Filter interviews by
posted on 14 Apr 2023
I applied via Company Website and was interviewed in Mar 2023. There were 4 interview rounds.
Basic Login and reasoning questions with some basic networking and CIA model-related questions.
OWASP Top 10 is a list of common web application vulnerabilities. CIA model is a framework for information security.
OWASP Top 10 includes vulnerabilities like injection, broken authentication, and cross-site scripting.
CIA model stands for confidentiality, integrity, and availability.
It is used to evaluate and improve the security of information systems.
For example, a company may use the CIA model to ensure that custome...
Threat, vulnerability, and risk are related to security while authentication and authorization are related to access control.
Threat is a potential danger that can exploit a vulnerability and cause harm.
Vulnerability is a weakness in a system that can be exploited by a threat.
Risk is the likelihood of a threat exploiting a vulnerability and the impact it will have.
Authentication is the process of verifying the identity ...
posted on 23 Aug 2023
I applied via Walk-in and was interviewed in Feb 2023. There were 4 interview rounds.
Numerical reasoning and logical reasoning a bit tough however can be clear
posted on 5 Mar 2022
I applied via Indeed and was interviewed in Feb 2022. There were 3 interview rounds.
Reasoning ability and technical questions of fundamental of system and cyber security ports number
CIA triads are confidentiality, integrity, and availability. HTTPS is a secure version of HTTP.
CIA triads are the three pillars of information security.
Confidentiality ensures that only authorized parties can access data.
Integrity ensures that data is not tampered with or altered.
Availability ensures that data is accessible to authorized parties when needed.
HTTPS is a secure version of HTTP that encrypts data in transi...
Ports and tools used in information security
Common ports used in information security include 80 (HTTP), 443 (HTTPS), 22 (SSH), and 3389 (RDP)
Tools used in information security include Nmap, Wireshark, Metasploit, and Nessus
Port scanning tools like Nmap are used to identify open ports on a target system
Packet sniffing tools like Wireshark are used to capture and analyze network traffic
Vulnerability scanners like Nessus...
OWASP Top 10 is a list of common web application vulnerabilities.
Injection (SQL, LDAP, etc.)
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
posted on 28 Jan 2022
I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.
Qseap Infotech interview questions for designations
posted on 9 Aug 2023
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
VAPT stands for Vulnerability Assessment and Penetration Testing, a process used to identify and address security vulnerabilities in a system.
VAPT involves conducting a thorough assessment of a system to identify potential vulnerabilities.
Penetration testing is then performed to exploit these vulnerabilities in a controlled manner to assess the system's security.
The goal of VAPT is to identify and address security weak...
BurpSuite is a web application security testing tool used for scanning, analyzing, and exploiting web applications.
BurpSuite is commonly used for manual and automated testing of web applications for security vulnerabilities.
It includes tools for intercepting and modifying HTTP requests, scanning for common security issues, and analyzing responses.
BurpSuite can be used to identify vulnerabilities such as SQL injection, ...
Get interview-ready with Top Qseap Infotech Interview Questions
Top trending discussions
posted on 1 May 2024
I applied via Campus Placement and was interviewed before May 2023. There were 2 interview rounds.
Question were based on coding 1 with linked list 1 with string and 1 sql one
posted on 1 Aug 2024
I applied via Campus Placement and was interviewed in Jul 2024. There was 1 interview round.
posted on 15 Jun 2022
I applied via LinkedIn and was interviewed in Apr 2022. There were 4 interview rounds.
posted on 12 Jan 2023
I applied via Campus Placement and was interviewed before Jan 2022. There were 4 interview rounds.
This one is a combination of aptitude and coding test where medium questions abt c,cpp are asked
Do few aptitude test and some level of coding and ull be able to clear the test quite easily
I applied via Campus Placement and was interviewed in Sep 2023. There were 2 interview rounds.
Quant, logical reasoning, mathematics
Abstract class is a class with abstract methods, interface is a contract with only abstract methods. Array is fixed size, ArrayList is dynamic. Method overloading is same method with different parameters, overriding is redefining a method. OOP pillars are inheritance, encapsulation, polymorphism, abstraction. Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other...
based on 4 interviews
3 Interview rounds
based on 21 reviews
Rating in categories
Information Security Consultant
170
salaries
| ₹2 L/yr - ₹12.2 L/yr |
Associate Information Security Consultant
116
salaries
| ₹1.4 L/yr - ₹7.2 L/yr |
Security Consultant
20
salaries
| ₹4 L/yr - ₹8.5 L/yr |
Information Security Analyst
20
salaries
| ₹2.2 L/yr - ₹9.2 L/yr |
Senior Information Security Consultant
9
salaries
| ₹6 L/yr - ₹13.5 L/yr |
Maxgen Technologies
Cyfuture
Value Point Systems
JoulestoWatts Business Solutions