Filter interviews by
I applied via Company Website and was interviewed before Sep 2021. There was 1 interview round.
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to safeguard data and systems from potential threats.
It includes the protection of confidentiality, integrity, and availability of information.
Examples of information security measures include encryption, access cont...
OWASP top 10 2021 is a list of the most critical security risks to web applications.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Logging and Monitoring
Insecure Communication
Server-Side Request Forgery (SSRF)
Broken Access Control
Using Components with Known Vulnerabilities
CSRF and XSS are both web security vulnerabilities. CSRF allows attackers to perform unwanted actions on behalf of a user, while XSS allows attackers to inject malicious scripts into web pages.
CSRF (Cross-Site Request Forgery) is an attack that tricks the victim into performing unwanted actions on a website without their knowledge or consent.
XSS (Cross-Site Scripting) is an attack that allows attackers to inject malici...
SQL encryption is used to protect sensitive data stored in a database by converting it into unreadable form.
SQL encryption is used to prevent unauthorized access to sensitive data.
It converts the data into unreadable form using encryption algorithms.
Encrypted data can only be decrypted with the correct encryption key.
SQL encryption can be used to protect data at rest and data in transit.
Examples of SQL encryption techn...
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate the database.
Types of SQL injection include: 1) Classic SQL injection, 2) Blind SQL injection, 3) Time-based blind SQL injection, 4) Union-based SQL injection, 5) Error-based SQL injectio...
Top trending discussions
posted on 28 Oct 2022
I applied via Recruitment Consulltant and was interviewed before Oct 2021. There were 3 interview rounds.
Not applicable , this was final round
posted on 14 May 2022
I applied via Walk-in and was interviewed before May 2021. There were 3 interview rounds.
posted on 20 Jul 2021
posted on 28 Feb 2025
Basics of C language
posted on 2 Jun 2022
I applied via LinkedIn and was interviewed in Dec 2021. There was 1 interview round.
posted on 2 Jun 2022
I applied via LinkedIn and was interviewed in Dec 2021. There were 3 interview rounds.
posted on 2 Jun 2022
I applied via LinkedIn and was interviewed in Dec 2021. There was 1 interview round.
posted on 28 Jun 2022
I applied via LinkedIn and was interviewed in Dec 2021. There was 1 interview round.
posted on 10 Jul 2022
I applied via LinkedIn and was interviewed in Jan 2022. There was 1 interview round.
I have experience in software testing through manual and automated testing methods.
Performed manual testing on various software applications
Created and executed test cases to ensure software functionality
Utilized automated testing tools such as Selenium and JMeter
Collaborated with development team to identify and resolve software defects
Conducted regression testing to ensure software stability
Documented test results an
based on 38 reviews
Rating in categories
NOC Analyst
13
salaries
| ₹6 L/yr - ₹8 L/yr |
Information Technology Recruiter
12
salaries
| ₹1.5 L/yr - ₹3 L/yr |
Security Analyst
11
salaries
| ₹2.4 L/yr - ₹5 L/yr |
Power BI Developer
9
salaries
| ₹3 L/yr - ₹6 L/yr |
Software Engineer
8
salaries
| ₹6.9 L/yr - ₹8 L/yr |
Primus Global Technologies
TriGeo Technologies
GrapplTech
Plada Infotech Services