Loginsoft
Zopper Interview Questions and Answers
Q1. HOW DO U SCAN A NETWORK
Scanning a network involves using specialized software to identify active devices and open ports on a network.
Use network scanning tools like Nmap or Wireshark to scan for active devices
Identify open ports on devices to assess potential vulnerabilities
Analyze scan results to understand network topology and security risks
Q2. TYPES OF XSS ATTACKS AND EXPLAIN
XSS attacks involve injecting malicious scripts into web pages viewed by other users.
Reflected XSS: Injected script is reflected off the web server to the victim's browser.
Stored XSS: Injected script is stored on the server and displayed to all users who view the affected page.
DOM-based XSS: The attack payload is executed as a result of modifying the DOM environment in the victim's browser.
XSS via CSRF: Cross-Site Request Forgery attack that leverages XSS to execute unauthori...read more
Q3. what us vulnerability
Vulnerability is the state of being open to harm, damage, or attack.
Vulnerability is the quality of being easily hurt physically or emotionally.
It can also refer to weaknesses in systems or security that can be exploited by attackers.
Being vulnerable can also mean being open to criticism or failure.
Examples include a child being vulnerable to illness, a website vulnerable to hacking, or a person vulnerable to heartbreak.
Q4. Difference between tuple and dictionary
Tuple is an ordered collection of elements while dictionary is an unordered collection of key-value pairs.
Tuple uses indexing to access elements while dictionary uses keys to access values.
Tuple is immutable while dictionary is mutable.
Tuple is used to represent a single record while dictionary is used to represent a collection of records.
Tuple is faster than dictionary for accessing elements.
Example of tuple: (1, 'apple', True)
Example of dictionary: {'name': 'John', 'age': 2...read more
Q5. Tekk me about XSS ATTACK
XSS (Cross-Site Scripting) attack is a type of security vulnerability where attackers inject malicious scripts into web pages viewed by other users.
Attackers inject malicious scripts into web pages
Scripts can steal sensitive information like cookies or session tokens
Can be stored or reflected XSS
Prevent by sanitizing user input and encoding output
Q6. Explan about trim and split
Trim and split are string manipulation functions used to remove unwanted characters and split a string into an array of substrings.
Trim removes whitespace or specified characters from the beginning and end of a string.
Split divides a string into an array of substrings based on a specified delimiter.
Both functions are commonly used in programming to manipulate and extract data from strings.
Example: ' Hello World! '.trim() returns 'Hello World!'
Example: 'apple,banana,orange'.sp...read more
Interview Process at Zopper
Top Intern Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month