Filter interviews by
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
I applied via LinkedIn and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Job Portal and was interviewed before Apr 2023. There was 1 interview round.
SecurEyes interview questions for popular designations
Top trending discussions
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Will be given Requirement to write code for Restraunt. Based on that have write code for delivering orders by delivery boys.
I applied via Naukri.com
Answers to common interview questions for Software Engineer position
Option Strict and Option Explicit are compiler directives in VB.NET
Dispose() is used to release unmanaged resources while Finalize() is used for garbage collection
System.String is immutable while System.StringBuilder is mutable
Delegate is a type that represents a reference to a method
Value types store data directly while reference types store a referen...
posted on 15 Nov 2024
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
Promises in JavaScript are objects representing the eventual completion or failure of an asynchronous operation.
Promises are used to handle asynchronous operations in JavaScript.
They can be in one of three states: pending, fulfilled, or rejected.
Promises can be chained using .then() to handle success and .catch() to handle errors.
posted on 14 May 2024
Event loop in Node.js manages asynchronous operations by executing callback functions when certain events occur.
Event loop is responsible for handling I/O operations, timers, and callbacks in Node.js
It allows Node.js to perform non-blocking operations efficiently
Event loop continuously checks the event queue for new events to execute
posted on 28 Feb 2024
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There were 2 interview rounds.
It is not a aptitude just like a game
posted on 18 Mar 2024
based on 4 interviews
Interview experience
based on 52 reviews
Rating in categories
Information Security Consultant
121
salaries
| ₹5 L/yr - ₹18.5 L/yr |
Associate Information Security Consultant
65
salaries
| ₹3.5 L/yr - ₹8.7 L/yr |
Junior Developer
6
salaries
| ₹3.9 L/yr - ₹6 L/yr |
Developer
5
salaries
| ₹3.7 L/yr - ₹6 L/yr |
Associate Information Technology Consultant
5
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Global Edge Software
Moveinsync Technology Solutions
Exotel
Azuga Telematics