Add office photos
Engaged Employer

Techdefence

4.0
based on 43 Reviews
Filter interviews by

Swami Sahajanand College Of Commerce And Management Interview Questions and Answers

Updated 18 Sep 2024

Q1. What is SQL injection?

Ans.

SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.

  • SQL injection occurs when an attacker inserts malicious SQL code into input fields on a website.

  • This code can then manipulate the database, steal data, or perform other unauthorized actions.

  • Example: Entering ' OR '1'='1' into a login form to bypass authentication.

Add your answer

Q2. What is resource flooding?

Ans.

Resource flooding is a type of cyber attack where an attacker overwhelms a system with excessive requests, causing it to become slow or unresponsive.

  • Resource flooding is a type of denial of service (DoS) attack.

  • Attackers flood a system with excessive requests, such as HTTP requests or network traffic, to overwhelm its resources.

  • This can lead to the system becoming slow or unresponsive, disrupting normal operations.

  • Common examples include HTTP flood attacks and UDP flood attac...read more

Add your answer

Q3. What is XSS attack?

Ans.

XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.

  • XSS stands for Cross-Site Scripting.

  • Attackers inject malicious scripts into web pages viewed by other users.

  • These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.

  • There are three types of XSS attacks: stored, reflected, and DOM-based.

  • Preventing XSS attacks involves input validation, output encoding, and using securi...read more

Add your answer

Q4. What is OTP flooding

Ans.

OTP flooding is a type of cyber attack where a large number of one-time passwords are sent to a target in order to overwhelm them.

  • OTP flooding is a form of denial-of-service attack.

  • Attackers flood the target with numerous OTPs, making it difficult for the target to use their legitimate OTP.

  • This type of attack can be used to disrupt services or gain unauthorized access to accounts.

  • Examples of OTP flooding include sending multiple OTPs to a target's phone or email in a short pe...read more

Add your answer
Discover Swami Sahajanand College Of Commerce And Management interview dos and don'ts from real experiences

Q5. Frameworks do you prefer when conducting IT compliance audits and why ?

Ans.

I prefer using a combination of COBIT and ISO 27001 frameworks for IT compliance audits.

  • I prefer COBIT for its comprehensive coverage of IT governance and control objectives.

  • I choose ISO 27001 for its focus on information security management best practices.

  • Combining both frameworks provides a holistic approach to IT compliance audits.

Add your answer

Q6. What is Active Directory, and how does it function within a networked environment?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks, providing centralized management of network resources.

  • Active Directory stores information about objects on the network such as computers, users, groups, and printers.

  • It allows administrators to manage and secure resources within the network by assigning permissions and policies.

  • Active Directory uses a hierarchical structure with domains, trees, and forests to organize network resources...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 602 Interview Questions
4.1
 • 247 Interview Questions
3.9
 • 209 Interview Questions
4.0
 • 202 Interview Questions
4.0
 • 165 Interview Questions
3.8
 • 140 Interview Questions
View all
Top Techdefence Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter