i
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
Insecure deserialization can occur in various places such as web applications, APIs, and network services.
Web applications that accept user input and deserialize it without proper validation
APIs that deserialize data from external sources without proper security measures
Network services that deserialize data from untrusted sources
To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.
Analyze the program's memory usage to identify any unexpected changes or overflows
Check for abnormal behavior such as crashes, unexpected output, or system instability
Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer overflow
...
posted on 26 Jul 2024
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I am interested in working from the Mumbai location due to the vibrant work culture and opportunities for growth.
Exciting work culture in Mumbai
Opportunities for growth and development
Proximity to key clients and projects
Networking opportunities in a major business hub
Many scenario based questions, and how to handle team, customers and peers
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
Nessus security tool provides vulnerability scanning and assessment capabilities for network security.
Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.
It can identify misconfigurations, missing patches, and potential security threats.
Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.
Privilege in Windows and Linux refers to the level of access and control a user or process has over system resources.
Privilege levels in Windows are typically categorized as Administrator, Standard User, and Guest.
In Linux, privilege levels are determined by user accounts and groups, with root being the highest level of privilege.
Windows uses User Account Control (UAC) to manage privileges and prevent unauthorized chan...
Port 443 is used for secure HTTP (HTTPS) communication over the internet.
Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.
It is commonly used for secure communication between web browsers and servers.
HTTPS ensures that data transmitted over the internet is encrypted and secure.
Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive informa
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Aujas Cybersecurity-NuSummit company interview questions for popular designations
I applied via Approached by Company and was interviewed in Feb 2023. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There were 3 interview rounds.
I appeared for an interview before Sep 2022.
I applied via Company Website and was interviewed in May 2021. There was 1 interview round.
Top trending discussions
The duration of Aujas Cybersecurity-NuSummit company interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 8 interviews
Interview experience
based on 268 reviews
Rating in categories
6-8 Yrs
Not Disclosed
8-10 Yrs
Not Disclosed
11-13 Yrs
Not Disclosed
Consultant
331
salaries
| ₹4.3 L/yr - ₹19.1 L/yr |
Senior Consultant
254
salaries
| ₹9 L/yr - ₹26.9 L/yr |
Associate Consultant
222
salaries
| ₹2.2 L/yr - ₹10 L/yr |
Security Consultant
128
salaries
| ₹5 L/yr - ₹14 L/yr |
Lead Consultant
85
salaries
| ₹14.4 L/yr - ₹36 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland