i
Filter interviews by
Clear (1)
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.
Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.
The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.
Blind SQL Injection can be time-based or boolean-based.
Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...
PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.
PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.
IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...
Top trending discussions
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be prevented by properly validating and sanitizing user input.
Developers should also use output encoding to prevent malicious scripts from being executed.
Using Content Security Policy (CSP) can also help prevent XSS attacks.
Examples of XSS att...
CSRF stands for Cross-Site Request Forgery. It is a type of attack that tricks a user into performing an action they did not intend to.
CSRF occurs when a malicious website or email tricks a user into clicking a link or button that performs an action on a different website where the user is already authenticated.
To prevent CSRF attacks, websites can use techniques such as CSRF tokens, which are unique values generated f...
posted on 15 Jun 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
posted on 19 May 2024
I applied via LinkedIn and was interviewed before May 2023. There were 3 interview rounds.
posted on 5 Feb 2023
I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 2 interview rounds.
To reset a password protected BIOS configuration, you can use various methods such as removing the CMOS battery, using a BIOS reset jumper, or using manufacturer-specific software.
Remove the CMOS battery from the motherboard for a few minutes to reset the BIOS settings.
Locate the BIOS reset jumper on the motherboard and move it to the reset position for a few seconds.
Use manufacturer-specific software or tools to reset...
DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
DNS stands for Domain Name System.
It translates domain names into IP addresses.
DNS servers help in resolving domain names to their corresponding IP addresses.
They play a crucial role in the functioning of the internet.
DNS servers use a hierarchical structure for efficient name resolution.
They use different typ...
XSS attack is a type of web vulnerability where attackers inject malicious scripts into trusted websites to steal sensitive information or perform unauthorized actions.
XSS stands for Cross-Site Scripting.
Attackers exploit vulnerabilities in web applications to inject malicious scripts.
These scripts are then executed by unsuspecting users visiting the compromised website.
XSS attacks can be classified into three types: s...
The type of data stored in OSI Model Data Link Layer is the frame or packet.
The Data Link Layer is responsible for the physical transmission of data between network nodes.
It encapsulates the network layer packet into a frame with additional control information.
Examples of data stored in this layer include Ethernet frames, MAC addresses, and error detection codes.
MITM Attack is a type of cyber attack where an attacker intercepts communication between two parties to gain unauthorized access or steal information.
MITM stands for Man-in-the-Middle.
The attacker positions themselves between the sender and receiver to intercept and manipulate the communication.
Disadvantages of MITM attacks include unauthorized access to sensitive information, data theft, and potential for further expl...
SSL and TLS are cryptographic protocols used to secure communication over the internet.
SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.
SSL is the predecessor of TLS.
Both protocols provide encryption and authentication for secure communication.
TLS is considered more secure than SSL.
SSL uses a combination of symmetric and asymmetric encryption, while TLS primarily uses symmetric encryption...
posted on 4 Jun 2020
I was interviewed before Feb 2021.
I applied via LinkedIn and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2022. There were 2 interview rounds.
based on 2 interviews
Interview experience
based on 6 reviews
Rating in categories
Consultant
339
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
244
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
207
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Consultant
110
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Consultant
84
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security