Filter interviews by
I would manage the fast pace and dynamic 24*7 environment by prioritizing tasks, staying organized, and effectively communicating with team members.
Prioritize tasks based on urgency and impact on security
Stay organized by using tools like task management software and creating a schedule
Communicate effectively with team members to ensure everyone is on the same page and can quickly address any security incidents
Be adapt...
Triage a security incident by assessing severity, containing the threat, and investigating the root cause.
Assess the severity of the incident based on impact and likelihood of exploitation.
Contain the threat by isolating affected systems, changing credentials, or blocking malicious traffic.
Investigate the root cause by analyzing logs, conducting forensics, and identifying vulnerabilities.
Prioritize response actions bas...
I would mitigate a DDoS attack on an Apache server in AWS by implementing various security measures and utilizing AWS services.
Implementing rate limiting and access control lists to filter out malicious traffic
Utilizing AWS Shield for DDoS protection
Scaling up the server capacity to handle the increased traffic
Monitoring server logs and traffic patterns to identify and block suspicious activity
Utilizing AWS WAF (Web Ap...
Top trending discussions
I was interviewed in Feb 2022.
Practical pentest involves identifying vulnerabilities in a web application and exploiting them to gain unauthorized access.
Conduct a thorough reconnaissance of the target application
Identify potential vulnerabilities such as SQL injection, cross-site scripting, and file inclusion
Exploit the vulnerabilities using tools such as Burp Suite and Metasploit
Document the findings and provide recommendations for remediation
Re-...
I applied via Naukri.com and was interviewed before Jan 2023. There were 3 interview rounds.
Questions based on resume, prior experience
I was interviewed in Feb 2022.
Practical pentest involves identifying vulnerabilities in a web application and exploiting them to gain unauthorized access.
Conduct a thorough reconnaissance of the target application
Identify potential vulnerabilities such as SQL injection, cross-site scripting, and file inclusion
Exploit the vulnerabilities using tools such as Burp Suite and Metasploit
Document the findings and provide recommendations for remediation
Re-...
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Allows attackers to access sensitive data
Can modify or delete data
Can execute commands on the server
Can be prevented by input validation and parameterized queries
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Attackers use SQL injection to gain unauthorized access to sensitive data or to modify or delete data in a database.
SQL injection can be prevented by using parameterized queries, input validation, and proper error handling.
Example: An attacker could use SQL injection to bypass login credentials and gain acc...
based on 1 interview
Interview experience
Software Engineer
87
salaries
| ₹7 L/yr - ₹23.3 L/yr |
Lead Engineer
70
salaries
| ₹16 L/yr - ₹36 L/yr |
Software Engineer Level 1
53
salaries
| ₹9.5 L/yr - ₹19 L/yr |
Devops Engineer
48
salaries
| ₹5.5 L/yr - ₹17.2 L/yr |
Lead Consultant
40
salaries
| ₹20 L/yr - ₹40 L/yr |
Experian
TransUnion
Equifax
Crif High Mark Credit Information Services