Filter interviews by
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
Cross site scripting (XSS) is a type of security vulnerability typically found in web applications where malicious scripts are injected into trusted websites.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or altering the website's content.
There are three main types of XSS: stored XSS, reflected XSS, and DOM-based XSS.
Preventing XSS involves input validation, ...
CSRF attacks can be found by analyzing network traffic, monitoring user actions, and implementing anti-CSRF tokens.
Analyze network traffic for suspicious requests originating from a different domain than the target website
Monitor user actions for unexpected changes in account settings or data
Implement anti-CSRF tokens in web forms to prevent unauthorized requests
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Vapt Engineers are responsible for identifying vulnerabilities in computer systems and networks to prevent cyber attacks.
Conduct vulnerability assessments and penetration testing on systems and networks
Analyze and report on security vulnerabilities found
Recommend and implement security measures to protect against cyber attacks
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
SAST stands for Static Application Security Testing and DAST stands for Dynamic Application Security Testing.
SAST involves analyzing the application's source code or binary code for security vulnerabilities without executing the code.
DAST involves testing the application while it is running to identify security vulnerabilities by sending malicious input.
SAST is typically performed earlier in the development cycle while...
Union-based SQL injection is a type of attack that allows an attacker to extract information from a database by using the UNION SQL operator.
Union-based SQL injection involves injecting a malicious SQL query that uses the UNION operator to combine the results of the original query with the attacker's query.
The attacker can use the UNION operator to retrieve data from other tables in the database, potentially accessing ...
IDOR, DOM XSS, and Nessus are common security vulnerabilities and tools used in penetration testing.
IDOR stands for Insecure Direct Object Reference, where an attacker can access unauthorized data by manipulating object references.
DOM XSS (Cross-Site Scripting) is a type of XSS attack that occurs in the Document Object Model.
Nessus is a popular vulnerability scanner used in penetration testing to identify security vuln
I applied via Naukri.com and was interviewed in Jan 2023. There were 2 interview rounds.
CAN is a protocol used for communication between electronic devices in vehicles.
CAN stands for Controller Area Network.
It is a serial communication protocol that allows multiple electronic control units (ECUs) to communicate with each other.
CAN uses a two-wire bus system, consisting of a CAN High (CANH) and a CAN Low (CANL) wire.
It employs a message-based communication scheme, where each message is identified by a uniq...
CAN V and CAN P are two types of messages used in Controller Area Network (CAN) communication protocol.
CAN V stands for CAN Voltage and is used for transmitting data at a higher voltage level.
CAN P stands for CAN Protocol and is used for transmitting data at a lower voltage level.
CAN V is used for high-speed communication, while CAN P is used for low-speed communication.
CAN V is used for critical data transmission, whi...
UDS stands for Unified Diagnostic Services, a protocol used in automotive electronics for communication between ECUs.
UDS is used for diagnostic communication between ECUs in vehicles
It is based on the ISO 14229 standard
UDS allows for diagnostic services such as reading and clearing fault codes, accessing sensor data, and performing tests
It uses a request-response mechanism, with the diagnostic tool sending a request an...
I applied via Naukri.com and was interviewed before Oct 2023. There was 1 interview round.
I am a dedicated and experienced banker with a strong background in finance and customer service.
Over 5 years of experience in the banking industry
Proficient in financial analysis and risk management
Excellent communication and interpersonal skills
Strong track record of building and maintaining client relationships
My hobby is photography, where I love capturing moments and telling stories through images.
I enjoy exploring different locations to find unique shots
I like experimenting with different lighting techniques
I often participate in photography contests to challenge myself
Some of my favorite subjects to photograph are landscapes and portraits
I applied via Naukri.com and was interviewed in Jan 2022. There were 2 interview rounds.
CSV stands for Computer System Validation. Automation testing is the use of software to execute tests.
CSV is a process of ensuring that a computer-based system meets its intended requirements and is compliant with regulatory standards.
Automation testing involves using software tools to run tests automatically, reducing the need for manual testing.
CSV and automation testing are often used together to ensure that compute...
There are several categories of software, including system software, application software, programming software, and malware.
System software
Application software
Programming software
Malware
SDLC refers to the software development life cycle. There are various types of hardware such as input, output, storage, and processing devices.
SDLC is a process followed by software development teams to design, develop, and test software.
Hardware can be classified into four types: input devices (e.g. keyboard, mouse), output devices (e.g. monitor, printer), storage devices (e.g. hard disk, USB drive), and processing de...
Testing tools are software applications used to automate and manage the testing process.
Automated testing tools like Selenium, Appium, and TestComplete
Performance testing tools like JMeter and LoadRunner
Bug tracking tools like JIRA and Bugzilla
Code coverage tools like JaCoCo and Cobertura
Continuous integration tools like Jenkins and Travis CI
posted on 16 Mar 2022
I applied via Walk-in and was interviewed in Sep 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Vapt Engineers are responsible for identifying vulnerabilities in computer systems and networks to prevent cyber attacks.
Conduct vulnerability assessments and penetration testing on systems and networks
Analyze and report on security vulnerabilities found
Recommend and implement security measures to protect against cyber attacks
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
XSS (Cross-Site Scripting) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be used to steal sensitive information, such as login credentials or personal data.
Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.
There are three types of XSS attacks: stored, reflected, and DO...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
Reflected XSS: The injected script is embedded in the URL and executed when the victim visits the manipulated link.
Stored XSS: The injected script is permanently stored on the target server and executed whenever the vulnerable page is accessed.
DOM-based XSS: The vulnerability aris...
Network VAPT is conducted by identifying vulnerabilities in the network and testing its security measures.
The process involves identifying potential vulnerabilities in the network infrastructure
Penetration testing is conducted to simulate attacks and test the effectiveness of security measures
Vulnerability assessment is done to identify weaknesses in the network
The results are analyzed and recommendations are made to i...
TCS
Accenture
Wipro
Cognizant