i
Ernst &
Young
Filter interviews by
Cache control is implemented through HTTP headers to specify how long a resource should be cached.
Cache-Control header is used to specify caching directives
Expires header is used to specify an expiration date for the resource
Max-Age header is used to specify the maximum age of the resource in seconds
Pragma header is used for backwards compatibility with HTTP/1.0
Examples: Cache-Control: max-age=3600, Expires: Wed, ...
CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.
CSRF stands for Cross-Site Request Forgery
It can be exploited by tricking a user into clicking a link or button on a malicious website that sends a request to a different website where the user is logged in
The request can perform actions on behalf of the user without their knowledge or consent
To preven...
XSS is a type of web vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers can exploit XSS vulnerabilities by injecting malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, such as login credentials or personal data, from the victim's browser.
XSS attacks can be prevented by ...
SAST and DAST are security testing techniques used to identify vulnerabilities in software applications.
SAST (Static Application Security Testing) is performed on the source code of an application to identify security vulnerabilities before the application is compiled and deployed.
DAST (Dynamic Application Security Testing) is performed on a running application to identify vulnerabilities in real-time.
SAST is usef...
What people are saying about Ernst & Young
httpsOnly and secure flag are used for securing web traffic and preventing attacks.
httpsOnly ensures that all traffic to a website is encrypted and cannot be intercepted by attackers.
Secure flag ensures that cookies are only sent over encrypted connections, preventing session hijacking attacks.
Both are important security measures for protecting sensitive information and preventing attacks.
Examples of websites that...
Security headers are used to enhance the security of web applications by providing additional protection against attacks.
Common security headers include Content-Security-Policy (CSP), X-XSS-Protection, X-Content-Type-Options, X-Frame-Options, and Strict-Transport-Security (HSTS)
CSP helps prevent cross-site scripting (XSS) attacks by specifying which sources of content are allowed to be loaded
X-XSS-Protection helps...
I applied via Naukri.com and was interviewed before Nov 2021. There were 3 interview rounds.
XSS is a type of web vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers can exploit XSS vulnerabilities by injecting malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, such as login credentials or personal data, from the victim's browser.
XSS attacks can be prevented by prope...
CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.
CSRF stands for Cross-Site Request Forgery
It can be exploited by tricking a user into clicking a link or button on a malicious website that sends a request to a different website where the user is logged in
The request can perform actions on behalf of the user without their knowledge or consent
To prevent CSR...
SAST and DAST are security testing techniques used to identify vulnerabilities in software applications.
SAST (Static Application Security Testing) is performed on the source code of an application to identify security vulnerabilities before the application is compiled and deployed.
DAST (Dynamic Application Security Testing) is performed on a running application to identify vulnerabilities in real-time.
SAST is useful fo...
Security headers are used to enhance the security of web applications by providing additional protection against attacks.
Common security headers include Content-Security-Policy (CSP), X-XSS-Protection, X-Content-Type-Options, X-Frame-Options, and Strict-Transport-Security (HSTS)
CSP helps prevent cross-site scripting (XSS) attacks by specifying which sources of content are allowed to be loaded
X-XSS-Protection helps prev...
Cache control is implemented through HTTP headers to specify how long a resource should be cached.
Cache-Control header is used to specify caching directives
Expires header is used to specify an expiration date for the resource
Max-Age header is used to specify the maximum age of the resource in seconds
Pragma header is used for backwards compatibility with HTTP/1.0
Examples: Cache-Control: max-age=3600, Expires: Wed, 21 Oc...
I applied via Referral
I worked as a credit analyst at CRISIL, analyzing credit risk of various companies.
Conducted financial statement analysis to assess creditworthiness
Evaluated industry trends and macroeconomic factors impacting credit risk
Prepared credit reports and made recommendations to clients
Collaborated with team members to discuss findings and strategies
Google maintains market share through continuous innovation, strategic acquisitions, and strong brand recognition.
Google invests heavily in research and development to constantly improve its products and services.
Google strategically acquires companies that complement its existing offerings, such as YouTube and Android.
Google has a strong brand recognition and reputation for providing high-quality search results and us...
Google Suggest is a feature that provides search suggestions as users type their queries.
Google Suggest uses a combination of algorithms and user data to generate suggestions.
It takes into account factors like popularity, relevance, and user search history.
Suggestions are based on real-time data and can vary depending on location and language.
Google Suggest aims to improve search efficiency and provide relevant suggest...
To calculate the required capacity for a pineapple juice plant, factors such as production volume, processing time, and equipment efficiency need to be considered.
Determine the expected production volume of pineapple juice per day or per hour
Calculate the processing time required to convert pineapples into juice
Consider the efficiency of the equipment used in the production process
Factor in any potential growth or expa...
My projects at Google, such as Orkut and Gmail, had a significant impact on the company and its users.
Orkut was one of the first social networking sites and helped Google establish a presence in the social media space.
Gmail revolutionized email with its large storage capacity, search functionality, and user-friendly interface.
Working at Google allowed me to collaborate with talented individuals and work on cutting-edge...
What people are saying about Ernst & Young
I applied via Walk-in
I applied via Walk-in
Indian IT majors must innovate and adapt to emerging technologies to maintain competitiveness over the next five years.
Invest in AI and automation: Companies like TCS should enhance their AI capabilities to streamline operations and improve service delivery.
Focus on cloud services: Infosys can expand its cloud offerings to meet the growing demand for digital transformation among enterprises.
Enhance cybersecurity measur...
I applied via Walk-in
The incumbent retail bank needs to develop an ATM strategy to counter competition.
Analyze the competition's ATM strategy and identify their strengths and weaknesses.
Assess the current market demand for ATMs and identify potential opportunities for the bank.
Evaluate the bank's existing infrastructure and resources to determine the feasibility of implementing an ATM strategy.
Consider the cost implications of developing a...
Yes, the insurance company can offer product insurance to improve profitability.
Product insurance can provide an additional revenue stream for the insurance company.
It can attract new customers who are interested in protecting their valuable possessions.
Product insurance can also enhance customer loyalty and retention.
Examples of product insurance include coverage for electronic devices, appliances, jewelry, and other ...
The steel making company in Surat is considering starting a new plant in West Bengal.
Evaluate the market demand for steel in West Bengal
Assess the availability and cost of raw materials in West Bengal
Analyze the competition in the steel industry in West Bengal
Consider the infrastructure and logistics for setting up a new plant
Evaluate the potential profitability and return on investment
I applied via Referral
I see myself in McKinsey as a dedicated consultant working on impactful projects and contributing to the growth of the firm.
Continuously learning and growing through exposure to diverse industries and challenges
Building strong relationships with clients and colleagues to drive successful outcomes
Taking on leadership roles within project teams to drive innovation and excellence
I applied via Referral
I was responsible for developing the business plan, securing funding, and overseeing day-to-day operations.
Developed the business plan for the venture
Secured funding from investors or lenders
Oversaw day-to-day operations of the business
Made strategic decisions to drive growth and profitability
I applied via Referral
based on 12 reviews
Rating in categories
Senior Consultant
19.4k
salaries
| ₹15 L/yr - ₹27.5 L/yr |
Consultant
13.2k
salaries
| ₹10 L/yr - ₹18 L/yr |
Manager
8k
salaries
| ₹23 L/yr - ₹40 L/yr |
Assistant Manager
6.8k
salaries
| ₹14.3 L/yr - ₹25.5 L/yr |
Associate Consultant
4.3k
salaries
| ₹5.2 L/yr - ₹12 L/yr |
Deloitte
PwC
EY Global Delivery Services ( EY GDS)
Accenture