Filter interviews by
posted on 2 Oct 2024
I applied via Company Website and was interviewed before Oct 2023. There were 2 interview rounds.
Basic aptitude MCQ questions
OWASP TOP 10 is a list of the top 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
SQL injection (SQLi) is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQLi occurs when an attacker inserts malicious SQL code into a query to manipulate the database.
Mitigation techniques include using parameterized queries, input validation, and stored procedures.
Example scenario: Attacker enters ' OR 1=1;--' into a login form to bypass authentication
Top trending discussions
I applied via Walk-in and was interviewed before Aug 2022. There were 4 interview rounds.
Test of SQL, Tableau and other skills based on your resume on Skillate
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
posted on 14 Sep 2023
I applied via Campus Placement and was interviewed in Aug 2023. There were 4 interview rounds.
It contains 60 questions solve in 60 minutes and 1 coding questions simply debug extra 15 minutes are given
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
There was an OA which comprised of Aptitude questions, as well as Technical questions. And, there was a single coding question(Basic level)
posted on 9 Oct 2023
I applied via Campus Placement and was interviewed in Sep 2023. There were 2 interview rounds.
It was online assessment
The four pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction. Arrays are fixed-size data structures, while vectors are dynamic arrays. A queue can be implemented using two stacks.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Creating new classes based on existing classes, inheriting their attributes and methods.
Polymorphism: Objects of differe...
The four pillars of object-oriented programming are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a new class to inherit properties and behavior from an existing class.
Polymorphism: The ability for objects of different classes to respond to the same message.
Abstraction: Hiding the complex implementatio...
DBMS stands for Database Management System. It is a software system that allows users to define, create, maintain and control access to databases.
DBMS is a software system that manages databases.
It allows users to define, create, maintain, and control access to databases.
DBMS provides tools for data manipulation, retrieval, and security.
Examples of DBMS include MySQL, Oracle, SQL Server, and PostgreSQL.
Easy level questions
Object is an instance of a class with its own state and behavior, while constructor is a special method used to initialize objects.
Object is created from a class using the 'new' keyword.
Constructor is a special method with the same name as the class.
Object has its own state (attributes) and behavior (methods).
Constructor is used to initialize the state of an object when it is created.
Example: Class Car { constructor(ma...
Abstraction focuses on hiding the implementation details while encapsulation focuses on bundling the data and methods that operate on the data into a single unit.
Abstraction is the concept of hiding the complex implementation details and showing only the necessary features of an object.
Encapsulation is the bundling of data and methods that operate on the data into a single unit.
Abstraction allows for creating simple in...
posted on 24 Oct 2022
30 min test covers basic logic reasonings
30 min round medium level questions from leetcode
I applied via Company Website and was interviewed in Apr 2023. There were 2 interview rounds.
A zero coupon bond is a bond that pays no interest and is sold at a discount to its face value.
Zero coupon bonds are also known as discount bonds.
Investors buy these bonds at a price lower than their face value and receive the full face value at maturity.
The difference between the purchase price and the face value is the investor's return.
Zero coupon bonds are often used for long-term investments, such as retirement sa...
Corporate actions are events initiated by a company that can affect its stock price and shareholders. They are recorded in books through various accounting entries.
Corporate actions include stock splits, dividends, mergers, acquisitions, and spin-offs.
These actions are recorded in books through journal entries and adjustments to accounts such as retained earnings and stockholders' equity.
For example, if a company decla...
posted on 2 Apr 2025
I appeared for an interview in Mar 2025, where I was asked the following questions.
I have diverse experiences in software development through internships and projects, focusing on teamwork and problem-solving.
Interned at XYZ Corp, where I developed a web application using React and Node.js, improving user engagement by 30%.
Worked on a team project in college to create a mobile app for local businesses, enhancing my collaboration and coding skills.
Participated in hackathons, where I learned to work un...
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Information Security Consultant
170
salaries
| ₹2 L/yr - ₹12.2 L/yr |
Associate Information Security Consultant
116
salaries
| ₹1.4 L/yr - ₹7.2 L/yr |
Security Consultant
20
salaries
| ₹4 L/yr - ₹8.5 L/yr |
Information Security Analyst
20
salaries
| ₹2.2 L/yr - ₹9.2 L/yr |
Senior Information Security Consultant
9
salaries
| ₹6 L/yr - ₹13.5 L/yr |
Maxgen Technologies
Cyfuture
Value Point Systems
JoulestoWatts Business Solutions