Filter interviews by
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Firewalls act as a barrier between a trusted internal network and untrusted external networks.
They can be hardware-based or software-based.
Firewalls can filter traffic based on IP addresses, ports, protocols, and applications.
Examples of firewalls include Cisco ASA, Palo Alto ...
IPsec stands for Internet Protocol Security, a protocol suite used to secure Internet Protocol (IP) communications.
IPsec provides authentication, integrity, and confidentiality for data transmitted over a network.
It can be used to create Virtual Private Networks (VPNs) to securely connect remote offices or users.
IPsec operates at the network layer of the OSI model and can be implemented through various protocols s...
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing an action on another website without their knowledge or consent.
CSRF attacks exploit the trust that a website has in a user's browser
Attackers can use CSRF to perform actions such as changing a user's password or making unauthorized purchases
Preventing CSRF involves using techniques such as CSRF tok...
Port numbers for different protocols used in networking.
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
OWASP top 10 vulnerabilities are the most critical web application security risks.
Injection flaws (SQL, NoSQL, OS)
Broken authentication and session management
Cross-site scripting (XSS)
Broken access control
Security misconfiguration
Insecure cryptographic storage
Insufficient logging and monitoring
Insecure communication
Using components with known vulnerabilities
Insufficient attack protection
EDR is a proactive approach to threat detection and response, while antivirus is a reactive approach to threat prevention.
EDR focuses on detecting and responding to threats in real-time, while antivirus focuses on preventing known threats from infecting a system.
EDR uses behavioral analysis and machine learning to identify suspicious activity, while antivirus relies on signature-based detection.
EDR provides more d...
Vulnerability management involves identifying, evaluating, and mitigating security vulnerabilities. Vulnerability scanners scan systems for known vulnerabilities. OWASP top 10 lists common web application security risks. SQL injection and XSS are common attack types. MITRE framework provides a structured approach to cybersecurity. Cyber-kill chain outlines the stages of a cyber attack. Malware analysis involves ex...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be mitigated by input validation and output encoding.
Input validation involves checking user input for malicious code and rejecting it if found.
Output encoding involves converting special characters to their HTML entity equivalents to pre...
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a database-driven application.
SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate or extract data from the database.
It can lead to unauthorized access, data breaches, data manipulation, or even complete system compromise.
To mitigate SQL injection, use parameterized que...
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQL injection can be prevented by using parameterized queries
Input validation and sanitization can also help mitigate this vulnerability
Limiting database privileges and using least privilege principle can also help prevent SQL injection
Regularly updating and patching the database softw...
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 3 interview rounds.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Firewalls act as a barrier between a trusted internal network and untrusted external networks.
They can be hardware-based or software-based.
Firewalls can filter traffic based on IP addresses, ports, protocols, and applications.
Examples of firewalls include Cisco ASA, Palo Alto Netwo...
I applied via Recruitment Consulltant and was interviewed before Feb 2023. There was 1 interview round.
Vulnerability management involves identifying, evaluating, and mitigating security vulnerabilities. Vulnerability scanners scan systems for known vulnerabilities. OWASP top 10 lists common web application security risks. SQL injection and XSS are common attack types. MITRE framework provides a structured approach to cybersecurity. Cyber-kill chain outlines the stages of a cyber attack. Malware analysis involves examini...
I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.
SQL injection is a code injection technique that attackers use to exploit vulnerabilities in a database-driven application.
SQL injection occurs when an attacker inserts malicious SQL code into a query, allowing them to manipulate or extract data from the database.
It can lead to unauthorized access, data breaches, data manipulation, or even complete system compromise.
To mitigate SQL injection, use parameterized queries ...
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing an action on another website without their knowledge or consent.
CSRF attacks exploit the trust that a website has in a user's browser
Attackers can use CSRF to perform actions such as changing a user's password or making unauthorized purchases
Preventing CSRF involves using techniques such as CSRF tokens a...
EDR is a proactive approach to threat detection and response, while antivirus is a reactive approach to threat prevention.
EDR focuses on detecting and responding to threats in real-time, while antivirus focuses on preventing known threats from infecting a system.
EDR uses behavioral analysis and machine learning to identify suspicious activity, while antivirus relies on signature-based detection.
EDR provides more detail...
Port numbers for different protocols used in networking.
HTTP - 80
HTTPS - 443
FTP - 20, 21
SSH - 22
SMTP - 25
DNS - 53
POP3 - 110
IMAP - 143
LDAP - 389
RDP - 3389
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be mitigated by input validation and output encoding.
Input validation involves checking user input for malicious code and rejecting it if found.
Output encoding involves converting special characters to their HTML entity equivalents to prevent ...
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQL injection can be prevented by using parameterized queries
Input validation and sanitization can also help mitigate this vulnerability
Limiting database privileges and using least privilege principle can also help prevent SQL injection
Regularly updating and patching the database software c...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be mitigated by sanitizing user input and output
Use input validation to ensure that user input is safe and does not contain any malicious code
Encode user input before displaying it on a web page
Use Content Security Policy (CSP) to restrict the...
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field for execution.
Attackers can use SQL injection to gain unauthorized access to sensitive data or execute malicious code.
To mitigate this vulnerability, input validation and parameterized queries can be used.
Regularly updating software and using web application firewalls can also help prevent SQL injection attacks.
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be mitigated by input validation and output encoding.
Input validation involves checking user input for malicious code and rejecting it if found.
Output encoding involves converting special characters to their HTML entity equivalents to prevent ...
Top trending discussions
I applied via Job Portal and was interviewed before Aug 2023. There was 1 interview round.
I applied via Company Website and was interviewed before Jun 2020. There were 5 interview rounds.
I applied via Indeed and was interviewed before Jun 2020. There were 5 interview rounds.
I applied via Campus Placement and was interviewed before Sep 2021. There were 4 interview rounds.
Questions mainly from Linked list.
I appeared for an interview in Feb 2025, where I was asked the following questions.
Some of the top questions asked at the Cumulus Systems Information Security Analyst interview -
based on 2 interview experiences
Difficulty level
Duration
based on 3 reviews
Rating in categories
Software Engineer
57
salaries
| ₹8.5 L/yr - ₹13.5 L/yr |
Senior Software Engineer
20
salaries
| ₹10.7 L/yr - ₹15.3 L/yr |
Information Security Analyst
18
salaries
| ₹5.4 L/yr - ₹12.9 L/yr |
Associate Software Engineer
11
salaries
| ₹6 L/yr - ₹10.5 L/yr |
QA Engineer
10
salaries
| ₹6 L/yr - ₹12 L/yr |
Karvy Financial Services
Reliance Money
Sonata Finance
Profectus Capital