i
Eshteky
Filter interviews by
I applied via Referral and was interviewed before Jul 2022. There were 3 interview rounds.
Easy test, it was all about maths
Best practices for marketing include understanding your target audience, creating valuable content, utilizing multiple channels, and analyzing data.
Understand your target audience to tailor your marketing efforts effectively
Create valuable content that resonates with your audience and provides them with solutions or entertainment
Utilize multiple marketing channels such as social media, email, SEO, and paid advertising ...
The 7 Ps are a marketing mix framework that includes Product, Price, Place, Promotion, People, Process, and Physical Evidence.
Product - the actual good or service being offered to customers
Price - the amount customers pay for the product or service
Place - the location where the product or service is sold or delivered
Promotion - the marketing activities used to communicate the benefits of the product or service
People - ...
Create marketing plan for the company
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Oct 2024. There was 1 interview round.
Sorting algorithms,many real time scenario questions
I applied via LinkedIn
Basic content assignment
I applied via Walk-in
Same question paper everytime
The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.
Identify the scope of the test and the target systems
Perform reconnaissance to gather information about the target
Test for common vulnerabilities such as SQL injection and cross-site scripting
Test for exploits to determine the impact of vulnerabilities
Report findings and provide recommend
CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.
CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.
They are generated by the server and included in forms or URLs to verify the authenticity of the request.
Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...
OWASP vulnerabilities commonly encountered in security analysis
Injection flaws (SQL, LDAP, OS command, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
Using components with known vulnerabilities
Insecure communication (e.g. lack of encryption)
Broken access control
XML External Entities (XXE)
I applied via Campus Placement and was interviewed in Jun 2022. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2022. There were 2 interview rounds.
Easy aptitude questions based on 12th level maths
I enjoy reading, hiking, and playing board games.
Reading: I love getting lost in a good book, especially science fiction and fantasy.
Hiking: I enjoy exploring new trails and being out in nature.
Board games: I like playing strategy games with friends and family, such as Settlers of Catan and Ticket to Ride.
posted on 15 Nov 2022
Interview experience
Bureau Veritas
SGS
CMS Infosystems
Medhaj Techno Concept