i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
SAST stands for Static Application Security Testing and DAST stands for Dynamic Application Security Testing.
SAST involves analyzing the application's source code or binary code for security vulnerabilities without executing the code.
DAST involves testing the application while it is running to identify security vulnerabilities by sending malicious input.
SAST is typically performed earlier in the development cycle while...
Union-based SQL injection is a type of attack that allows an attacker to extract information from a database by using the UNION SQL operator.
Union-based SQL injection involves injecting a malicious SQL query that uses the UNION operator to combine the results of the original query with the attacker's query.
The attacker can use the UNION operator to retrieve data from other tables in the database, potentially accessing ...
IDOR, DOM XSS, and Nessus are common security vulnerabilities and tools used in penetration testing.
IDOR stands for Insecure Direct Object Reference, where an attacker can access unauthorized data by manipulating object references.
DOM XSS (Cross-Site Scripting) is a type of XSS attack that occurs in the Document Object Model.
Nessus is a popular vulnerability scanner used in penetration testing to identify security vuln
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
XSS (Cross-Site Scripting) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be used to steal sensitive information, such as login credentials or personal data.
Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.
There are three types of XSS attacks: stored, reflected, and DO...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
Reflected XSS: The injected script is embedded in the URL and executed when the victim visits the manipulated link.
Stored XSS: The injected script is permanently stored on the target server and executed whenever the vulnerable page is accessed.
DOM-based XSS: The vulnerability aris...
Network VAPT is conducted by identifying vulnerabilities in the network and testing its security measures.
The process involves identifying potential vulnerabilities in the network infrastructure
Penetration testing is conducted to simulate attacks and test the effectiveness of security measures
Vulnerability assessment is done to identify weaknesses in the network
The results are analyzed and recommendations are made to i...
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Custom Django admin commands can be written to perform specific tasks in the Django admin interface.
Create a management/commands directory inside your Django app directory
Create a Python file for your custom command inside the management/commands directory
Define a class that extends BaseCommand and implement the handle method to execute the command logic
Register the custom command in the Django admin interface by addin
Few basics of java
Dsa question
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
I am a dedicated and detail-oriented Junior Engineer with a passion for problem-solving and continuous learning.
Graduated with a degree in Engineering from XYZ University
Completed internships at ABC Company, gaining hands-on experience in project management
Proficient in CAD software and technical drawing
Water treatment involves a series of processes to remove impurities and make water safe for consumption.
Water treatment typically involves processes such as coagulation, sedimentation, filtration, and disinfection.
Coagulation involves adding chemicals to water to make particles clump together for easier removal.
Sedimentation allows the larger particles to settle at the bottom of a tank.
Filtration involves passing water...
I want to join because I am passionate about engineering and eager to learn and grow in a dynamic environment.
Passionate about engineering
Eager to learn and grow
Excited about working in a dynamic environment
I applied via Naukri.com and was interviewed in Feb 2024. There were 3 interview rounds.
Code test on Codility
NodeJs handles concurrency using event-driven, non-blocking I/O model.
NodeJs uses event loop to handle multiple requests concurrently.
It utilizes asynchronous functions to avoid blocking the main thread.
NodeJs supports callbacks, promises, and async/await for managing asynchronous operations.
I was interviewed in Dec 2023.
Angular lifecycle hooks are methods that allow you to tap into specific points in a component's lifecycle.
ngOnChanges: called when an input property changes
ngOnInit: called once the component is initialized
ngDoCheck: called during every change detection run
ngAfterContentInit: called after content (ng-content) has been projected into the component
ngAfterContentChecked: called after every check of the projected content
ng...
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 4 interview rounds.
Mix of coding, aptitude, java, javascript
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
If multiple keys hash to the same index, a collision occurs and the pairs are stored in a linked list at that index.
To...
I have used design patterns such as Singleton, Factory, and Observer in my projects.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and
Print Fibonacci series using recursion
Define a recursive function to calculate Fibonacci numbers
Base case: return 0 if n is 0, return 1 if n is 1
Recursive case: return sum of previous two Fibonacci numbers
Print each Fibonacci number in the series
posted on 6 Jun 2024
Services in Drupal are reusable objects that perform specific functions, such as database queries or sending emails.
Services are defined in YAML files and can be accessed throughout a Drupal site.
They are used to encapsulate reusable functionality and promote code reusability.
Examples of services in Drupal include the database service for interacting with the database, the mail service for sending emails, and the logge
Debugging in Drupal involves using tools like Devel module, watchdog(), and error logs.
Enable Devel module for debugging information
Use watchdog() function to log messages to Drupal's watchdog log
Check error logs for PHP errors and warnings
Use dpm() function to print variables for debugging purposes
Consultant
32.8k
salaries
| ₹6.2 L/yr - ₹23 L/yr |
Senior Consultant
20.9k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
13.9k
salaries
| ₹3.8 L/yr - ₹12.6 L/yr |
Assistant Manager
9.9k
salaries
| ₹7.6 L/yr - ₹24 L/yr |
Manager
7k
salaries
| ₹15.7 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant