i
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
Insecure deserialization can occur in various places such as web applications, APIs, and network services.
Web applications that accept user input and deserialize it without proper validation
APIs that deserialize data from external sources without proper security measures
Network services that deserialize data from untrusted sources
To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.
Analyze the program's memory usage to identify any unexpected changes or overflows
Check for abnormal behavior such as crashes, unexpected output, or system instability
Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer overflow
...
Top trending discussions
posted on 7 May 2017
I was interviewed in Feb 2017.
I was interviewed in Sep 2017.
I applied via Campus Placement and was interviewed before Oct 2020. There were 4 interview rounds.
TCP-IP model has 4 layers: Application, Transport, Internet, and Network Interface.
Application layer deals with user interface and application protocols (HTTP, FTP, SMTP, etc.)
Transport layer provides end-to-end data transfer and error recovery (TCP, UDP)
Internet layer handles routing and addressing (IP)
Network Interface layer deals with physical network connection (Ethernet, Wi-Fi, etc.)
Malware refers to any software designed to harm or exploit any device or network.
Malware is a broad term that includes viruses, worms, trojans, ransomware, spyware, adware, and more.
Viruses are malicious programs that replicate themselves and infect other files on the device.
Worms are self-replicating malware that spread through networks.
Trojans are disguised as legitimate software but contain malicious code.
Ransomware...
posted on 7 Jul 2017
posted on 3 Sep 2017
I was interviewed in Sep 2017.
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular wait, where each process is waiting for a resource held by another process.
Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Example: Process A holds resource X a...
I have experience with various technologies including Java, Python, HTML/CSS, JavaScript, and SQL.
Java
Python
HTML/CSS
JavaScript
SQL
I am looking for a change to explore new opportunities and challenges. My notice period is 30 days.
Seeking new opportunities and challenges
Want to learn and grow in a different environment
Exploring better career prospects
Seeking a company with a better work-life balance
Notice period is 30 days
I applied via Campus Placement and was interviewed in May 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed before Sep 2020. There were 4 interview rounds.
based on 1 interview
Interview experience
Consultant
339
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
244
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
207
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Consultant
110
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Consultant
84
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security