Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Clear (1)
A and B can complete a piece of work in 12 and 15 days, respectively. They work together for 4 days, and then A leaves. How many more days will B take to complete the work?
If 10 men can do a piece of work in 6 days, how long will it take for 15 men to complete it?
Find the Second Largest Number
Write a program to find the second largest number in an array.
Splunk is a software platform used for searching, monitoring, and analyzing machine-generated big data.
Splunk collects and indexes data from various sources like logs, events, and metrics.
It allows users to search, visualize, and analyze data in real-time.
Splunk can be used for security monitoring, troubleshooting, and business analytics.
Example: Splunk can be used to monitor network traffic for security threats.
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
Threat hunting hypothesis is a proactive approach to cybersecurity where analysts develop educated guesses about potential threats and then investigate to confirm or deny them.
Threat hunting hypothesis involves formulating educated guesses about potential threats based on available data and intelligence.
Analysts then investigate these hypotheses by actively searching for signs of compromise or malicious activity within...
Persistence is the ability of an attacker to maintain access to a compromised system, while lateral movement is the act of moving through a network to gain access to other systems.
Persistence involves maintaining access to a compromised system over time, often through backdoors or malware.
Lateral movement involves moving laterally through a network to gain access to other systems, often using compromised credentials or...
To investigate on EDR for a specific task, analyze logs, conduct endpoint forensics, review alerts, and collaborate with other teams.
Analyze EDR logs to identify any suspicious activities or anomalies
Conduct endpoint forensics to gather more information about the specific task
Review alerts generated by the EDR system for any relevant information
Collaborate with other teams such as incident response or threat intelligen...
I was interviewed in Jul 2024.
Phishing analysis involves examining suspicious emails or messages to identify potential threats and prevent security breaches.
Phishing analysis involves examining emails or messages for suspicious links, attachments, or requests for personal information.
Look for common phishing indicators such as misspelled URLs, generic greetings, urgent language, and requests for sensitive information.
Use tools like email filters, U...
What people are saying about Accenture
I applied via Naukri.com and was interviewed before Nov 2022. There were 3 interview rounds.
Accenture interview questions for designations
I applied via Campus Placement and was interviewed before Jan 2023. There were 2 interview rounds.
Basic aptitude for freshers
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Nov 2021. There were 4 interview rounds.
Accounting, investment banking, arithmetic
I applied via Campus Placement and was interviewed before Apr 2021. There were 4 interview rounds.
It contains Aptitude, reasoning and Essay Writing.
It contains pseudo code.
I applied via Campus Placement and was interviewed before Apr 2021. There were 4 interview rounds.
It contains Aptitude, reasoning and Essay Writing.
It contains pseudo code.
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
based on 9 interviews
Interview experience
based on 105 reviews
Rating in categories
Application Development Analyst
38.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Application Development - Senior Analyst
26.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
24.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
18.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
17.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Cognizant
Capgemini
Infosys