Filter interviews by
The OWASP Top Ten is a list of the most critical web application security risks.
The OWASP Top Ten is updated regularly to reflect the evolving threat landscape.
It helps organizations prioritize their security efforts and focus on the most common vulnerabilities.
Examples of vulnerabilities in the OWASP Top Ten include injection attacks, cross-site scripting (XSS), and broken authentication.
By addressing the issues in th...
Cybersecurity is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
It involves implementing security measures to prevent cyber attacks
It includes protecting against viruses, malware, and other malicious software
It also involves educating users on safe online practices
Examples of cybersecurity measures include firewalls, encryption, and multi-fact...
API stands for Application Programming Interface. It is a set of protocols, routines, and tools for building software applications.
API allows different software applications to communicate with each other
It defines how software components should interact
APIs can be used to access data or functionality from a third-party service
Examples of APIs include Google Maps API, Twitter API, and Facebook API
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is vulnerable to attacks like man-in-the-middle while HTTPS is secure against such attacks.
HTTPS uses SSL/TLS certificates to encrypt data while HTTP does not.
HTTPS is used for secure online t...
Top trending discussions
I applied via Referral and was interviewed in Nov 2022. There were 2 interview rounds.
I appeared for an interview before Apr 2024, where I was asked the following questions.
The Linux kernel is the core component of the Linux operating system, managing hardware and system resources.
Monolithic architecture: The Linux kernel is monolithic, meaning it includes all essential services in one large block of code.
Process management: It handles process scheduling, multitasking, and inter-process communication.
Memory management: The kernel manages system memory, including allocation and deallocatio...
AES (Advanced Encryption Standard) is a symmetric encryption algorithm used for securing data.
AES operates on fixed block sizes of 128 bits and supports key sizes of 128, 192, or 256 bits.
It uses a series of transformations including substitution, permutation, and mixing of input data.
AES is widely used in various applications, including securing communications over the internet (e.g., HTTPS).
The algorithm is efficient...
posted on 6 Mar 2025
HTTPS enhances security but does not guarantee 100% protection against all threats.
HTTPS encrypts data in transit, protecting it from eavesdropping.
It does not prevent attacks like phishing, where users are tricked into revealing credentials.
Vulnerabilities in the website's code can still be exploited, regardless of HTTPS.
Man-in-the-middle attacks can occur if the user is on an insecure network.
SSL/TLS certificates can...
posted on 25 Aug 2021
posted on 19 Nov 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Check if a number is prime and optimize the code.
Start by checking if the number is less than 2, in which case it is not prime.
Iterate from 2 to the square root of the number and check if any of them divide the number evenly.
If a divisor is found, the number is not prime. Otherwise, it is prime.
To optimise API calls in React, use asynchronous functions and caching techniques.
Use async/await to handle API calls
Implement caching to reduce network requests
Use memoization to avoid unnecessary re-renders
Consider using a state management library like Redux
Use performance profiling tools like React DevTools
posted on 9 Feb 2022
I applied via Campus Placement
Online Coding Test included some aptitude questions, technical questions followed by 3 coding questions
posted on 15 Feb 2022
I applied via Campus Placement
In this round you have to clear Aptitude and Basic Coding
It is pure coding test which is conduct on hacker rank platform. You have to complete 4 question(1 easy + 2 medium + 1 hard)
posted on 24 Oct 2023
I applied via Approached by Company and was interviewed before Oct 2022. There were 3 interview rounds.
Find duplicate items in array of strings.
Iterate through array and store each item in a hash set.
If item already exists in hash set, it is a duplicate.
posted on 18 Mar 2025
I appeared for an interview before Mar 2024, where I was asked the following questions.
Software Engineer
7
salaries
| ₹2.5 L/yr - ₹13.8 L/yr |
Software Developer
7
salaries
| ₹2 L/yr - ₹6.6 L/yr |
Software Associate
5
salaries
| ₹3 L/yr - ₹5.5 L/yr |
QA Engineer
5
salaries
| ₹3 L/yr - ₹12.1 L/yr |
Senior Pega Developer
4
salaries
| ₹12.5 L/yr - ₹23 L/yr |
Zidio Development
Northcorp Software
Accel Frontline
Elentec Power India (EPI) Pvt. Ltd.