Faster and better experience!
i
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.
Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.
The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.
Blind SQL Injection can be time-based or boolean-based.
Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...
PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.
PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.
IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...
Top trending discussions
I applied via Referral and was interviewed in Oct 2021. There were 3 interview rounds.
posted on 3 Feb 2021
I applied via Recruitment Consultant
I applied via Campus Placement and was interviewed before Jun 2021. There were 3 interview rounds.
Be prepared of general knowledge
Be prepared for data interpretation
I applied via Campus Placement and was interviewed before Sep 2020. There were 5 interview rounds.
I appeared for an interview in Jan 2021.
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.
Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.
The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.
Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...
I applied via Campus Placement and was interviewed in Nov 2020. There were 5 interview rounds.
The right key is the switch that is turned on.
The bulb will only turn on if the switch that controls it is turned on.
Since you can only enter the room once, you need to determine which switch is turned on without entering the room.
You can try each switch one by one and observe if the bulb turns on or not.
The logic used for filtering odd numbers is to check if the number is not divisible by 2.
Check if the number modulo 2 is not equal to 0
If the remainder is not 0, then the number is odd
Example: 3 % 2 = 1, so 3 is an odd number
based on 2 interviews
Interview experience
based on 7 reviews
Rating in categories
Consultant
328
salaries
| ₹4.3 L/yr - ₹18 L/yr |
Senior Consultant
255
salaries
| ₹9 L/yr - ₹26.9 L/yr |
Associate Consultant
223
salaries
| ₹2.2 L/yr - ₹10 L/yr |
Security Consultant
127
salaries
| ₹5 L/yr - ₹14 L/yr |
Lead Consultant
85
salaries
| ₹14.4 L/yr - ₹36 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland