Upload Button Icon Add office photos

Filter interviews by

FCS Software Solutions Management Information System Executive Interview Questions and Answers

Updated 21 Oct 2024

FCS Software Solutions Management Information System Executive Interview Experiences

1 interview found

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed before Oct 2023. There were 2 interview rounds.

Round 1 - HR 

(2 Questions)

  • Q1. Basic Introduction.
  • Q2. Work Experience
Round 2 - HR 

(1 Question)

  • Q1. Virtual round with Team Heads overseas asked basic Introduction and work experience.

Interview questions from similar companies

Interview experience
2
Poor
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(7 Questions)

  • Q1. What is Blind XSS? What is the technique to find one?
  • Ans. 

    Blind XSS is a type of XSS attack where the attacker does not receive the output of the injected script.

    • Blind XSS is also known as non-persistent XSS.

    • It is difficult to detect as the attacker does not receive any feedback.

    • One technique to find Blind XSS is to use a tool like Burp Suite to inject a payload and monitor the server response.

    • Another technique is to use a third-party service like XSS Hunter to track the payl...

  • Answered by AI
  • Q2. What is your favorite vulnerability? explain that
  • Ans. 

    My favorite vulnerability is SQL injection.

    • SQL injection is a type of attack where an attacker injects malicious SQL code into a database query.

    • It can be used to steal sensitive information, modify or delete data, or even take control of the entire database.

    • Preventing SQL injection involves using parameterized queries, input validation, and proper error handling.

    • Examples of high-profile SQL injection attacks include th...

  • Answered by AI
  • Q3. What is CRLF? explain that
  • Ans. 

    CRLF stands for Carriage Return Line Feed. It is a sequence of characters used to represent a line break in text files.

    • CRLF consists of two ASCII control characters: CR (carriage return) and LF (line feed).

    • It is commonly used in HTTP headers to separate lines of text.

    • CRLF can be exploited by attackers to inject malicious code or perform attacks such as HTTP response splitting.

    • To prevent such attacks, input validation a...

  • Answered by AI
  • Q4. How many XSS are there? what will be the mitigation?
  • Ans. 

    There are numerous types of XSS attacks. Mitigation involves input validation and output encoding.

    • There are three main types of XSS attacks: stored, reflected, and DOM-based.

    • Mitigation involves input validation to ensure that user input is safe and output encoding to prevent malicious code from being executed.

    • Examples of input validation include limiting the length of input and restricting the types of characters that ...

  • Answered by AI
  • Q5. Explain the process of SQLi. Mitigation?
  • Ans. 

    SQLi is a type of injection attack where an attacker injects malicious SQL code into a vulnerable application to gain unauthorized access to sensitive data.

    • SQLi involves exploiting vulnerabilities in web applications that allow user input to be executed as SQL commands

    • Attackers can use SQLi to bypass authentication, access sensitive data, modify or delete data, and even take control of the entire database

    • Mitigation tec...

  • Answered by AI
  • Q6. Explain the process of CSRF
  • Ans. 

    CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.

    • The attacker creates a website with a form that submits a request to the target website

    • The user visits the attacker's website and submits the form, unknowingly performing an action on the target website

    • The target website cannot distinguish between a legitimate request and the forged request from the attacke...

  • Answered by AI
  • Q7. What will be the best way to send CSRF token in the Clint Server communication?
  • Ans. 

    The best way to send CSRF token in client-server communication is through HTTP headers.

    • HTTP headers are the most secure way to send CSRF tokens.

    • The token should be sent in the 'X-CSRF-Token' header.

    • The header should be set to 'SameSite=Strict' to prevent cross-site request forgery attacks.

    • The token should be regenerated for each session to prevent replay attacks.

  • Answered by AI
Round 3 - Technical 

(3 Questions)

  • Q1. Help me understand If I need to take over a higher-privilege account with an existing lower-privilege account what are the options available?
  • Ans. 

    Options to take over a higher-privilege account with an existing lower-privilege account.

    • Use privilege escalation techniques to gain higher privileges

    • Exploit vulnerabilities in the system to gain access to higher-privilege accounts

    • Use social engineering to obtain login credentials for higher-privilege accounts

    • Use brute-force attacks to crack passwords for higher-privilege accounts

  • Answered by AI
  • Q2. Some scenario-based questions that are going to land take over an account with XSS
  • Q3. Different types of XSS
  • Ans. 

    XSS or Cross-Site Scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • Reflected XSS: The attacker injects a script that is reflected back to the user through a search query or form input.

    • Stored XSS: The attacker injects a script that is stored on the server and executed whenever the user visits the affected page.

    • DOM-based XSS: The attacker...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I was interviewed by Cigniti and their client Linde, the second interview was organized by Linde. Both interviews cleared, but because of the time delay by Linde, the Final interview was not scheduled till now, now it's almost one month. If anyone get this kind of opportunity from Cigniti think before you accept the offer, in the end, they will not take responsibility for your time and effort. Because of the incident, I loose one of the good opportunities from another organization.

Skills evaluated in this interview

I applied via Referral and was interviewed in Jul 2021. There was 1 interview round.

Interview Questionnaire 

8 Questions

  • Q1. Tell me about your self .
  • Q2. Where are you doing job
  • Q3. What is ip address
  • Ans. 

    An IP address is a unique numerical identifier assigned to every device connected to the internet.

    • IP stands for Internet Protocol

    • It consists of four sets of numbers separated by dots

    • There are two types of IP addresses: IPv4 and IPv6

    • IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers

    • Examples of IP addresses are 192.168.1.1 and 2001:0db8:85a3:0000:0000:8a2e:0370:7334

  • Answered by AI
  • Q4. How to shareing file
  • Ans. 

    File sharing can be done through various methods.

    • One can use cloud storage services like Google Drive, Dropbox, etc.

    • File transfer protocols like FTP, SFTP, etc. can be used.

    • Peer-to-peer file sharing can be done through applications like BitTorrent.

    • File sharing can also be done through network file sharing services like SMB, NFS, etc.

  • Answered by AI
  • Q5. How to assign ip add
  • Ans. 

    IP addresses can be assigned manually or automatically using DHCP.

    • To assign an IP address manually, go to network settings and enter the IP address, subnet mask, default gateway, and DNS server.

    • To assign an IP address automatically, enable DHCP on the network and the device will receive an IP address from the DHCP server.

    • IP addresses can also be assigned using command line tools such as ipconfig or ifconfig.

  • Answered by AI
  • Q6. How to create bootable
  • Ans. 

    Creating a bootable drive involves formatting the drive and copying the operating system files onto it.

    • Insert a USB drive or DVD into the computer

    • Format the drive using a tool like Rufus or Disk Utility

    • Copy the operating system files onto the drive

    • Set the computer to boot from the drive in BIOS or UEFI settings

  • Answered by AI
  • Q7. What is switch
  • Ans. 

    A switch is a networking device that connects devices together on a local area network (LAN) and forwards data packets between them.

    • Switches operate at the data link layer of the OSI model.

    • They use MAC addresses to forward data to the correct destination device.

    • Switches can improve network performance by reducing network congestion and collisions.

    • Examples of switches include Cisco Catalyst switches and Netgear ProSAFE

  • Answered by AI
  • Q8. How to conigure router
  • Ans. 

    To configure a router, access its web interface and enter the necessary settings.

    • Connect to the router's network

    • Open a web browser and enter the router's IP address

    • Enter the login credentials

    • Navigate to the settings page and configure as needed

    • Save the changes and restart the router if necessary

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - First you go in formal dress because first impression is last impression..
And be confident in front of hr in interview.
And talk to him fluently,and eye contact.

Skills evaluated in this interview

I applied via Referral and was interviewed in Aug 2021. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Asked about previous Experience

Interview Preparation Tips

Interview preparation tips for other job seekers - Good Interview no pressure

FCS Software Solutions Interview FAQs

How many rounds are there in FCS Software Solutions Management Information System Executive interview?
FCS Software Solutions interview process usually has 2 rounds. The most common rounds in the FCS Software Solutions interview process are HR.

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.3k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
LTIMindtree Interview Questions
3.8
 • 2.9k Interviews
Mphasis Interview Questions
3.4
 • 790 Interviews
KPIT Technologies Interview Questions
3.5
 • 291 Interviews
View all

FCS Software Solutions Management Information System Executive Reviews and Ratings

based on 1 review

1.0/5

Rating in categories

2.0

Skill development

2.0

Work-Life balance

1.0

Salary & Benefits

1.0

Job Security

1.0

Company culture

1.0

Promotions/Appraisal

1.0

Work Satisfaction

Explore 1 Review and Rating
Technical Resource Specialist
26 salaries
unlock blur

₹2.6 L/yr - ₹4.5 L/yr

Business Development Manager
22 salaries
unlock blur

₹2.8 L/yr - ₹7.2 L/yr

Senior Software Engineer
19 salaries
unlock blur

₹4.2 L/yr - ₹13.2 L/yr

Software Engineer
19 salaries
unlock blur

₹4.7 L/yr - ₹15.3 L/yr

Graphic Designer
17 salaries
unlock blur

₹2.9 L/yr - ₹4.8 L/yr

Explore more salaries
Compare FCS Software Solutions with

TCS

3.7
Compare

Infosys

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview