i
Filter interviews by
I applied via LinkedIn and was interviewed before Sep 2022. There were 4 interview rounds.
Just basic knowledge of your profile
OWASP Top 10 is a list of the top 10 most critical security risks for web, API, and mobile applications.
Injection: SQL injection, NoSQL injection, Command injection
Broken Authentication: Weak passwords, Session management issues
Sensitive Data Exposure: Insecure data storage, Lack of encryption
XML External Entities (XXE): Parsing XML input from untrusted sources
Broken Access Control: Unauthorized access to resources
Secu...
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.
Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.
The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.
Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
posted on 13 Oct 2022
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
posted on 3 Feb 2021
I applied via Recruitment Consultant
I was interviewed in Jan 2021.
I applied via Recruitment Consultant and was interviewed in Nov 2019. There were 3 interview rounds.
posted on 14 May 2018
I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.
The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.
ASA firewall has security levels assigned to interfaces to control traffic flow
The 8.3 version of ASA introduced significant changes in NAT configuration
Transparent mode firewall operates at Layer 2 and d...
based on 14 reviews
Rating in categories
Consultant
324
salaries
| ₹5.6 L/yr - ₹19 L/yr |
Senior Consultant
242
salaries
| ₹9 L/yr - ₹27 L/yr |
Associate Consultant
219
salaries
| ₹2.2 L/yr - ₹10.1 L/yr |
Security Consultant
123
salaries
| ₹5 L/yr - ₹13.3 L/yr |
Lead Consultant
79
salaries
| ₹14.4 L/yr - ₹36 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security