Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SSRF allows attackers to access internal resources, while CSRF allows attackers to perform actions on behalf of a user.
SSRF (Server-Side Request Forgery) allows attackers to make requests on behalf of the server, potentially accessing internal resources.
CSRF (Cross-Site Request Forgery) allows attackers to perform actions on a website on behalf of a user without their consent.
CSRF attacks can lead to unauthorized actio...
XSS stands for Cross-Site Scripting, a type of security vulnerability that allows attackers to inject malicious scripts into web pages.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or performing actions on behalf of the victim.
Types of XSS include reflected XSS, stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned to the...
JWT token is a JSON web token used for securely transmitting information between parties.
JWT token is encoded with a header, payload, and signature.
It is commonly used for authentication and information exchange in web applications.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
IDOR allows unauthorized access to data, while privilege escalation involves gaining higher levels of access than intended.
IDOR (Insecure Direct Object Reference) occurs when an attacker can access unauthorized data by manipulating object references in an application.
Privilege escalation involves gaining higher levels of access than intended, often by exploiting vulnerabilities in the system or application.
Example of I...
OAuth is an authorization protocol that allows third-party applications to obtain limited access to a user's account, while Auth is the process of verifying the identity of a user.
OAuth is used for authorization, while Auth is used for authentication.
OAuth allows a user to grant access to their resources without sharing their credentials, while Auth verifies the user's identity using credentials.
Example: OAuth is commo...
I applied via LinkedIn and was interviewed in Jul 2023. There were 3 interview rounds.
I applied via Job Portal and was interviewed before Apr 2023. There was 1 interview round.
SecurEyes interview questions for popular designations
Top trending discussions
I applied via Campus Placement and was interviewed before May 2021. There were 2 interview rounds.
Will be given Requirement to write code for Restraunt. Based on that have write code for delivering orders by delivery boys.
I applied via Naukri.com
Answers to common interview questions for Software Engineer position
Option Strict and Option Explicit are compiler directives in VB.NET
Dispose() is used to release unmanaged resources while Finalize() is used for garbage collection
System.String is immutable while System.StringBuilder is mutable
Delegate is a type that represents a reference to a method
Value types store data directly while reference types store a referen...
posted on 8 Jul 2024
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
Search for a target value in a rotated sorted array.
Use binary search to find the pivot point where the array is rotated.
Determine which half of the array the target value lies in based on the pivot point.
Continue binary search in the appropriate half of the array to find the target value.
Design IMDB with concurrent ratings management
Implement a locking mechanism to ensure only one user can update a rating at a time
Use a queue system to handle multiple rating requests in an orderly manner
Consider using distributed systems to handle high concurrency levels
Design a vehicle rental system API
Create endpoints for listing available vehicles, booking a vehicle, and returning a vehicle
Include authentication and authorization mechanisms for users and admins
Implement payment gateway integration for processing rental payments
Include features like vehicle search, filtering, and reviews/ratings
Consider scalability and performance optimizations for handling high traffic
posted on 19 Feb 2024
Discussion on experience and current role and responsibilities
A job scheduler is a software application that manages the scheduling of tasks or jobs to be executed by a computer system.
Define the job scheduling requirements such as priority, deadline, resource constraints, etc.
Implement a scheduling algorithm like First Come First Serve, Shortest Job First, Round Robin, etc.
Maintain a queue of jobs to be executed and allocate resources accordingly.
Monitor job execution and handle...
posted on 28 Feb 2024
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There were 2 interview rounds.
It is not a aptitude just like a game
posted on 18 Mar 2024
based on 4 interviews
Interview experience
based on 52 reviews
Rating in categories
Information Security Consultant
121
salaries
| ₹5 L/yr - ₹18.5 L/yr |
Associate Information Security Consultant
65
salaries
| ₹3.5 L/yr - ₹8.7 L/yr |
Junior Developer
6
salaries
| ₹3.9 L/yr - ₹6 L/yr |
Developer
5
salaries
| ₹3.7 L/yr - ₹6 L/yr |
Associate Information Technology Consultant
5
salaries
| ₹2.6 L/yr - ₹7 L/yr |
Global Edge Software
Moveinsync Technology Solutions
Exotel
Azuga Telematics