i
Canada PR Avenue
Filter interviews by
Be the first one to contribute and help others!
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
posted on 12 Jul 2024
I applied via LinkedIn and was interviewed in Oct 2024. There was 1 interview round.
Sorting algorithms,many real time scenario questions
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 2 interview rounds.
posted on 7 Oct 2024
I would like to work in this company because of its strong reputation, innovative products, and opportunities for growth.
I am impressed by the company's reputation in the industry and its commitment to excellence.
I am excited about the opportunity to work with innovative products and contribute to their success.
I see great potential for growth and advancement within the company, which aligns with my career goals.
I applied via LinkedIn
Basic content assignment
posted on 22 Apr 2024
The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.
Identify the scope of the test and the target systems
Perform reconnaissance to gather information about the target
Test for common vulnerabilities such as SQL injection and cross-site scripting
Test for exploits to determine the impact of vulnerabilities
Report findings and provide recommend
CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.
CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.
They are generated by the server and included in forms or URLs to verify the authenticity of the request.
Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...
OWASP vulnerabilities commonly encountered in security analysis
Injection flaws (SQL, LDAP, OS command, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
Using components with known vulnerabilities
Insecure communication (e.g. lack of encryption)
Broken access control
XML External Entities (XXE)
posted on 16 Jan 2025
I applied via LinkedIn and was interviewed before Jan 2024. There were 3 interview rounds.
Based on new tech development in agri industry
based on 1 review
Rating in categories
Stirring Minds
Flair Writing Instruments
Ascent Meditech
Ketsaal Retails