Filter interviews by
I have 5 years of experience in conducting vulnerability assessments and penetration testing for various clients.
Conducted vulnerability assessments on web applications, networks, and mobile applications
Performed penetration testing to identify security weaknesses and recommend solutions
Utilized tools such as Burp Suite, Metasploit, and Nmap for testing purposes
Worked with clients to understand their security requireme...
I faced a vulnerability in a web application due to improper input validation.
Discovered SQL injection vulnerability during penetration testing.
Identified cross-site scripting (XSS) vulnerability in a login form.
Found insecure direct object reference vulnerability allowing access to unauthorized data.
Networking port and OWASP top 10
I applied via Job Portal
The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.
Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.
Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access to se...
I applied via Walk-in and was interviewed in Dec 2023.Β There were 2 interview rounds.
Resume shortlisted and round 1 - 35mins
Relational data base and sql basis concept like array strings
Anzen Technologies interview questions for popular designations
posted on 14 Jan 2024
I applied via Naukri.com and was interviewed in Mar 2023.Β There were 4 interview rounds.
OWASP top 10, Private IP adress range,
XSS is a type of web vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. OSI Layer is a model for network communication.
XSS stands for Cross-Site Scripting.
It occurs when an attacker injects malicious code into a web page viewed by other users.
This can be done through input fields, cookies, or other means.
OSI Layer is a model for network communication that consists of s...
I applied via Referral and was interviewed before Sep 2022.Β There were 2 interview rounds.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and co...
Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.
Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.
Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.
Viruses can be dormant until triggered by...
Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.
File infectors: attach themselves to executable files and spread when the infected file is run.
Macro viruses: infect documents and spreadsheets that support macros.
Boot sector viruses: infect the master boot record of a storage device.
Ransomware: encrypts files and demands payment for decryption.
There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.
Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.
Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.
Application firewalls filter traffic at the application layer of the OSI model an...
One well-known cyber-attack is the WannaCry ransomware attack.
WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.
The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.
WannaCry was attributed to North Korea by various security experts and agencies.
Top trending discussions
I was interviewed in Jan 2025.
I was interviewed in Jan 2025.
A sequence was provided: 4181, 2684, 1597, 987, 610.
first 2 are given and write code for other value calculation using java 8
The second question required writing a reverse of a palindrome using both Java 8 streams. I was able to successfully write both and clear the first round.
Java 17 introduces sealed classes to restrict inheritance and improve code maintainability.
Sealed classes are declared using the 'sealed' keyword followed by the permitted subclasses.
Subclasses of a sealed class must be either final or sealed themselves.
Errors may occur when trying to extend a sealed class with a non-permitted subclass.
Implementation of 'notify me if item is back in stock' feature in an ecommerce application
Create a database table to store user notifications for out-of-stock items
Implement a service to check item availability and send notifications to subscribed users
Provide a user interface for users to subscribe to notifications for specific items
based on 12 interviews
Interview experience
based on 77 reviews
Rating in categories
Information Security Consultant
26
salaries
| βΉ2.8 L/yr - βΉ9.5 L/yr |
Associate Consultant
24
salaries
| βΉ2.5 L/yr - βΉ5.8 L/yr |
Associate Information Security Consultant
14
salaries
| βΉ2.5 L/yr - βΉ5.5 L/yr |
Consultant
6
salaries
| βΉ5.5 L/yr - βΉ8.5 L/yr |
Information Security Analyst
6
salaries
| βΉ2.2 L/yr - βΉ5.5 L/yr |
TCS
Infosys
Wipro
HCLTech