Filter interviews by
Clear (1)
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Allows attackers to access sensitive data
Can modify or delete data
Can execute commands on the server
Can be prevented by input validation and parameterized queries
SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.
Attackers use SQL injection to gain unauthorized access to sensitive data or to modify or delete data in a database.
SQL injection can be prevented by using parameterized queries, input validation, and proper error handling.
Example: An attacker could use SQL injection to bypass login credentials and gain acc...
Top trending discussions
I applied via Referral and was interviewed in Nov 2019. There were 3 interview rounds.
A Security Analyst is responsible for testing web applications, identifying vulnerabilities, and implementing security measures to protect against attacks.
Testing a web application involves various techniques such as penetration testing, vulnerability scanning, and code review.
CSRF (Cross-Site Request Forgery) is an attack that tricks a victim into performing unwanted actions on a web application.
SSRF (Server-Side Requ...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before Dec 2023. There was 1 interview round.
I applied via AmbitionBox and was interviewed before Oct 2021. There were 2 interview rounds.
Firewall is a security system that monitors and controls incoming and outgoing network traffic. OSI is a model for network communication.
Firewall is a hardware or software-based security system that filters network traffic based on predefined rules.
It acts as a barrier between a trusted internal network and an untrusted external network.
OSI (Open Systems Interconnection) is a model for network communication that define...
OWASP Top 10 is a list of the most critical web application security risks.
It is updated every 3-4 years by the Open Web Application Security Project (OWASP)
The current version is OWASP Top 10 2017
The list includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more
It is used as a guide for developers and security professionals to prioritize security efforts
I applied via Naukri.com and was interviewed before Mar 2021. There were 4 interview rounds.
It had multiple aptitude questions with programming questions
Senior Software Engineer
819
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
750
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Test Engineer
433
salaries
| ₹0 L/yr - ₹0 L/yr |
Test Engineer
372
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Analyst
232
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech