Filter interviews by
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
Encryption and encoding are both methods of transforming data, but encryption is more secure and reversible.
Encryption is the process of converting data into a secret code to protect its confidentiality, integrity, and authenticity.
Encoding is the process of converting data into a different format for transmission or storage purposes.
Encryption uses a key to scramble the data, while encoding does not.
Examples of encryp...
XSS and SQLi are common web application vulnerabilities. XSS allows attackers to inject malicious scripts, while SQLi allows them to manipulate database queries.
XSS (Cross-Site Scripting) is a vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
There are three types of XSS: Stored XSS, Reflected XSS, and DOM-based XSS.
Stored XSS occurs when the malicious script is perman...
Black box testing involves testing an application without knowledge of its internal workings.
Identify inputs and expected outputs
Test for boundary conditions and error handling
Use techniques like equivalence partitioning and decision tables
Focus on user interface and user experience
Use automated tools for efficiency
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Allows attackers to access sensitive data
Can modify or delete data
Can execute commands on the server
Can be prevented by input validation and parameterized queries
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Attackers use SQL injection to gain unauthorized access to sensitive data or to modify or delete data in a database.
SQL injection can be prevented by using parameterized queries, input validation, and proper error handling.
Example: An attacker could use SQL injection to bypass login credentials and gain acc...
posted on 21 Jun 2024
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Allows attackers to access sensitive data
Can modify or delete data
Can execute commands on the server
Can be prevented by input validation and parameterized queries
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Attackers use SQL injection to gain unauthorized access to sensitive data or to modify or delete data in a database.
SQL injection can be prevented by using parameterized queries, input validation, and proper error handling.
Example: An attacker could use SQL injection to bypass login credentials and gain acc...
I applied via Company Website and was interviewed in Oct 2020. There were 3 interview rounds.
nmap is a network exploration and security auditing tool. It works by sending packets to target hosts and analyzing the responses.
nmap uses various scanning techniques such as TCP SYN scan, UDP scan, etc.
It can detect open ports, services running on those ports, and operating system information.
nmap can also perform vulnerability scanning and version detection.
To recreate a similar tool, one would need to have a good u...
Some of the top questions asked at the eClinicalWorks Security Analyst interview -
based on 1 interview
Interview experience
based on 5 reviews
Rating in categories
Software Specialist
503
salaries
| ₹2 L/yr - ₹11 L/yr |
Strategic Account Manager
224
salaries
| ₹3.2 L/yr - ₹10 L/yr |
Project Manager
175
salaries
| ₹3.5 L/yr - ₹13 L/yr |
Implementation Specialist
128
salaries
| ₹3 L/yr - ₹12 L/yr |
Software Developer
116
salaries
| ₹5.2 L/yr - ₹21 L/yr |
Oracle Cerner
Veradigm
Athenahealth Technology
NextGen Healthcare