Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2022. There were 2 interview rounds.
I enjoy hiking, reading, and playing board games.
Hiking: I love exploring new trails and challenging myself physically.
Reading: I enjoy a variety of genres, from fiction to non-fiction.
Board games: I like strategy games that require critical thinking and problem-solving.
We have implemented a phased approach to ensure safety of employees and continuity of business operations.
Implemented work from home policy for non-essential employees
Provided necessary equipment and resources for remote work
Implemented social distancing measures in office premises
Provided PPEs to employees
Conducted regular health screenings and temperature checks
Implemented contact tracing protocols
Regularly communica
posted on 18 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a comprehensive list of techniques used by attackers to compromise systems.
Techniques are categorized into tactics such as Initial Access, Execution, Persistence, etc.
Examples of techniques include Spearphishing Attachment, Command and Scripting Interpreter, and Registry Run Keys / S
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via LinkedIn and was interviewed in Jan 2023. There were 2 interview rounds.
SIEM is a security information and event management system that collects and analyzes security data. XDR is an advanced threat detection and response platform that goes beyond SIEM.
SIEM collects and analyzes security data from various sources such as firewalls, servers, and endpoints.
XDR uses advanced analytics and machine learning to detect and respond to threats across multiple endpoints and networks.
SIEM is focused ...
PAM stands for Privileged Access Management and PIM stands for Privileged Identity Management.
PAM is a security solution that manages and monitors privileged access to critical systems and data.
PIM is a security solution that manages and secures privileged identities, such as administrator accounts.
Both PAM and PIM are important for protecting against insider threats and external attacks.
Examples of PAM and PIM solutio
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
I applied via Approached by Company and was interviewed in Nov 2022. There were 5 interview rounds.
based on 3 reviews
Rating in categories
Application Development Analyst
38.9k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
26.2k
salaries
| ₹6.8 L/yr - ₹20.2 L/yr |
Team Lead
24.1k
salaries
| ₹7 L/yr - ₹25.2 L/yr |
Senior Software Engineer
18.3k
salaries
| ₹6 L/yr - ₹19 L/yr |
Software Engineer
17.6k
salaries
| ₹3.6 L/yr - ₹12.8 L/yr |
TCS
Cognizant
Capgemini
Infosys