Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024.ย There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
I applied via LinkedIn and was interviewed in Jul 2023.ย There were 3 interview rounds.
I applied via Job Portal and was interviewed before Apr 2023.ย There was 1 interview round.
SecurEyes interview questions for popular designations
Top trending discussions
posted on 12 Feb 2025
I was interviewed in Jan 2025.
I applied via Approached by Company and was interviewed in Sep 2024.ย There were 4 interview rounds.
They will send you a link for aptitude test
Yes, I am comfortable with night shifts as I am able to adapt to different schedules and prioritize work efficiently.
I have previous experience working night shifts and have been able to perform well during those hours.
I am a night owl and find that I am more productive during the night.
I understand the importance of maintaining a healthy work-life balance and am willing to adjust my schedule to accommodate night shift
It takes me approximately 30 minutes to reach the office from my current location.
I live about 10 miles away from the office.
I usually drive to work, taking the highway to avoid traffic.
On average, it takes me half an hour to commute to the office.
I prefer to discuss salary expectations based on the responsibilities and requirements of the position.
Focus on discussing salary expectations based on the job role and industry standards.
Avoid disclosing current salary to ensure fair compensation.
Highlight relevant experience and skills that justify desired salary.
Discuss potential for growth and additional benefits instead of current salary.
I was a marketing manager at a tech company.
Managed marketing campaigns and strategies
Collaborated with cross-functional teams to drive brand awareness
Analyzed market trends and competitor activities
Implemented digital marketing initiatives
Organized events and promotions
Seeking new challenges and opportunities for growth.
Desire for career advancement
Lack of growth opportunities in previous organization
Seeking new challenges and learning experiences
IDfy is a leading identity verification and fraud prevention platform.
IDfy offers solutions for KYC verification, customer onboarding, and fraud detection.
Their platform uses AI and machine learning algorithms to verify identities in real-time.
IDfy serves a wide range of industries including finance, e-commerce, and healthcare.
The case study involves asking you about the documents and how will you verify fraud with the given documents like offer letter , and others. And the second
2 case study was
How will you teach the blind man colour blue
The answer was this was given by me hence it was out of the book
I applied via Recruitment Consulltant and was interviewed in Oct 2024.ย There was 1 interview round.
I worked on a project involving developing a new algorithm for optimizing network traffic. My role was to design and implement the algorithm, as well as test and debug it.
Researched existing algorithms and identified their limitations
Designed a new algorithm that addressed the limitations and improved network performance
Implemented the algorithm in code and tested it in a simulated network environment
Debugged issues an...
posted on 3 Jan 2025
I applied via Referral and was interviewed in Dec 2024.ย There was 1 interview round.
ACID properties are a set of properties that guarantee reliable and consistent transactions in a database system.
Atomicity ensures that either all operations in a transaction are completed successfully or none at all.
Consistency ensures that the database remains in a valid state before and after the transaction.
Isolation ensures that the concurrent execution of transactions results in a system state that would be obtai...
Idempotent HTTP requests are requests that can be repeated multiple times without changing the result beyond the initial request.
Idempotent requests have the same outcome no matter how many times they are executed.
GET, PUT, and DELETE HTTP methods are typically idempotent.
POST requests are not idempotent as they can create new resources with each execution.
posted on 18 Jan 2025
I applied via Indeed and was interviewed in Dec 2024.ย There were 3 interview rounds.
posted on 20 Nov 2024
I applied via Naukri.com and was interviewed in Oct 2024.ย There were 3 interview rounds.
Expanding the market can be achieved through market research, identifying new target demographics, developing new products or services, and implementing effective marketing strategies.
Conduct market research to identify potential new markets or untapped segments within the current market.
Analyze competitors to understand their strategies and identify opportunities for differentiation.
Develop new products or services th...
based on 4 interviews
Interview experience
based on 49 reviews
Rating in categories
Information Security Consultant
116
salaries
| โน4.8 L/yr - โน18.5 L/yr |
Associate Information Security Consultant
63
salaries
| โน3.5 L/yr - โน8.6 L/yr |
Junior Developer
6
salaries
| โน3.9 L/yr - โน6 L/yr |
Developer
5
salaries
| โน3.7 L/yr - โน6 L/yr |
Associate Information Technology Consultant
5
salaries
| โน2.6 L/yr - โน7 L/yr |
Trawex Technologies
Global Edge Software
Logelite
Virtual Galaxy Infotech