Filter interviews by
OWASP Top 10 is a list of the 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
SQL injection (SQLi) is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQLi occurs when an attacker inserts malicious SQL code into a query to manipulate the database.
Mitigation techniques include using parameterized queries, input validation, and stored procedures.
Example scenario: Attacker enters ' OR 1=1;--' into a login form to bypass authentic...
OWASP TOP 10 is a list of the top 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between internal network and external networks
Filters incoming and outgoing traffic based on set rules
Can be hardware-based or software-based
Can block unauthorized access while allowing legitimate traffic
Can be configured to log and report on network activ...
VAPT stands for Vulnerability Assessment and Penetration Testing, a process used to identify and address security vulnerabilities in a system.
VAPT involves conducting a thorough assessment of a system to identify potential vulnerabilities.
Penetration testing is then performed to exploit these vulnerabilities in a controlled manner to assess the system's security.
The goal of VAPT is to identify and address security...
BurpSuite is a web application security testing tool used for scanning, analyzing, and exploiting web applications.
BurpSuite is commonly used for manual and automated testing of web applications for security vulnerabilities.
It includes tools for intercepting and modifying HTTP requests, scanning for common security issues, and analyzing responses.
BurpSuite can be used to identify vulnerabilities such as SQL inject...
A vulnerability is a weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause damage.
Vulnerabilities can exist in software, hardware, or even human behavior.
Examples of vulnerabilities include unpatched software, weak passwords, and social engineering tactics.
Vulnerability assessments and penetration testing can help identify and mitigate vulnerabilities.
Regular updates ...
A hacker or unauthorized user is someone who gains unauthorized access to a computer system or network.
Hackers can be individuals or groups with malicious intent or those who seek to expose vulnerabilities in a system for ethical reasons.
Unauthorized users can also include employees who abuse their access privileges or individuals who accidentally gain access to a system.
Examples of unauthorized access include phi...
OWASP Top 10 is a list of common web application vulnerabilities.
Injection (SQL, LDAP, etc.)
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
Threat, vulnerability, and risk are related to security while authentication and authorization are related to access control.
Threat is a potential danger that can exploit a vulnerability and cause harm.
Vulnerability is a weakness in a system that can be exploited by a threat.
Risk is the likelihood of a threat exploiting a vulnerability and the impact it will have.
Authentication is the process of verifying the iden...
I applied via Company Website and was interviewed in Sep 2024. There were 3 interview rounds.
Logical , the check their quantitative skills ability to solve problems
To utilize my technical skills and knowledge in cybersecurity to help organizations improve their security posture.
To apply my expertise in identifying vulnerabilities and implementing security measures
To contribute to the development and implementation of security policies and procedures
To assist in incident response and security assessments
To continuously learn and stay updated on the latest security trends and techn...
OWASP Top 10 is a list of the 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
I applied via Referral and was interviewed in Feb 2024. There were 3 interview rounds.
Total 1-hour Aptitude round, Some Basics questions and then questions level was increasing after sometime within 1 hour
I applied via Walk-in and was interviewed in Feb 2024. There were 4 interview rounds.
Aptitude text including technical and reasoning test
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 4 interview rounds.
Reasoning questions and Mathematical questions
posted on 14 Apr 2023
I applied via Company Website and was interviewed in Mar 2023. There were 4 interview rounds.
Basic Login and reasoning questions with some basic networking and CIA model-related questions.
OWASP Top 10 is a list of common web application vulnerabilities. CIA model is a framework for information security.
OWASP Top 10 includes vulnerabilities like injection, broken authentication, and cross-site scripting.
CIA model stands for confidentiality, integrity, and availability.
It is used to evaluate and improve the security of information systems.
For example, a company may use the CIA model to ensure that custome...
Threat, vulnerability, and risk are related to security while authentication and authorization are related to access control.
Threat is a potential danger that can exploit a vulnerability and cause harm.
Vulnerability is a weakness in a system that can be exploited by a threat.
Risk is the likelihood of a threat exploiting a vulnerability and the impact it will have.
Authentication is the process of verifying the identity ...
posted on 23 Aug 2023
I applied via Walk-in and was interviewed in Feb 2023. There were 4 interview rounds.
Numerical reasoning and logical reasoning a bit tough however can be clear
I applied via Walk-in and was interviewed in Jul 2023. There were 3 interview rounds.
Maths, reasoning, and it complicated
I appeared for an interview in Jun 2023, where I was asked the following questions.
posted on 2 Oct 2024
I applied via Company Website and was interviewed before Oct 2023. There were 2 interview rounds.
Basic aptitude MCQ questions
OWASP TOP 10 is a list of the top 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
SQL injection (SQLi) is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQLi occurs when an attacker inserts malicious SQL code into a query to manipulate the database.
Mitigation techniques include using parameterized queries, input validation, and stored procedures.
Example scenario: Attacker enters ' OR 1=1;--' into a login form to bypass authentication...
I applied via Walk-in and was interviewed in Oct 2022. There were 3 interview rounds.
There will be two set of papers one is Quantitative aptitude of 15 marks.
Technical aptitude based on cyber security.
HTTP uses port 80 and HTTPS uses port 443.
HTTP uses port 80 for communication between web servers and clients.
HTTPS uses port 443 for secure communication between web servers and clients.
Port numbers are used to identify specific processes running on a server.
Other common port numbers include 21 for FTP, 22 for SSH, and 25 for SMTP.
A vulnerability is a weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause damage.
Vulnerabilities can exist in software, hardware, or even human behavior.
Examples of vulnerabilities include unpatched software, weak passwords, and social engineering tactics.
Vulnerability assessments and penetration testing can help identify and mitigate vulnerabilities.
Regular updates and p...
A hacker or unauthorized user is someone who gains unauthorized access to a computer system or network.
Hackers can be individuals or groups with malicious intent or those who seek to expose vulnerabilities in a system for ethical reasons.
Unauthorized users can also include employees who abuse their access privileges or individuals who accidentally gain access to a system.
Examples of unauthorized access include phishing...
Top trending discussions
The duration of Qseap Infotech interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 17 interview experiences
Difficulty level
Duration
based on 95 reviews
Rating in categories
Information Security Consultant
168
salaries
| ₹2.1 L/yr - ₹8 L/yr |
Associate Information Security Consultant
127
salaries
| ₹2 L/yr - ₹5.7 L/yr |
Security Consultant
24
salaries
| ₹3.3 L/yr - ₹7 L/yr |
Information Security Analyst
21
salaries
| ₹4.2 L/yr - ₹10.4 L/yr |
Associate Security Consultant
15
salaries
| ₹2.5 L/yr - ₹6.5 L/yr |
Cyfuture
Maxgen Technologies
JoulestoWatts Business Solutions
Value Point Systems