Techdefence
Swami Sahajanand College Of Commerce And Management Interview Questions and Answers
Q1. What is SQL injection?
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when an attacker inserts malicious SQL code into input fields on a website.
This code can then manipulate the database, steal data, or perform other unauthorized actions.
Example: Entering ' OR '1'='1' into a login form to bypass authentication.
Q2. What is resource flooding?
Resource flooding is a type of cyber attack where an attacker overwhelms a system with excessive requests, causing it to become slow or unresponsive.
Resource flooding is a type of denial of service (DoS) attack.
Attackers flood a system with excessive requests, such as HTTP requests or network traffic, to overwhelm its resources.
This can lead to the system becoming slow or unresponsive, disrupting normal operations.
Common examples include HTTP flood attacks and UDP flood attac...read more
Q3. What is XSS attack?
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.
There are three types of XSS attacks: stored, reflected, and DOM-based.
Preventing XSS attacks involves input validation, output encoding, and using securi...read more
Q4. What is OTP flooding
OTP flooding is a type of cyber attack where a large number of one-time passwords are sent to a target in order to overwhelm them.
OTP flooding is a form of denial-of-service attack.
Attackers flood the target with numerous OTPs, making it difficult for the target to use their legitimate OTP.
This type of attack can be used to disrupt services or gain unauthorized access to accounts.
Examples of OTP flooding include sending multiple OTPs to a target's phone or email in a short pe...read more
Q5. Frameworks do you prefer when conducting IT compliance audits and why ?
I prefer using a combination of COBIT and ISO 27001 frameworks for IT compliance audits.
I prefer COBIT for its comprehensive coverage of IT governance and control objectives.
I choose ISO 27001 for its focus on information security management best practices.
Combining both frameworks provides a holistic approach to IT compliance audits.
Q6. What is Active Directory, and how does it function within a networked environment?
Active Directory is a directory service developed by Microsoft for Windows domain networks, providing centralized management of network resources.
Active Directory stores information about objects on the network such as computers, users, groups, and printers.
It allows administrators to manage and secure resources within the network by assigning permissions and policies.
Active Directory uses a hierarchical structure with domains, trees, and forests to organize network resources...read more
Top HR Questions asked in Swami Sahajanand College Of Commerce And Management
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month