i
SATTRIX Information Security
Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2022. There were 2 interview rounds.
Top trending discussions
The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.
Identify the scope of the test and the target systems
Perform reconnaissance to gather information about the target
Test for common vulnerabilities such as SQL injection and cross-site scripting
Test for exploits to determine the impact of vulnerabilities
Report findings and provide recommend
CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.
CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.
They are generated by the server and included in forms or URLs to verify the authenticity of the request.
Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...
OWASP vulnerabilities commonly encountered in security analysis
Injection flaws (SQL, LDAP, OS command, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
Using components with known vulnerabilities
Insecure communication (e.g. lack of encryption)
Broken access control
XML External Entities (XXE)
posted on 21 Jul 2022
I applied via Naukri.com and was interviewed before Jul 2021. There were 3 interview rounds.
Discussed in person or over email
I prefer to discuss this in person or over email
I am open to negotiation based on the job requirements
posted on 7 Dec 2021
I applied via Naukri.com and was interviewed in Nov 2021. There were 3 interview rounds.
posted on 22 Aug 2024
I applied via Approached by Company and was interviewed in Jul 2024. There were 2 interview rounds.
posted on 14 Jul 2023
I applied via Referral and was interviewed before Jul 2022. There were 3 interview rounds.
CIA stands for Confidentiality, Integrity, and Availability in the context of information security.
Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.
Integrity: Ensuring that information is accurate and has not been tampered with.
Availability: Ensuring that information is accessible when needed by authorized users.
Example: Encrypting sensitive data to maintain confident...
I applied via Approached by Company and was interviewed in Oct 2021. There were 3 interview rounds.
I was interviewed in Feb 2023.
Solunk Architecture is a cloud-based security architecture that focuses on securing data and applications in the cloud.
Solunk Architecture emphasizes on securing data and applications in the cloud
It provides a comprehensive security framework for cloud environments
It includes features such as encryption, access control, and monitoring
Solunk Architecture helps organizations protect their sensitive information from cyber
The Cyber kill chain is a model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
The Cyber kill chain was developed by Lockheed Martin to help organizations understand and defend against cyber attacks.
The stages of the Cyber kill chain include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
By understanding e...
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
I came across a vulnerability in a web application that allowed for SQL injection attacks.
Identified lack of input validation in user inputs
Discovered that the application was directly executing user-supplied SQL queries
Suggested implementing parameterized queries to prevent SQL injection
Tested the vulnerability by attempting to inject SQL code through input fields
It depends on the specific use case and requirements.
TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.
UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.
Choose TCP for applications that require reliable data transmission, such as ...
Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.
Hashing is commonly used in password storage to securely store user passwords without storing the actual password.
Hashing is used in digital signatures to ensure the integrity of the signed data.
Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.
File integrity checks ...
Some of the top questions asked at the SATTRIX Information Security Cyber Security Analyst interview for experienced candidates -
based on 10 reviews
Rating in categories
Cyber Security Engineer
55
salaries
| ₹0 L/yr - ₹0 L/yr |
Cyber Security Analyst
49
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
36
salaries
| ₹0 L/yr - ₹0 L/yr |
SOC Analyst
31
salaries
| ₹0 L/yr - ₹0 L/yr |
Information Security Analyst
26
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Kratikal Tech Private Limited
Safe Security
TCS