Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
I applied via LinkedIn and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Job Portal and was interviewed before Apr 2023. There was 1 interview round.
SecurEyes interview questions for popular designations
Top trending discussions
I applied via Campus Placement and was interviewed before Jun 2023. There were 3 interview rounds.
15 objective questions related to basic DSA, OOPS
Nuts and bolts game, to output date in a certain format, one SQL query
I applied via Approached by Company and was interviewed in Aug 2021. There were 3 interview rounds.
Assignment to develop a prototype
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Will be given Requirement to write code for Restraunt. Based on that have write code for delivering orders by delivery boys.
I applied via Campus Placement and was interviewed in Feb 2024. There were 2 interview rounds.
It had 2 coding questions
based on 4 interviews
Interview experience
based on 49 reviews
Rating in categories
Information Security Consultant
119
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Information Security Consultant
63
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Developer
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Developer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Information Technology Consultant
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Trawex Technologies
Global Edge Software
Logelite
Virtual Galaxy Infotech