i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
SAST stands for Static Application Security Testing and DAST stands for Dynamic Application Security Testing.
SAST involves analyzing the application's source code or binary code for security vulnerabilities without executing the code.
DAST involves testing the application while it is running to identify security vulnerabilities by sending malicious input.
SAST is typically performed earlier in the development cycle while...
Union-based SQL injection is a type of attack that allows an attacker to extract information from a database by using the UNION SQL operator.
Union-based SQL injection involves injecting a malicious SQL query that uses the UNION operator to combine the results of the original query with the attacker's query.
The attacker can use the UNION operator to retrieve data from other tables in the database, potentially accessing ...
IDOR, DOM XSS, and Nessus are common security vulnerabilities and tools used in penetration testing.
IDOR stands for Insecure Direct Object Reference, where an attacker can access unauthorized data by manipulating object references.
DOM XSS (Cross-Site Scripting) is a type of XSS attack that occurs in the Document Object Model.
Nessus is a popular vulnerability scanner used in penetration testing to identify security vuln
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
XSS (Cross-Site Scripting) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be used to steal sensitive information, such as login credentials or personal data.
Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.
There are three types of XSS attacks: stored, reflected, and DO...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
Reflected XSS: The injected script is embedded in the URL and executed when the victim visits the manipulated link.
Stored XSS: The injected script is permanently stored on the target server and executed whenever the vulnerable page is accessed.
DOM-based XSS: The vulnerability aris...
Network VAPT is conducted by identifying vulnerabilities in the network and testing its security measures.
The process involves identifying potential vulnerabilities in the network infrastructure
Penetration testing is conducted to simulate attacks and test the effectiveness of security measures
Vulnerability assessment is done to identify weaknesses in the network
The results are analyzed and recommendations are made to i...
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Django applies migrations to the database using the 'manage.py migrate' command.
Django tracks changes to models and generates migration files accordingly.
The 'manage.py makemigrations' command creates migration files based on model changes.
The 'manage.py migrate' command applies the generated migration files to the database.
Migrations help keep the database schema in sync with the changes in Django models.
Hoisting in JavaScript is the behavior where variable and function declarations are moved to the top of their containing scope during the compilation phase.
Variable declarations are hoisted to the top of their scope, but not their assignments.
Function declarations are fully hoisted, meaning they can be called before they are declared.
Hoisting can lead to unexpected behavior if not understood properly.
Create a full stack application in 3 days.
Inheritance is a way to create a new class using properties and methods of an existing class, while polymorphism allows objects of different classes to be treated as objects of a common superclass.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Inheritance promotes code reusability and reduce...
Code to check if two strings are anagrams
Create a function that takes in two strings as input
Convert both strings to lowercase and remove any spaces
Sort both strings and compare if they are equal to determine if they are anagrams
Few basics of java
Dsa question
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
I am a dedicated and detail-oriented Junior Engineer with a passion for problem-solving and continuous learning.
Graduated with a degree in Engineering from XYZ University
Completed internships at ABC Company, gaining hands-on experience in project management
Proficient in CAD software and technical drawing
Water treatment involves a series of processes to remove impurities and make water safe for consumption.
Water treatment typically involves processes such as coagulation, sedimentation, filtration, and disinfection.
Coagulation involves adding chemicals to water to make particles clump together for easier removal.
Sedimentation allows the larger particles to settle at the bottom of a tank.
Filtration involves passing water...
I want to join because I am passionate about engineering and eager to learn and grow in a dynamic environment.
Passionate about engineering
Eager to learn and grow
Excited about working in a dynamic environment
I applied via Naukri.com and was interviewed in Feb 2024. There were 3 interview rounds.
Code test on Codility
NodeJs handles concurrency using event-driven, non-blocking I/O model.
NodeJs uses event loop to handle multiple requests concurrently.
It utilizes asynchronous functions to avoid blocking the main thread.
NodeJs supports callbacks, promises, and async/await for managing asynchronous operations.
Dsa questions like search sort
I was interviewed in Dec 2023.
Angular lifecycle hooks are methods that allow you to tap into specific points in a component's lifecycle.
ngOnChanges: called when an input property changes
ngOnInit: called once the component is initialized
ngDoCheck: called during every change detection run
ngAfterContentInit: called after content (ng-content) has been projected into the component
ngAfterContentChecked: called after every check of the projected content
ng...
Interview experience
Consultant
33k
salaries
| ₹6.2 L/yr - ₹23 L/yr |
Senior Consultant
20.7k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
14k
salaries
| ₹3.7 L/yr - ₹12.4 L/yr |
Assistant Manager
10k
salaries
| ₹7.8 L/yr - ₹24 L/yr |
Manager
7k
salaries
| ₹15.8 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant