Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
I applied via Referral and was interviewed before Jun 2023. There were 3 interview rounds.
Basic aptitude topics
Scenario based questions
I applied via Naukri.com and was interviewed before Mar 2023. There were 4 interview rounds.
What people are saying about Accenture
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
I applied via Walk-in and was interviewed in Sep 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.
VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack
VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
CIA stands for Confidentiality, Integrity, and Availability. Splunk and IBM QRadar are both security information and event management (SIEM) tools.
CIA is a security model that focuses on protecting information by ensuring its confidentiality, integrity, and availability.
Splunk is a SIEM tool that collects, indexes, and analyzes machine data to provide insights into security events and threats.
IBM QRadar is another SIEM...
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Mitigating DDoS attacks involves implementing various strategies to protect against overwhelming traffic.
Implementing a strong firewall to filter out malicious traffic
Utilizing a content delivery network (CDN) to distribute traffic and reduce strain on servers
Using DDoS mitigation services or tools to detect and block attacks
Configuring network devices to limit the impact of attacks
Regularly monitoring network traffic
Approach RDP connection during analysis by examining logs, network traffic, and user activity.
Review RDP logs for any suspicious activity or unauthorized access.
Analyze network traffic for any anomalies or unusual patterns related to RDP connections.
Monitor user activity to identify any unauthorized or suspicious RDP sessions.
Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.
Look for faile...
Interview experience
based on 3 reviews
Rating in categories
Application Development Analyst
38.7k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
26.3k
salaries
| ₹6.8 L/yr - ₹20.2 L/yr |
Team Lead
24.1k
salaries
| ₹7 L/yr - ₹25.2 L/yr |
Senior Software Engineer
18.4k
salaries
| ₹6 L/yr - ₹19 L/yr |
Software Engineer
17.5k
salaries
| ₹3.6 L/yr - ₹12.8 L/yr |
TCS
Cognizant
Capgemini
Infosys