Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
I applied via LinkedIn and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Job Portal and was interviewed before Apr 2023. There was 1 interview round.
SecurEyes interview questions for popular designations
Top trending discussions
I have over 5 years of experience in customer support roles at various companies.
Managed customer inquiries via phone, email, and chat
Resolved customer complaints and issues in a timely manner
Provided product support and troubleshooting assistance
Collaborated with other departments to ensure customer satisfaction
Trained new customer support representatives
Current CTC is $50,000, Expected CTC is $60,000, Notice period is 30 days.
Current CTC: $50,000
Expected CTC: $60,000
Notice Period: 30 days
Palindrome code should be designed to check if a given string is the same forwards and backwards.
Create a function that takes a string as input
Remove any spaces and punctuation from the string
Reverse the string and compare it to the original string to check if it is a palindrome
ES6 introduced several new features and improvements to JavaScript, making it more powerful and efficient.
Arrow functions for more concise syntax
Let and const for block-scoped variables
Classes for easier object-oriented programming
Template literals for easier string interpolation
Default parameters and rest parameters for function arguments
Destructuring assignment for easier data extraction
Promises for asynchronous prog
Yes, let and const variables are hoisted but not initialized.
let and const variables are hoisted to the top of their block scope, but they are not initialized until the actual line of code is executed.
This means that you cannot access a let or const variable before it is declared in the code.
For example, trying to access a let variable before it is declared will result in a ReferenceError.
Global context refers to the overall environment or setting in which something exists or operates.
Global context encompasses all variables, functions, and objects that are accessible throughout an entire program.
It can be thought of as the 'big picture' view of a program's execution.
In web development, global context includes the window object in JavaScript.
Temporal dead zone is a period during the variable creation process where accessing the variable results in a ReferenceError.
Occurs when trying to access a variable before it has been declared with let or const
Happens due to the variable being in the temporal dead zone until it is declared
Example: accessing a variable before its declaration will result in a ReferenceError
Modules in Node.js are reusable blocks of code that encapsulate related functionality.
Modules in Node.js can be built-in modules like fs (file system) or third-party modules like express.
Modules help in organizing code into separate files for better maintainability and reusability.
Modules can be imported using the require() function in Node.js.
Indexes in MongoDB improve query performance by allowing the database to quickly locate and retrieve specific documents.
Indexes help to speed up query performance by allowing the database to quickly locate specific documents based on the indexed fields.
Without indexes, MongoDB would have to perform a collection scan, which can be slow and resource-intensive.
Indexes can be created on single fields or compound fields to ...
Hooks are a feature in React that allow you to use state and other React features in functional components. useRef is a hook that allows you to create a mutable object that persists for the lifetime of the component.
Hooks are used to add state and lifecycle methods to functional components in React
useRef is used to create a mutable reference that persists between renders
useRef can be used to access DOM elements directl
Mongoose is an Object Data Modeling (ODM) library for MongoDB that provides a higher level of abstraction and simplifies interactions with the database.
Mongoose provides schema validation which helps maintain data integrity.
Mongoose simplifies querying and data manipulation with built-in functions.
Mongoose supports middleware functions for pre and post processing of data operations.
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
I am passionate about driving organizational effectiveness and employee engagement through strategic HR initiatives.
I have a strong background in HR strategy and business partnering
I enjoy collaborating with cross-functional teams to drive positive change
I am excited about the opportunity to make a meaningful impact on the organization's culture and performance
I applied via Referral and was interviewed in Oct 2024. There were 3 interview rounds.
4 easy level questions will be asked basically from arrays and strings.
Assignment will be given after clearing coding round. In my case ELearning Platform project was given and 7 days time was given to complete.
posted on 17 Dec 2024
I applied via LinkedIn and was interviewed in Nov 2024. There were 2 interview rounds.
Utilize AWS or Azure services for scalable web applications
Use AWS Elastic Beanstalk or Azure App Service for easy deployment and scaling
Leverage AWS Lambda or Azure Functions for serverless computing
Utilize AWS Auto Scaling or Azure Autoscale to automatically adjust resources based on traffic
Store data in AWS RDS or Azure SQL Database for scalable database solutions
Use AWS CloudFront or Azure CDN for content delivery
I would use memory profiling tools to identify the source of the leaks and then fix them by properly managing memory allocation and deallocation.
Use memory profiling tools like Valgrind or Instruments to identify the source of the leaks
Review the code to ensure proper memory allocation and deallocation practices are being followed
Implement smart pointers or garbage collection to automatically manage memory
Use static co...
Yes, I have experience working on legacy systems.
I have successfully maintained and upgraded legacy systems to meet current business needs.
I have refactored legacy code to improve performance and scalability.
I have integrated new technologies with legacy systems to enhance functionality.
I have experience troubleshooting and debugging issues in legacy systems.
Yes, I have experience working with cross functional teams and resolving disputes effectively.
I have successfully collaborated with team members from different departments to achieve project goals.
I am skilled at mediating conflicts and finding mutually beneficial solutions.
I prioritize open communication and actively listen to all team members' perspectives.
I have experience using conflict resolution techniques such a
Interview experience
based on 46 reviews
Rating in categories
Information Security Consultant
117
salaries
| ₹4.8 L/yr - ₹18.5 L/yr |
Associate Information Security Consultant
59
salaries
| ₹3.5 L/yr - ₹8.6 L/yr |
Junior Developer
6
salaries
| ₹3.9 L/yr - ₹6 L/yr |
Developer
5
salaries
| ₹3.7 L/yr - ₹6 L/yr |
Associate Information Technology Consultant
5
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Accel Frontline
Northcorp Software
Elentec Power India (EPI) Pvt. Ltd.
HyScaler