i
Loginsoft
Filter interviews by
XSS (Cross-Site Scripting) attack is a type of security vulnerability where attackers inject malicious scripts into web pages viewed by other users.
Attackers inject malicious scripts into web pages
Scripts can steal sensitive information like cookies or session tokens
Can be stored or reflected XSS
Prevent by sanitizing user input and encoding output
Vulnerability is the state of being open to harm, damage, or attack.
Vulnerability is the quality of being easily hurt physically or emotionally.
It can also refer to weaknesses in systems or security that can be exploited by attackers.
Being vulnerable can also mean being open to criticism or failure.
Examples include a child being vulnerable to illness, a website vulnerable to hacking, or a person vulnerable to hear...
Scanning a network involves using specialized software to identify active devices and open ports on a network.
Use network scanning tools like Nmap or Wireshark to scan for active devices
Identify open ports on devices to assess potential vulnerabilities
Analyze scan results to understand network topology and security risks
XSS attacks involve injecting malicious scripts into web pages viewed by other users.
Reflected XSS: Injected script is reflected off the web server to the victim's browser.
Stored XSS: Injected script is stored on the server and displayed to all users who view the affected page.
DOM-based XSS: The attack payload is executed as a result of modifying the DOM environment in the victim's browser.
XSS via CSRF: Cross-Site...
Tuple is an ordered collection of elements while dictionary is an unordered collection of key-value pairs.
Tuple uses indexing to access elements while dictionary uses keys to access values.
Tuple is immutable while dictionary is mutable.
Tuple is used to represent a single record while dictionary is used to represent a collection of records.
Tuple is faster than dictionary for accessing elements.
Example of tuple: (1,...
Trim and split are string manipulation functions used to remove unwanted characters and split a string into an array of substrings.
Trim removes whitespace or specified characters from the beginning and end of a string.
Split divides a string into an array of substrings based on a specified delimiter.
Both functions are commonly used in programming to manipulate and extract data from strings.
Example: ' Hello World!...
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Vulnerability is the state of being open to harm, damage, or attack.
Vulnerability is the quality of being easily hurt physically or emotionally.
It can also refer to weaknesses in systems or security that can be exploited by attackers.
Being vulnerable can also mean being open to criticism or failure.
Examples include a child being vulnerable to illness, a website vulnerable to hacking, or a person vulnerable to heartbrea...
XSS (Cross-Site Scripting) attack is a type of security vulnerability where attackers inject malicious scripts into web pages viewed by other users.
Attackers inject malicious scripts into web pages
Scripts can steal sensitive information like cookies or session tokens
Can be stored or reflected XSS
Prevent by sanitizing user input and encoding output
XSS attacks involve injecting malicious scripts into web pages viewed by other users.
Reflected XSS: Injected script is reflected off the web server to the victim's browser.
Stored XSS: Injected script is stored on the server and displayed to all users who view the affected page.
DOM-based XSS: The attack payload is executed as a result of modifying the DOM environment in the victim's browser.
XSS via CSRF: Cross-Site Requ...
Scanning a network involves using specialized software to identify active devices and open ports on a network.
Use network scanning tools like Nmap or Wireshark to scan for active devices
Identify open ports on devices to assess potential vulnerabilities
Analyze scan results to understand network topology and security risks
I applied via Recruitment Consulltant and was interviewed in Jul 2022. There were 2 interview rounds.
Tuple is an ordered collection of elements while dictionary is an unordered collection of key-value pairs.
Tuple uses indexing to access elements while dictionary uses keys to access values.
Tuple is immutable while dictionary is mutable.
Tuple is used to represent a single record while dictionary is used to represent a collection of records.
Tuple is faster than dictionary for accessing elements.
Example of tuple: (1, 'app...
Trim and split are string manipulation functions used to remove unwanted characters and split a string into an array of substrings.
Trim removes whitespace or specified characters from the beginning and end of a string.
Split divides a string into an array of substrings based on a specified delimiter.
Both functions are commonly used in programming to manipulate and extract data from strings.
Example: ' Hello World! '....
Top trending discussions
posted on 15 Jul 2022
I applied via Referral and was interviewed before Jul 2021. There were 3 interview rounds.
If you are a fresher , then this is for you else almost no coding test for experienced candidates.
I applied via Recruitment Consultant and was interviewed in Feb 2021. There were 3 interview rounds.
SOLID principles are a set of five design principles for writing maintainable and scalable code.
Single Responsibility Principle (SRP) - a class should have only one reason to change
Open-Closed Principle (OCP) - a class should be open for extension but closed for modification
Liskov Substitution Principle (LSP) - a subclass should be able to replace its parent class without affecting the system's behavior
Interface Segreg...
Ref and out are both used for passing arguments by reference in C#. Ref is bidirectional while out is unidirectional.
Ref and out are used to pass arguments by reference instead of by value
Ref is used for both input and output parameters while out is only used for output parameters
Ref requires the variable to be initialized before passing while out does not
Example: void MyMethod(ref int x) { x = x + 1; } and void MyMeth...
REST APIs are a way to interact with web services. Popular status codes include 200, 404, and 500.
REST APIs allow clients to access and manipulate resources on a server using HTTP requests
Common HTTP methods used in REST APIs include GET, POST, PUT, and DELETE
Status codes indicate the success or failure of a request, with 2xx codes indicating success and 4xx/5xx codes indicating errors
Some popular status codes include ...
Memory management in C# involves automatic garbage collection and the use of pointers.
C# uses a garbage collector to automatically manage memory allocation and deallocation.
Developers can use pointers to directly manipulate memory, but this is not recommended.
C# also provides tools for managing memory usage, such as the IDisposable interface and the using statement.
Microservices, cloud-native, and serverless are the latest architectural trends in C#.
Microservices architecture is gaining popularity due to its scalability and flexibility.
Cloud-native architecture focuses on building applications that are optimized for cloud environments.
Serverless architecture allows developers to focus on writing code without worrying about infrastructure management.
Other trends include containeri...
Both .NET Core and Framework are used for developing Windows applications, but Core is cross-platform and lightweight.
Core is open-source and modular, while Framework is a monolithic framework
Core has better performance and scalability than Framework
Core supports microservices architecture, while Framework does not
Core has a smaller footprint and can be deployed as a single executable
Framework has better backward compa...
Major advancements in .NET Core include improved performance, cross-platform compatibility, and enhanced security features.
Improved performance through the use of Span
Cross-platform compatibility with support for Linux and macOS
Enhanced security features such as runtime code generation and data protection
Introduction of .NET Core 3.0 with support for Windows Desktop applications
Integration with ...
I appeared for an interview in Jul 2024.
Leet code medium level question
Guide to completing a RESTful API coding task with essential pointers and examples.
Understand REST principles: Use HTTP methods (GET, POST, PUT, DELETE) appropriately.
Define clear endpoints: Example - /api/users for user-related operations.
Implement status codes: Use 200 for success, 404 for not found, 500 for server errors.
Use JSON for data interchange: Ensure requests and responses are in JSON format.
Consider authent...
Managing multiple events on a single variable requires careful synchronization to ensure accurate results.
Use locks or mutexes to prevent race conditions when accessing the variable.
Implement event debouncing to limit the frequency of updates, ensuring only the final event is processed.
Utilize a queue to handle events sequentially, processing them one at a time to maintain accuracy.
Consider using atomic operations for ...
I applied via Naukri.com and was interviewed before Sep 2023. There were 2 interview rounds.
Developed a web application for tracking personal fitness goals and progress.
Used React.js for front-end development
Implemented RESTful APIs for data retrieval and storage
Utilized MongoDB for database management
Yes, faced challenges with debugging complex code and integrating third-party APIs.
Debugging complex code with multiple dependencies
Integrating third-party APIs with inconsistent documentation
Resolving compatibility issues between different software components
Genral aptitude questions
I appeared for an interview in Jun 2025, where I was asked the following questions.
based on 1 interview experience
Difficulty level
Duration
based on 3 reviews
Rating in categories
Senior Software Engineer
37
salaries
| ₹9.5 L/yr - ₹17.7 L/yr |
Security Researcher
25
salaries
| ₹3 L/yr - ₹11 L/yr |
Software Engineer
16
salaries
| ₹2.4 L/yr - ₹12 L/yr |
QA Lead
9
salaries
| ₹12 L/yr - ₹26.7 L/yr |
QA Engineer
8
salaries
| ₹3.7 L/yr - ₹9.2 L/yr |
Maxgen Technologies
JoulestoWatts Business Solutions
Value Point Systems
F1 Info Solutions and Services