i
Filter interviews by
Clear (1)
I applied via LinkedIn and was interviewed before Sep 2022. There were 4 interview rounds.
Just basic knowledge of your profile
OWASP Top 10 is a list of the top 10 most critical security risks for web, API, and mobile applications.
Injection: SQL injection, NoSQL injection, Command injection
Broken Authentication: Weak passwords, Session management issues
Sensitive Data Exposure: Insecure data storage, Lack of encryption
XML External Entities (XXE): Parsing XML input from untrusted sources
Broken Access Control: Unauthorized access to resources
Secu...
Top trending discussions
posted on 14 Aug 2022
I applied via Approached by Company and was interviewed in Oct 2022. There were 3 interview rounds.
General computer knowledge test
Program writing in computer basic ideas
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be prevented by properly validating and sanitizing user input.
Developers should also use output encoding to prevent malicious scripts from being executed.
Using Content Security Policy (CSP) can also help prevent XSS attacks.
Examples of XSS att...
CSRF stands for Cross-Site Request Forgery. It is a type of attack that tricks a user into performing an action they did not intend to.
CSRF occurs when a malicious website or email tricks a user into clicking a link or button that performs an action on a different website where the user is already authenticated.
To prevent CSRF attacks, websites can use techniques such as CSRF tokens, which are unique values generated f...
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
posted on 15 Jun 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
I applied via Company Website and was interviewed before Aug 2022. There were 2 interview rounds.
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.
It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.
Subnet masks are used to determine which part of an IP ad...
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers are typically used to connect different networks, such as a home netw...
based on 1 interview
Interview experience
based on 17 reviews
Rating in categories
Consultant
339
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
244
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
207
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Consultant
110
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Consultant
84
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security