Deloitte
Right Logistics Pvt Ltd Interview Questions and Answers
Q1. How do you connect multi VPC without the use of a transit gateway?
Multi VPCs can be connected using VPC peering or VPN connections.
VPC peering allows direct communication between VPCs using private IP addresses.
VPN connections can be established between VPCs using virtual private gateways.
Routing tables need to be updated to allow traffic flow between VPCs.
Security groups and network ACLs need to be configured to allow traffic between VPCs.
AWS Transit Gateway can also be used to connect multiple VPCs.
VPC peering and VPN connections have lim...read more
Q2. Does parameterized querry solves the sql injection problem?
Parameterized queries can prevent SQL injection attacks.
Parameterized queries use placeholders for user input, preventing malicious SQL code injection.
They are more secure than concatenating user input into SQL statements.
Example: SELECT * FROM users WHERE username = ? AND password = ?
The question marks are replaced with user input, preventing SQL injection.
Q3. How can you exploit a jboss based application?
Exploiting a JBoss based application
Exploit known vulnerabilities in JBoss and its components
Use brute force attacks to guess weak passwords
Perform SQL injection attacks to gain access to the database
Use cross-site scripting (XSS) attacks to inject malicious code
Exploit misconfigured security settings
Use social engineering to trick users into revealing sensitive information
Perform man-in-the-middle attacks to intercept and modify network traffic
Use remote code execution (RCE)...read more
Q4. What is dns protocol?
DNS protocol is used to translate domain names into IP addresses.
DNS stands for Domain Name System
It is responsible for resolving domain names to IP addresses
DNS uses a hierarchical system of servers to perform this translation
DNS queries can be cached to improve performance
Examples of DNS servers include Google DNS and OpenDNS
Q5. What is ICMP port number?
ICMP does not have a port number.
ICMP is a protocol that operates at the network layer of the OSI model.
It is used for error reporting, network congestion control, and other purposes.
Unlike TCP and UDP, ICMP does not have a port number.
Instead, it uses message types and codes to communicate information.
Q6. Lfi,rfi and path traversal difference?
LFI, RFI, and Path Traversal are all types of web application vulnerabilities.
LFI (Local File Inclusion) is a vulnerability that allows an attacker to include files on a server through the web application.
RFI (Remote File Inclusion) is a vulnerability that allows an attacker to include files from a remote server through the web application.
Path Traversal is a vulnerability that allows an attacker to access files outside of the web application's root directory.
All three vulner...read more
More about working at Deloitte
Top HR Questions asked in Right Logistics Pvt Ltd
Interview Process at Right Logistics Pvt Ltd
Reviews
Interviews
Salaries
Users/Month