Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
Top trending discussions
posted on 18 Apr 2024
Scenario questions logical solving
Need to explain about problems solved in previous round
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Will be given Requirement to write code for Restraunt. Based on that have write code for delivering orders by delivery boys.
I applied via Naukri.com
Answers to common interview questions for Software Engineer position
Option Strict and Option Explicit are compiler directives in VB.NET
Dispose() is used to release unmanaged resources while Finalize() is used for garbage collection
System.String is immutable while System.StringBuilder is mutable
Delegate is a type that represents a reference to a method
Value types store data directly while reference types store a referen...
posted on 7 Apr 2024
Technical mcq from basic of dsa
Question from DSA and time will given to solve it
posted on 25 Jun 2024
I applied via Campus Placement and was interviewed in Dec 2023. There were 3 interview rounds.
Easy to medium level questions were asked
Questions were given asked to explain the concept
posted on 18 Jul 2024
I applied via Campus Placement and was interviewed in Jan 2024. There were 2 interview rounds.
DSA MCQ in online platform
Basic closings like lists/array/string
posted on 26 Jul 2024
I applied via Campus Placement and was interviewed in Jan 2024. There were 4 interview rounds.
Online MCQs - 15 Questions (Aps, DSA, Output Prediction)
1 Question (with 3 Enhancement)
Remove middle element from a stack with odd length
Find the middle index of the stack by dividing the length by 2
Remove the element at the middle index
Adjust the stack by shifting elements if necessary
based on 2 interviews
Interview experience
Information Security Consultant
121
salaries
| ₹4.9 L/yr - ₹16.2 L/yr |
Associate Information Security Consultant
63
salaries
| ₹3.6 L/yr - ₹9.7 L/yr |
Junior Developer
6
salaries
| ₹3.9 L/yr - ₹6 L/yr |
Developer
5
salaries
| ₹3.7 L/yr - ₹6 L/yr |
Associate Information Technology Consultant
5
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Global Edge Software
Moveinsync Technology Solutions
Exotel
Azuga Telematics