i
Inspira Enterprise India Limited
Filter interviews by
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when an attacker inserts malicious SQL code into a query to manipulate the database.
It can be prevented by using parameterized queries and input validation.
Example: SELECT * FROM users WHERE username = 'admin'; DROP TABLE users;
EDR stands for Endpoint Detection and Response. Implementation steps include planning, deployment, configuration, testing, and monitoring.
Plan the deployment of EDR solution based on organization's needs and requirements
Deploy the EDR solution on endpoints across the network
Configure the EDR solution to detect and respond to security threats
Test the EDR solution to ensure it is functioning correctly
Monitor the EDR solu
Top trending discussions
I applied via Approached by Company and was interviewed in Jan 2024. There were 3 interview rounds.
Burpsuite is a web application security testing tool used for scanning, analyzing, and exploiting web applications.
Burpsuite can intercept and modify HTTP/S requests and responses
It can be used for scanning web applications for vulnerabilities
Burpsuite includes tools for spidering, scanning, and intruder attacks
It has a repeater tool for manually manipulating and re-sending requests
Burpsuite can be used for session han
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.
Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.
The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.
Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
posted on 13 Oct 2022
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
posted on 3 Feb 2021
I applied via Recruitment Consultant
I was interviewed in Jan 2021.
I applied via Recruitment Consultant and was interviewed in Nov 2019. There were 3 interview rounds.
posted on 14 May 2018
I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.
The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.
ASA firewall has security levels assigned to interfaces to control traffic flow
The 8.3 version of ASA introduced significant changes in NAT configuration
Transparent mode firewall operates at Layer 2 and d...
I want to join Microland because of its reputation for innovation and growth. I can join within two weeks.
I am impressed by Microland's track record of providing cutting-edge solutions in the IT industry.
I am excited about the opportunity to work with a team of talented professionals at Microland.
I believe my skills and experience align well with the challenges and opportunities at Microland.
I can join within two weeks
based on 1 interview
Interview experience
Security Analyst
358
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Security Analyst
224
salaries
| ₹4.6 L/yr - ₹18.5 L/yr |
Network Engineer
189
salaries
| ₹1.8 L/yr - ₹8 L/yr |
Cyber Security Analyst
130
salaries
| ₹2.8 L/yr - ₹10 L/yr |
SOC Analyst
91
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Wipro
HCLTech
Tech Mahindra
TCS