Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
Top trending discussions
posted on 18 Apr 2024
Scenario questions logical solving
Need to explain about problems solved in previous round
I applied via Naukri.com
Answers to common interview questions for Software Engineer position
Option Strict and Option Explicit are compiler directives in VB.NET
Dispose() is used to release unmanaged resources while Finalize() is used for garbage collection
System.String is immutable while System.StringBuilder is mutable
Delegate is a type that represents a reference to a method
Value types store data directly while reference types store a referen...
I applied via Campus Placement and was interviewed before Jun 2023. There were 3 interview rounds.
15 objective questions related to basic DSA, OOPS
Nuts and bolts game, to output date in a certain format, one SQL query
I applied via Approached by Company and was interviewed in Aug 2021. There were 3 interview rounds.
Assignment to develop a prototype
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Will be given Requirement to write code for Restraunt. Based on that have write code for delivering orders by delivery boys.
posted on 14 Mar 2022
3 coding questions of moderate difficult
posted on 11 Aug 2022
I applied via Campus Placement and was interviewed in Jul 2022. There were 3 interview rounds.
Its was fully coding test using METTL platform in that there is only 1 session we need to attend having 6 questions all are Coding only. We don't need to complete all we can complete any of the question the time given was 1hr 30min in this i try to complete atleast 3 questions
based on 2 interviews
Interview experience
Information Security Consultant
121
salaries
| ₹5 L/yr - ₹18.5 L/yr |
Associate Information Security Consultant
65
salaries
| ₹3.5 L/yr - ₹8.7 L/yr |
Junior Developer
6
salaries
| ₹3.9 L/yr - ₹6 L/yr |
Developer
5
salaries
| ₹3.7 L/yr - ₹6 L/yr |
Associate Information Technology Consultant
5
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Global Edge Software
Moveinsync Technology Solutions
Exotel
Azuga Telematics