i
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
Insecure deserialization can occur in various places such as web applications, APIs, and network services.
Web applications that accept user input and deserialize it without proper validation
APIs that deserialize data from external sources without proper security measures
Network services that deserialize data from untrusted sources
To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.
Analyze the program's memory usage to identify any unexpected changes or overflows
Check for abnormal behavior such as crashes, unexpected output, or system instability
Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer overflow
...
Top trending discussions
I applied via Referral and was interviewed in Oct 2021. There were 3 interview rounds.
I applied via Referral and was interviewed before Jul 2021. There was 1 interview round.
DataWindow is a GUI control in PowerBuilder used to display and manipulate data from a database.
DataWindow can be used to retrieve data from a database, display it in a tabular format, and allow users to edit the data.
It supports various data sources such as SQL, ODBC, and XML.
DataWindow can also be used to create reports and graphs.
It provides various features such as sorting, filtering, grouping, and computed columns...
To create a file server, you need to set up a dedicated computer or network-attached storage (NAS) device to store and share files.
Choose a computer or NAS device with enough storage capacity for your needs
Install a file server software such as Windows Server or Linux-based Samba
Configure the software to create shared folders and set access permissions
Connect clients to the file server using network protocols such as S...
I applied via Naukri.com and was interviewed in Jun 2020. There were 3 interview rounds.
A domain is a group of computers, devices, or resources that share a common network identity.
Domains are used in computer networking to organize and manage resources.
A domain can be a local network or a larger network like the internet.
Domains are often used in conjunction with domain name systems (DNS) to assign unique names to resources.
Domains can also be used to manage security and access control for resources.
Exam...
LAN stands for Local Area Network. It is a computer network that connects devices within a limited area such as a home, office, or building.
LAN is a type of network that is used to connect devices within a limited area.
It is commonly used in homes, offices, and buildings.
LAN can be wired or wireless.
It allows devices to share resources such as printers, files, and internet access.
Examples of LAN technologies include Et
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automating the IP address assignment process.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also provide additional network configuration information, such as DNS and gateway setting...
I appeared for an interview in Oct 2020.
posted on 18 May 2021
I applied via Naukri.com and was interviewed in Nov 2020. There were 4 interview rounds.
I appeared for an interview in Sep 2017.
posted on 7 Jul 2017
posted on 3 Sep 2017
I appeared for an interview in Sep 2017.
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular wait, where each process is waiting for a resource held by another process.
Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Example: Process A holds resource X a...
I have experience with various technologies including Java, Python, HTML/CSS, JavaScript, and SQL.
Java
Python
HTML/CSS
JavaScript
SQL
I am looking for a change to explore new opportunities and challenges. My notice period is 30 days.
Seeking new opportunities and challenges
Want to learn and grow in a different environment
Exploring better career prospects
Seeking a company with a better work-life balance
Notice period is 30 days
based on 1 interview
Interview experience
Consultant
328
salaries
| ₹4.3 L/yr - ₹18 L/yr |
Senior Consultant
261
salaries
| ₹9 L/yr - ₹27 L/yr |
Associate Consultant
223
salaries
| ₹2.2 L/yr - ₹10 L/yr |
Security Consultant
127
salaries
| ₹5 L/yr - ₹14 L/yr |
Lead Consultant
85
salaries
| ₹14.4 L/yr - ₹36 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland