Filter interviews by
I applied via Walk-in and was interviewed in Oct 2022. There were 3 interview rounds.
There will be two set of papers one is Quantitative aptitude of 15 marks.
Technical aptitude based on cyber security.
HTTP uses port 80 and HTTPS uses port 443.
HTTP uses port 80 for communication between web servers and clients.
HTTPS uses port 443 for secure communication between web servers and clients.
Port numbers are used to identify specific processes running on a server.
Other common port numbers include 21 for FTP, 22 for SSH, and 25 for SMTP.
A vulnerability is a weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause damage.
Vulnerabilities can exist in software, hardware, or even human behavior.
Examples of vulnerabilities include unpatched software, weak passwords, and social engineering tactics.
Vulnerability assessments and penetration testing can help identify and mitigate vulnerabilities.
Regular updates and p...
A hacker or unauthorized user is someone who gains unauthorized access to a computer system or network.
Hackers can be individuals or groups with malicious intent or those who seek to expose vulnerabilities in a system for ethical reasons.
Unauthorized users can also include employees who abuse their access privileges or individuals who accidentally gain access to a system.
Examples of unauthorized access include phishing...
I applied via Company Website and was interviewed in Sep 2024. There were 3 interview rounds.
Logical , the check their quantitative skills ability to solve problems
To utilize my technical skills and knowledge in cybersecurity to help organizations improve their security posture.
To apply my expertise in identifying vulnerabilities and implementing security measures
To contribute to the development and implementation of security policies and procedures
To assist in incident response and security assessments
To continuously learn and stay updated on the latest security trends and techn
OWASP Top 10 is a list of the 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
I applied via Referral and was interviewed in Feb 2024. There were 3 interview rounds.
Total 1-hour Aptitude round, Some Basics questions and then questions level was increasing after sometime within 1 hour
I applied via Walk-in and was interviewed in Feb 2024. There were 4 interview rounds.
Aptitude text including technical and reasoning test
Qseap Infotech interview questions for popular designations
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 4 interview rounds.
Reasoning questions and Mathematical questions
posted on 14 Apr 2023
I applied via Company Website and was interviewed in Mar 2023. There were 4 interview rounds.
Basic Login and reasoning questions with some basic networking and CIA model-related questions.
OWASP Top 10 is a list of common web application vulnerabilities. CIA model is a framework for information security.
OWASP Top 10 includes vulnerabilities like injection, broken authentication, and cross-site scripting.
CIA model stands for confidentiality, integrity, and availability.
It is used to evaluate and improve the security of information systems.
For example, a company may use the CIA model to ensure that custome...
Threat, vulnerability, and risk are related to security while authentication and authorization are related to access control.
Threat is a potential danger that can exploit a vulnerability and cause harm.
Vulnerability is a weakness in a system that can be exploited by a threat.
Risk is the likelihood of a threat exploiting a vulnerability and the impact it will have.
Authentication is the process of verifying the identity ...
posted on 23 Aug 2023
I applied via Walk-in and was interviewed in Feb 2023. There were 4 interview rounds.
Numerical reasoning and logical reasoning a bit tough however can be clear
I applied via Walk-in and was interviewed in Jul 2023. There were 3 interview rounds.
Maths, reasoning, and it complicated
posted on 2 Oct 2024
I applied via Company Website and was interviewed before Oct 2023. There were 2 interview rounds.
Basic aptitude MCQ questions
OWASP TOP 10 is a list of the top 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
SQL injection (SQLi) is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQLi occurs when an attacker inserts malicious SQL code into a query to manipulate the database.
Mitigation techniques include using parameterized queries, input validation, and stored procedures.
Example scenario: Attacker enters ' OR 1=1;--' into a login form to bypass authentication
posted on 5 Mar 2022
I applied via Indeed and was interviewed in Feb 2022. There were 3 interview rounds.
Reasoning ability and technical questions of fundamental of system and cyber security ports number
CIA triads are confidentiality, integrity, and availability. HTTPS is a secure version of HTTP.
CIA triads are the three pillars of information security.
Confidentiality ensures that only authorized parties can access data.
Integrity ensures that data is not tampered with or altered.
Availability ensures that data is accessible to authorized parties when needed.
HTTPS is a secure version of HTTP that encrypts data in transi...
Ports and tools used in information security
Common ports used in information security include 80 (HTTP), 443 (HTTPS), 22 (SSH), and 3389 (RDP)
Tools used in information security include Nmap, Wireshark, Metasploit, and Nessus
Port scanning tools like Nmap are used to identify open ports on a target system
Packet sniffing tools like Wireshark are used to capture and analyze network traffic
Vulnerability scanners like Nessus...
OWASP Top 10 is a list of common web application vulnerabilities.
Injection (SQL, LDAP, etc.)
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Broken Access Control
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Unvalidated and Unsanitized Input
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
I applied via Company Website and was interviewed before Mar 2023. There was 1 interview round.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between internal network and external networks
Filters incoming and outgoing traffic based on set rules
Can be hardware-based or software-based
Can block unauthorized access while allowing legitimate traffic
Can be configured to log and report on network activity
Top trending discussions
The duration of Qseap Infotech interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 16 interviews
Interview experience
based on 80 reviews
Rating in categories
Information Security Consultant
175
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Associate Information Security Consultant
109
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Security Consultant
19
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Information Security Analyst
15
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Senior Information Security Consultant
9
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
TCS
Infosys
Wipro
HCLTech