Filter interviews by
Cryptography is the practice of secure communication in the presence of third parties.
It involves techniques for secure communication and data protection
Uses mathematical algorithms to encrypt and decrypt data
Examples include AES, RSA, and SHA
Cryptography is used in various fields such as finance, military, and healthcare
Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.
Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.
Hashing is irreversible while encryption is reversible.
Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be prevented by properly validating and sanitizing user input.
Developers should also use output encoding to prevent malicious scripts from being executed.
Using Content Security Policy (CSP) can also help prevent XSS attacks.
Examples of XSS att...
CSRF stands for Cross-Site Request Forgery. It is a type of attack that tricks a user into performing an action they did not intend to.
CSRF occurs when a malicious website or email tricks a user into clicking a link or button that performs an action on a different website where the user is already authenticated.
To prevent CSRF attacks, websites can use techniques such as CSRF tokens, which are unique values generated f...
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
posted on 15 Jun 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
I applied via Company Website and was interviewed before Aug 2022. There were 2 interview rounds.
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.
It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.
Subnet masks are used to determine which part of an IP ad...
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers are typically used to connect different networks, such as a home netw...
The methodology approach for API and web pen test involves identifying vulnerabilities, testing for exploits, and reporting findings.
Identify the scope of the test and the target systems
Perform reconnaissance to gather information about the target
Test for common vulnerabilities such as SQL injection and cross-site scripting
Test for exploits to determine the impact of vulnerabilities
Report findings and provide recommend
CSRF tokens are used to prevent unauthorized access to sensitive data or actions on a website.
CSRF tokens add an extra layer of security to web applications by ensuring that requests are coming from an authenticated user.
They are generated by the server and included in forms or URLs to verify the authenticity of the request.
Without CSRF tokens, attackers can use cross-site scripting (XSS) attacks to trick users into un...
OWASP vulnerabilities commonly encountered in security analysis
Injection flaws (SQL, LDAP, OS command, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
Using components with known vulnerabilities
Insecure communication (e.g. lack of encryption)
Broken access control
XML External Entities (XXE)
posted on 21 Jul 2022
I applied via Naukri.com and was interviewed before Jul 2021. There were 3 interview rounds.
Discussed in person or over email
I prefer to discuss this in person or over email
I am open to negotiation based on the job requirements
I applied via LinkedIn and was interviewed before Nov 2021. There were 3 interview rounds.
Was given a business case and was asked to come up with a PPT presentation for a consulting engagement with
Scope
Approach
Timelines
Deliverables
Recommendations
In the area of revenue assurance for a telecom client
posted on 20 Sep 2020
I applied via Referral and was interviewed in Aug 2020. There were 4 interview rounds.
based on 1 interview
Interview experience
Associate Consultant
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Analyst
59
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Security Analyst
23
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate Consultant
19
salaries
| ₹0 L/yr - ₹0 L/yr |
SOC Analyst
14
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Kratikal Tech Private Limited
Instasafe Technologies
Safe Security