i
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
Insecure deserialization can occur in various places such as web applications, APIs, and network services.
Web applications that accept user input and deserialize it without proper validation
APIs that deserialize data from external sources without proper security measures
Network services that deserialize data from untrusted sources
To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.
Analyze the program's memory usage to identify any unexpected changes or overflows
Check for abnormal behavior such as crashes, unexpected output, or system instability
Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer overflow
...
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.
Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.
The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.
Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
posted on 13 Oct 2022
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
posted on 3 Feb 2021
I applied via Recruitment Consultant
I was interviewed in Jan 2021.
I applied via Recruitment Consultant and was interviewed in Nov 2019. There were 3 interview rounds.
posted on 14 May 2018
I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.
The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.
ASA firewall has security levels assigned to interfaces to control traffic flow
The 8.3 version of ASA introduced significant changes in NAT configuration
Transparent mode firewall operates at Layer 2 and d...
I want to join Microland because of its reputation for innovation and growth. I can join within two weeks.
I am impressed by Microland's track record of providing cutting-edge solutions in the IT industry.
I am excited about the opportunity to work with a team of talented professionals at Microland.
I believe my skills and experience align well with the challenges and opportunities at Microland.
I can join within two weeks
based on 1 interview
Interview experience
Consultant
317
salaries
| ₹4.3 L/yr - ₹18.1 L/yr |
Senior Consultant
241
salaries
| ₹9 L/yr - ₹28 L/yr |
Associate Consultant
208
salaries
| ₹2.2 L/yr - ₹10 L/yr |
Security Consultant
110
salaries
| ₹5.5 L/yr - ₹15.5 L/yr |
Lead Consultant
81
salaries
| ₹14.4 L/yr - ₹36 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security