
| ₹9.1 L/yr - ₹15.7 L/yr |
Senior Software Engineer
18.5k
salaries
| ₹10.4 L/yr - ₹18 L/yr |
TCS
Cognizant
Capgemini
Infosys