Add office photos
Employer?
Claim Account for FREE

Cumulus Systems

3.9
based on 31 Reviews
Filter interviews by

10+ Kirti Solar Interview Questions and Answers

Updated 2 Sep 2024

Q1. What is vulnerability management? How do Vulnerability scanners work? What is OWASP top 10? What is SQL injection? How to mitigate SQLi attacks? What is XSS? How to mitigate XSS attacks? What is MITRE framework...

read more
Ans.

Vulnerability management involves identifying, evaluating, and mitigating security vulnerabilities. Vulnerability scanners scan systems for known vulnerabilities. OWASP top 10 lists common web application security risks. SQL injection and XSS are common attack types. MITRE framework provides a structured approach to cybersecurity. Cyber-kill chain outlines the stages of a cyber attack. Malware analysis involves examining malware behavior. EDR and XDR are endpoint detection an...read more

Add your answer

Q2. What is SQL injection? What can be the way to mitigate this vulnerability?

Ans.

SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a database-driven application.

  • SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate or extract data from the database.

  • It can lead to unauthorized access, data breaches, data manipulation, or even complete system compromise.

  • To mitigate SQL injection, use parameterized queries or prepared statements to ensure input is properly sanitiz...read more

View 1 answer

Q3. What is XSS? How to to mitigate this vulnerability?

Ans.

XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • XSS attacks can be mitigated by input validation and output encoding.

  • Input validation involves checking user input for malicious code and rejecting it if found.

  • Output encoding involves converting special characters to their HTML entity equivalents to prevent them from being interpreted as code.

  • Using a Content Securi...read more

Add your answer

Q4. What are the OWASP top 10 vulnerabilities?

Ans.

OWASP top 10 vulnerabilities are the most critical web application security risks.

  • Injection flaws (SQL, NoSQL, OS)

  • Broken authentication and session management

  • Cross-site scripting (XSS)

  • Broken access control

  • Security misconfiguration

  • Insecure cryptographic storage

  • Insufficient logging and monitoring

  • Insecure communication

  • Using components with known vulnerabilities

  • Insufficient attack protection

Add your answer
Discover Kirti Solar interview dos and don'ts from real experiences

Q5. What is the difference between EDR and Antivirus?

Ans.

EDR is a proactive approach to threat detection and response, while antivirus is a reactive approach to threat prevention.

  • EDR focuses on detecting and responding to threats in real-time, while antivirus focuses on preventing known threats from infecting a system.

  • EDR uses behavioral analysis and machine learning to identify suspicious activity, while antivirus relies on signature-based detection.

  • EDR provides more detailed information about the nature of a threat and its impact...read more

View 1 answer

Q6. Port numbers of different protocols ?

Ans.

Port numbers for different protocols used in networking.

  • HTTP - 80

  • HTTPS - 443

  • FTP - 20, 21

  • SSH - 22

  • SMTP - 25

  • DNS - 53

  • POP3 - 110

  • IMAP - 143

  • LDAP - 389

  • RDP - 3389

Add your answer
Are these interview questions helpful?

Q7. What is CSRF?

Ans.

CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing an action on another website without their knowledge or consent.

  • CSRF attacks exploit the trust that a website has in a user's browser

  • Attackers can use CSRF to perform actions such as changing a user's password or making unauthorized purchases

  • Preventing CSRF involves using techniques such as CSRF tokens and same-site cookies

Add your answer

Q8. What is IPsec and explain

Ans.

IPsec stands for Internet Protocol Security, a protocol suite used to secure Internet Protocol (IP) communications.

  • IPsec provides authentication, integrity, and confidentiality for data transmitted over a network.

  • It can be used to create Virtual Private Networks (VPNs) to securely connect remote offices or users.

  • IPsec operates at the network layer of the OSI model and can be implemented through various protocols such as AH and ESP.

  • It is commonly used to secure communication b...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is Firewalls

Ans.

Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

  • Firewalls act as a barrier between a trusted internal network and untrusted external networks.

  • They can be hardware-based or software-based.

  • Firewalls can filter traffic based on IP addresses, ports, protocols, and applications.

  • Examples of firewalls include Cisco ASA, Palo Alto Networks, and pfSense.

Add your answer

Q10. 1. Implement queue using stack 2. Remove duplicates from a linked list

Ans.

Implement queue using stack & remove duplicates from linked list

  • To implement queue using stack, we need to maintain two stacks. One for enqueue operation and another for dequeue operation.

  • To remove duplicates from a linked list, we can use a hash table to keep track of visited nodes and remove duplicates as we traverse the list.

  • Alternatively, we can use two pointers to compare each node with all subsequent nodes and remove duplicates.

Add your answer

Q11. 2 dsa problems 1. Reverse a singly linked list 2. Find pairs in an array which sums to given sum

Ans.

Two common DSA problems - reversing a singly linked list and finding pairs in an array that sum to a given value.

  • To reverse a singly linked list, iterate through the list and change the direction of the pointers.

  • To find pairs in an array that sum to a given value, use a hash table to store the difference between the target sum and each element in the array, then check if any subsequent elements match the stored differences.

  • Both problems have time complexity of O(n).

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top Cumulus Systems Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter