Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Cyber attacks in network are a major threat to organizations and can cause significant damage.
Cyber attacks can come in various forms such as malware, phishing, ransomware, and DDoS attacks.
Network security measures such as firewalls, intrusion detection systems, and antivirus software can help prevent cyber attacks.
Regular security audits and employee training can also help mitigate the risk of cyber attacks.
In the ev...
Application layers in cyber security refer to the different levels of software and protocols that make up an application.
Application layer is the topmost layer in the OSI model
It includes protocols like HTTP, SMTP, FTP, etc.
Security measures at this layer include firewalls, intrusion detection systems, and web application firewalls
Vulnerabilities at this layer include SQL injection, cross-site scripting, and session hi
What people are saying about Accenture
I applied via Company Website and was interviewed in Dec 2021. There were 8 interview rounds.
I'm attend the interview tomorrow
Accenture interview questions for designations
HCM extracts can be obtained through various modes such as BI Publisher, HCM Extracts, and HDL.
BI Publisher is used for creating custom reports
HCM Extracts are used for extracting data from HCM modules
HDL is used for bulk data loading and extraction
I applied via Campus Placement and was interviewed before Dec 2020. There were 4 interview rounds.
I have an iPhone 12 and a MacBook Pro, both classified as premium devices.
My iPhone 12 is a premium smartphone from Apple with a 6.1-inch Super Retina XDR display and A14 Bionic chip.
My MacBook Pro is a premium laptop from Apple with a 13-inch Retina display and M1 chip.
Both devices are classified as premium due to their high-end specifications and premium build quality.
I applied via Recruitment Consulltant and was interviewed before Jan 2021. There were 2 interview rounds.
Handle a P1 situation by prioritizing the issue, communicating effectively, and collaborating with team members.
Prioritize the issue based on impact and urgency
Communicate with stakeholders about the situation and potential solutions
Collaborate with team members to address the issue efficiently
It would be challenging to work all rotational shifts without shift allowance.
Working all rotational shifts without shift allowance can lead to burnout and decreased job satisfaction.
It may be difficult to maintain work-life balance without shift allowance.
Financial compensation for working rotational shifts is a common practice in many industries.
Without shift allowance, employees may feel undervalued and demotivated.
...
based on 5 interviews
1 Interview rounds
based on 21 reviews
Rating in categories
Application Development Analyst
39k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
27.4k
salaries
| ₹6.9 L/yr - ₹20.2 L/yr |
Team Lead
24.7k
salaries
| ₹7.1 L/yr - ₹26 L/yr |
Senior Software Engineer
18.2k
salaries
| ₹6 L/yr - ₹19.1 L/yr |
Senior Analyst
17.7k
salaries
| ₹5.5 L/yr - ₹21.3 L/yr |
TCS
Cognizant
Capgemini
Infosys