Filter interviews by
I applied via Company Website and was interviewed before Sep 2021. There was 1 interview round.
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to safeguard data and systems from potential threats.
It includes the protection of confidentiality, integrity, and availability of information.
Examples of information security measures include encryption, access cont...
OWASP top 10 2021 is a list of the most critical security risks to web applications.
Injection
Broken Authentication and Session Management
Cross-Site Scripting (XSS)
Security Misconfiguration
Insecure Cryptographic Storage
Insufficient Logging and Monitoring
Insecure Communication
Server-Side Request Forgery (SSRF)
Broken Access Control
Using Components with Known Vulnerabilities
CSRF and XSS are both web security vulnerabilities. CSRF allows attackers to perform unwanted actions on behalf of a user, while XSS allows attackers to inject malicious scripts into web pages.
CSRF (Cross-Site Request Forgery) is an attack that tricks the victim into performing unwanted actions on a website without their knowledge or consent.
XSS (Cross-Site Scripting) is an attack that allows attackers to inject malici...
SQL encryption is used to protect sensitive data stored in a database by converting it into unreadable form.
SQL encryption is used to prevent unauthorized access to sensitive data.
It converts the data into unreadable form using encryption algorithms.
Encrypted data can only be decrypted with the correct encryption key.
SQL encryption can be used to protect data at rest and data in transit.
Examples of SQL encryption techn...
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate the database.
Types of SQL injection include: 1) Classic SQL injection, 2) Blind SQL injection, 3) Time-based blind SQL injection, 4) Union-based SQL injection, 5) Error-based SQL injectio...
Assign tasks based on past performance by analyzing employee's strengths and weaknesses.
Analyze employee's past performance data
Identify their strengths and weaknesses
Assign tasks that align with their strengths
Provide training or support for areas of weakness
Regularly review and adjust task assignments based on performance
Consider employee preferences and career goals
Assuming the blog covers popular sports, the number of viewers can range from a few thousand to millions depending on the quality of content and marketing strategies.
Consider the popularity of the sports covered in the blog
Evaluate the quality of content and frequency of updates
Assess the marketing strategies used to promote the blog
Look at the engagement level of the blog's social media accounts
Take into account the c
A thief operating in shopping can earn anywhere from a few thousand to millions of dollars per year depending on their tactics and location.
The thief's location and the type of stores they target will greatly impact their earnings
Factors such as the thief's level of experience, skill, and risk-taking behavior will also play a role in their earnings
Some thieves may work alone while others may operate in organized groups...
To open the number lock on the bag, you need to try combinations of three numbers, ensuring that at least two of them are correct.
Start by trying the combinations of the first two numbers with each of the remaining six numbers.
If none of these combinations work, move on to the next pair of numbers and repeat the process.
Continue this pattern until you find a combination that opens the lock.
I applied via LinkedIn and was interviewed before Oct 2023. There were 2 interview rounds.
Giva a Full stack project. based on MERN AND MEAN stack
posted on 20 Jul 2021
NOC Analyst
13
salaries
| ₹6 L/yr - ₹8 L/yr |
Information Technology Recruiter
12
salaries
| ₹1.5 L/yr - ₹3 L/yr |
Security Analyst
11
salaries
| ₹2.4 L/yr - ₹5 L/yr |
Power BI Developer
9
salaries
| ₹3 L/yr - ₹6 L/yr |
Software Engineer
8
salaries
| ₹6.9 L/yr - ₹8 L/yr |
Primus Global Technologies
TriGeo Technologies
GrapplTech
Plada Infotech Services