Upload Button Icon Add office photos

Filter interviews by

Accenture Security Associate Interview Questions and Answers

Updated 30 Jan 2024

Accenture Security Associate Interview Experiences

2 interviews found

Security Associate Interview Questions & Answers

user image Bharath Kumar

posted on 30 Jan 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected
Round 1 - Technical 

(1 Question)

  • Q1. Project overview in graduation

Interview Questionnaire 

2 Questions

  • Q1. It was good. The question ware asked basically from my semester syllabus
  • Q2. Questions were related to myself and my family

Security Associate Interview Questions Asked at Other Companies

Q1. How many type of fire ?

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What are the information in TCP IP Header?
  • Ans. 

    TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

    • Source IP address

    • Destination IP address

    • Source port number

    • Destination port number

    • Sequence number

    • Acknowledgment number

    • Header length

    • Checksum

  • Answered by AI
  • Q2. What is App ID in Palo Alto Firewalls?
  • Ans. 

    App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

    • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

    • It allows administrators to create policies based on specific applications rather than just ports or protocols.

    • App ID helps in enhancing security by allowing granular ...

  • Answered by AI
  • Q3. What is the SP3 Architecture of Palo Alto Firewalls?
  • Ans. 

    SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.

    • SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)

    • Security Processing Plane (SP) handles security functions like threat prevention and decryption

    • Control Plane (C) manages routing and firewall policies

    • Data Plane (D) processes and forwards traffic based on firewall pol...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Very Technical questions, starting from packet parsing and analysis.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Mostly from tcp/ip , dns, dhcp and firewall
Round 2 - Technical 

(1 Question)

  • Q1. Tcp/ip , dns , dhcp , paloalto firewall all features
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. About 3 way handshake
  • Q2. About difference between encoding and hashing

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is SIEM and how it is different from XDR
  • Ans. 

    SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.

    • SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.

    • XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.

    • SIEM is focused ...

  • Answered by AI
  • Q2. What is PAM and PIM
  • Ans. 

    PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.

    • PAM is a security solution that manages and monitors privileged access to critical systems and data.

    • PIM is a security solution that manages and secures privileged identities, such as administrator accounts.

    • Both PAM and PIM are important for protecting against insider threats and external attacks.

    • Examples of PAM and PIM solutio

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident while Answering all. Be karma on its way

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. What is cyber security
  • Ans. 

    Cyber security is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

    • Cyber security involves implementing measures to prevent cyber attacks and data breaches

    • It includes protecting against viruses, malware, and other malicious software

    • Cyber security also involves educating users on safe online practices

    • Examples of cyber security measures include fi...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. What is security
  • Ans. 

    Security refers to the measures taken to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information.

    • Security involves protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction

    • It includes measures such as encryption, firewalls, access controls, and security policies

    • Security is important in all areas, including personal, b...

  • Answered by AI

Skills evaluated in this interview

Accenture Interview FAQs

How many rounds are there in Accenture Security Associate interview?
Accenture interview process usually has 1 rounds. The most common rounds in the Accenture interview process are Technical.
How to prepare for Accenture Security Associate interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Accenture. The most common topics and skills that interviewers at Accenture expect are Information Security, Auditing, Risk Management, Consulting and Monitoring.

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Infosys Interview Questions
3.7
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
View all
Accenture Security Associate Salary
based on 51 salaries
₹3.4 L/yr - ₹5.6 L/yr
17% less than the average Security Associate Salary in India
View more details

Accenture Security Associate Reviews and Ratings

based on 4 reviews

3.4/5

Rating in categories

4.9

Skill development

2.6

Work-life balance

3.4

Salary

3.4

Job security

4.2

Company culture

3.4

Promotions

4.1

Work satisfaction

Explore 4 Reviews and Ratings
Application Development Analyst
38.9k salaries
unlock blur

₹3 L/yr - ₹12 L/yr

Application Development - Senior Analyst
27.6k salaries
unlock blur

₹6.8 L/yr - ₹20.2 L/yr

Team Lead
24.2k salaries
unlock blur

₹7 L/yr - ₹25.5 L/yr

Senior Software Engineer
18.4k salaries
unlock blur

₹6 L/yr - ₹19 L/yr

Software Engineer
17.6k salaries
unlock blur

₹3.6 L/yr - ₹12.7 L/yr

Explore more salaries
Compare Accenture with

TCS

3.7
Compare

Cognizant

3.8
Compare

Capgemini

3.8
Compare

Infosys

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview