Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Naukri.com and was interviewed in Jun 2021. There were 3 interview rounds.
Our WAPT approach involves a comprehensive testing methodology to identify and address vulnerabilities in web applications.
We use a combination of automated and manual testing techniques
We prioritize vulnerabilities based on their severity and potential impact
We work closely with development teams to ensure timely remediation
We conduct regular retesting to ensure vulnerabilities have been properly addressed
Scopes refer to the boundaries or limits of a particular security system or protocol.
Scopes define the extent of access or control that a user or system has within a security system.
Scopes can be defined by user roles, permissions, or other criteria.
Examples of scopes include network access, file permissions, and application privileges.
Brute forcing is a method of guessing a password or encryption key by trying all possible combinations.
Brute forcing is a trial-and-error method used to crack passwords or encryption keys.
It involves trying all possible combinations until the correct one is found.
This method can be time-consuming and resource-intensive.
Brute forcing can be used for both online and offline attacks.
Examples of tools used for brute forcin
CSRF vulnerability allows attackers to perform actions on behalf of a user without their consent.
CSRF attacks can be prevented by implementing CSRF tokens
The token is generated by the server and included in the form or URL
When the form is submitted, the token is verified to ensure it matches the one generated by the server
If the token is invalid, the request is rejected
CSRF vulnerabilities can be exploited to perform a...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be classified into three types: Stored, Reflected, and DOM-based.
Attackers can use XSS to steal sensitive information, such as login credentials or session tokens.
Preventing XSS requires input validation, output encoding, and proper use of sec...
XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
XSS attacks can be used to steal sensitive information, such as login credentials or personal data.
Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.
XSS vulnerabilities can be prevented by properly s...
A basic XSS payload is a script injected into a website to execute malicious code on a victim's browser.
Use the
SQL Injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.
Attackers use SQL Injection to gain unauthorized access to sensitive data
It can be prevented by using parameterized queries and input validation
Types include In-band, Inferential, and Out-of-band
Examples of SQL Injection attacks include UNION-based and Error-based attacks
SQL Payload to extract sensitive data from a database
Use UNION SELECT to combine data from different tables
Use subqueries to extract specific data
Use SQL injection to bypass authentication and access data
Use ORDER BY to sort data in a specific way and extract specific data
Use GROUP BY to group data and extract specific data
Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.
Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access
Using stolen credentials to bypass authorization checks
Exploiting misconfigured access controls to gain elevated privileges
Using brute force attacks to guess valid credentials
Exploiting session mana
Broken authentication & authorization is when an attacker gains access to a user's account or system without proper credentials.
An attacker can exploit this by guessing or stealing a user's login credentials.
They can also use brute force attacks to crack weak passwords.
Another way is to exploit vulnerabilities in the authentication process, such as session hijacking or cookie theft.
Once the attacker gains access, they ...
Implemented various security measures in API development and testing.
Implemented authentication and authorization mechanisms such as OAuth2 and JWT.
Implemented rate limiting and throttling to prevent DDoS attacks.
Implemented input validation and output encoding to prevent injection attacks.
Conducted API penetration testing to identify vulnerabilities and remediate them.
Implemented encryption and decryption mechanisms t
I have tested various kinds of APIs including REST, SOAP, GraphQL, and more.
I have experience testing REST APIs which use HTTP methods like GET, POST, PUT, DELETE.
I have also tested SOAP APIs which use XML for data exchange.
I have worked with GraphQL APIs which allow clients to specify the data they need.
I am familiar with testing APIs that use authentication and authorization mechanisms.
I have tested APIs that integra...
There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.
SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database
Cross-site scripting: attackers inject malicious scripts into a website to steal user data
Buffer overflow: attackers exploit a program's buffer to execute malicious code
Other types include CSRF, DoS, and privilege escal...
Broken Object Level Authorization (BOLA) is a vulnerability where an attacker can access unauthorized data by manipulating object references.
BOLA occurs when an application fails to enforce proper access controls on object references.
Attackers can exploit BOLA to access sensitive data or functionality by manipulating object references.
Examples of BOLA include accessing other users' data, modifying data that should be r...
I have tested various types of mobile applications including social media, e-commerce, and banking apps.
I have tested social media apps like Facebook, Twitter, and Instagram
I have tested e-commerce apps like Amazon, Flipkart, and eBay
I have tested banking apps like Chase, Bank of America, and Wells Fargo
SSL pinning can be bypassed by modifying the app's code or using a tool to intercept and modify the SSL traffic.
Modify the app's code to disable SSL pinning
Use a tool like Frida or Cydia Substrate to intercept and modify SSL traffic
Use a man-in-the-middle attack to intercept and modify SSL traffic
Use a custom SSL certificate to bypass SSL pinning
Use a debugger to bypass SSL pinning
Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
Frida allows you to inject JavaScript or native code into an application to perform dynamic analysis.
It can be used to hook functions, intercept network traffic, and bypass SSL pinning.
Frida supports both iOS and Android platforms.
It can be used for both offensive and defensive security purposes.
nmap is a network exploration tool used to scan and map networks and identify open ports and services.
nmap can be used to identify hosts and services on a network
It can also be used to identify open ports and vulnerabilities
nmap can be used to perform ping scans, TCP scans, and UDP scans
It can also be used to perform OS detection and version detection
nmap can be used with various options and flags to customize the scan
oX in nmap is used to specify the IP protocol number to use for scanning.
oX is followed by the protocol number (e.g. oX1 for ICMP protocol)
It can be used with other nmap options like -sS or -sU
It is useful for scanning non-standard protocols
I was interviewed in Feb 2025.
I'm interested fresher HR manager
I'm interested fresher HR manager best performance
I'm interested fresher HR manager best conference
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
The number of variances in SAP can vary depending on the specific processes and transactions being analyzed.
The number of variances in SAP can be influenced by factors such as data entry errors, system glitches, or discrepancies in invoice processing.
Variances in SAP may be identified through reconciliation processes, exception reports, or manual reviews of accounts payable transactions.
Examples of variances in SAP inc...
Accounts receivable and accounts payable are two important aspects of a company's financial operations.
Accounts receivable refers to money owed to a company by its customers for goods or services provided.
Accounts payable refers to money owed by a company to its suppliers or vendors for goods or services received.
Accounts receivable is an asset on the balance sheet, while accounts payable is a liability.
Managing accoun...
Cost element and cost center are key concepts in accounting for tracking and allocating costs within an organization.
Cost element refers to the specific types of costs incurred by an organization, such as materials, labor, or overhead.
Cost center is a specific department, team, or function within an organization that is responsible for incurring costs.
Cost elements are assigned to cost centers to track and allocate cos...
SAP supports over 160 currencies worldwide.
SAP supports over 160 currencies for global transactions.
Currencies can be configured in SAP using transaction code OB22.
Each currency is assigned a unique currency code (e.g. USD for US Dollar, EUR for Euro).
There are various types of projects, including internal projects, external projects, research projects, and development projects.
Internal projects focus on improving processes within the organization.
External projects involve working with external partners or clients.
Research projects aim to gather data and analyze findings.
Development projects focus on creating new products or services.
Examples: IT system implementati...
What people are saying about Accenture
Aptitude test consists 2 section first section is of of Logical reasoning , Verbal reasoning and Analytical Reasoning
and next section is of technical mcqs MS office , cloud , networking and security , Pseudo code related mcqs
After that there were
Data Structures and Algorithms was the most difficult subject for me in my curriculum.
I struggled with understanding complex data structures like graphs and trees.
I overcame this by seeking help from professors, classmates, and online resources.
I practiced solving problems regularly on platforms like LeetCode and HackerRank.
I also joined study groups to discuss and work on challenging problems together.
Developed a web application for managing student records using HTML, CSS, JavaScript, and PHP
Used HTML for structuring the web pages
Utilized CSS for styling the pages and making them visually appealing
Implemented client-side functionality using JavaScript
Backend logic and database management done with PHP
Included features like student registration, course enrollment, and grade tracking
Accenture interview questions for popular designations
I was interviewed in Dec 2024.
-Basic Accounting questions like simple journals , Accounting principles and concepts.
-Basic Excel tasks like questions (commonly used simple formulas ,chart preparation, pivot tables
etc,)
-Email writing.
-Simple Aptitude and Logical Reasoning questions.
Prepare well and try to attend maximum questions with better accuracy. Overall aptitude test is simple.
I am a detail-oriented professional with experience in R2R processes and a strong focus on accuracy and efficiency.
Experienced in reconciling accounts and preparing financial statements
Proficient in using accounting software such as SAP and Oracle
Strong analytical skills and ability to identify and resolve discrepancies
Excellent communication skills and ability to work effectively in a team
Bachelor's degree in Accounti
Accrual concept refers to recognizing revenues and expenses when they are incurred, regardless of when cash is exchanged.
Accrual concept is a fundamental accounting principle that states that revenues and expenses should be recognized when they are incurred, not when cash is exchanged.
This concept helps in providing a more accurate representation of a company's financial position and performance.
For example, if a compa...
Deferral accounting recognizes revenue or expenses when they are earned or incurred, while accrual accounting recognizes revenue or expenses when they are realized or incurred.
Deferral accounting involves postponing the recognition of revenue or expenses until a later period.
Accrual accounting involves recognizing revenue or expenses when they are incurred, regardless of when cash is exchanged.
Deferral accounting is co...
Accrual and deferral transactions involve recording revenues or expenses before or after they are actually earned or incurred.
Accrual transactions involve recording revenues or expenses before they are actually earned or incurred
Deferral transactions involve recording revenues or expenses after they are actually earned or incurred
Examples of accrual transactions include recognizing revenue for services provided but not...
Bank reconciliation is the process of comparing a company's records with those of the bank to ensure they match.
Gather bank statements and company records
Compare deposits, withdrawals, and fees on both sets of records
Identify and resolve any discrepancies
Adjust the company's records to match the bank's records
Prepare a bank reconciliation statement to document the process
Example: If the company recorded a deposit of $5...
Depreciation is the allocation of the cost of tangible assets over their useful life, while amortization is the allocation of the cost of intangible assets over their useful life.
Depreciation applies to tangible assets like buildings, machinery, and vehicles, while amortization applies to intangible assets like patents, copyrights, and trademarks.
Depreciation is usually calculated using methods like straight-line, doub...
Provisions are liabilities that are certain to occur, while contingencies are potential liabilities that may or may not occur.
Provisions are recognized when the amount is known with reasonable certainty, while contingencies are disclosed in the financial statements as a footnote.
Provisions are measured at the best estimate of the amount required to settle the obligation, while contingencies are disclosed if the outcome...
Get interview-ready with Top Accenture Interview Questions
I am a detail-oriented Sourcing Analyst with a strong background in procurement and vendor management.
Over 5 years of experience in strategic sourcing and contract negotiation
Proficient in analyzing market trends and supplier performance
Skilled in cost reduction strategies and supplier relationship management
I have 5 years of experience as a Sourcing Analyst in the retail industry.
Managed vendor relationships and negotiated contracts
Analyzed market trends and pricing to make strategic sourcing decisions
Implemented cost-saving initiatives resulting in a 10% reduction in procurement costs
Collaborated with cross-functional teams to ensure supply chain efficiency
The P2P cycle refers to the process of procuring goods or services, receiving them, and paying for them.
The cycle starts with identifying the need for a product or service and creating a purchase requisition.
Next, the purchase requisition is approved and converted into a purchase order.
The supplier delivers the goods or services, which are then received and inspected by the buyer.
Once the goods/services are accepted, a...
I am a detail-oriented Sourcing Analyst with a strong background in procurement and supplier management.
Experienced in analyzing supplier performance and negotiating contracts
Skilled in identifying cost-saving opportunities and improving supply chain efficiency
Proficient in using sourcing tools and software such as SAP Ariba
Strong communication and interpersonal skills for building relationships with suppliers
I was interviewed in Jan 2025.
I was interviewed in Feb 2025.
Debit note is a document issued by a buyer to a seller to request a credit for overpayment or return of goods. Credit note is a document issued by a seller to a buyer to reduce the amount owed due to overpayment or return of goods.
Debit note is issued by the buyer to request a credit from the seller.
Credit note is issued by the seller to reduce the amount owed by the buyer.
Debit note is used when there is an overpaymen...
Matching principle is an accounting concept that requires expenses to be matched with revenues in the period they are incurred.
Expenses should be recorded in the same period as the revenues they helped generate.
It ensures accurate financial reporting by showing the true cost of generating revenue.
Example: If a company sells products in January, the cost of goods sold for those products should also be recorded in Januar...
A subledger is a detailed record of transactions that feed into the general ledger.
Subledgers provide more detailed information on specific accounts or categories.
They help in tracking individual transactions before they are summarized in the general ledger.
Examples include accounts receivable subledger, accounts payable subledger, and inventory subledger.
Bank reconciliation statement is a document that compares the bank's records with the company's records of its bank account.
It is used to ensure the accuracy of the company's financial records.
It lists out any discrepancies between the two sets of records, such as outstanding checks or deposits in transit.
The goal is to reconcile the balance per the company's records with the balance per the bank's records.
It helps in ...
I was interviewed in Jan 2025.
Polymorphism is the ability of a single function or method to operate on different data types.
Allows objects of different classes to be treated as objects of a common superclass.
Can be achieved through method overloading or method overriding.
Example: Animal class with methods eat() and sleep(), and subclasses like Dog and Cat that override these methods.
The == operator checks for equality of values, while the equals() method checks for equality of objects.
The == operator compares the values of two objects, while the equals() method compares the objects themselves.
The == operator is used for primitive data types, while the equals() method is used for objects.
Example: int a = 5; int b = 5; a == b will return true, but a.equals(b) will not work as int is a primitive data
Dependency inversion is a design principle where high-level modules should not depend on low-level modules, but both should depend on abstractions.
High-level modules should not depend on low-level modules, both should depend on abstractions
Abstractions should not depend on details, details should depend on abstractions
Inversion of control containers like Spring Framework in Java implement dependency inversion
ACID is a set of properties that guarantee database transactions are processed reliably.
ACID stands for Atomicity, Consistency, Isolation, Durability
Atomicity ensures that all operations in a transaction are completed successfully or none at all
Consistency ensures that the database remains in a valid state before and after the transaction
Isolation ensures that multiple transactions can occur concurrently without affect...
Isolation levels in databases determine how transactions interact with each other.
Isolation levels define the degree to which one transaction must be isolated from the effects of other transactions.
Common isolation levels include READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, and SERIALIZABLE.
Higher isolation levels provide more data consistency but may impact performance.
For example, in READ COMMITTED isolation le...
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There was 1 interview round.
Some other CRMs include Salesforce, Microsoft Dynamics, and Zoho CRM.
Salesforce is a popular CRM used by many companies for sales and marketing purposes.
Microsoft Dynamics is known for its integration with other Microsoft products and its customization options.
Zoho CRM is a cloud-based CRM solution that offers a wide range of features for managing customer relationships.
Yes, I am comfortable with Marketing CRM capabilities and have experience in building and utilizing them.
I have experience in implementing and customizing Marketing CRM systems to meet business needs.
I have utilized Marketing CRM capabilities to track customer interactions, manage campaigns, and analyze data for insights.
I have integrated Marketing CRM with other systems to streamline processes and improve efficiency.
O...
Plugins are custom code that can be added to extend functionality, while workflows are automated processes that can be triggered by events.
Plugins are custom code that can be added to extend the functionality of a system.
Workflows are automated processes that can be triggered by events in a system.
Plugins can be used to add new features or customize existing ones.
Workflows can automate repetitive tasks and streamline p...
Canvas Apps are highly customizable and visually rich, while Model Driven Apps are more structured and data-driven. Both can be integrated with CRM using customizations.
Canvas Apps allow for more flexibility in design and layout, with drag-and-drop functionality for components.
Model Driven Apps are more focused on data and business processes, with a predefined data model and UI components.
Both types of apps can be cust...
I hold Microsoft certifications in Azure and SQL Server. No pending renewals.
Certifications in Azure and SQL Server
No pending renewals
Power BI helps in visualizing data through interactive and customizable dashboards.
Power BI allows users to create visually appealing charts, graphs, and maps to represent data in a meaningful way.
Basic dashboards in Power BI typically include simple visuals like bar charts, line graphs, and pie charts to display key metrics.
Advanced dashboards in Power BI involve more complex visuals like heat maps, scatter plots, and...
I have worked with over 20 connectors in Power Apps, including SharePoint, Outlook, and SQL Server.
Worked with over 20 connectors in Power Apps
Familiar with connectors such as SharePoint, Outlook, and SQL Server
I have extensive experience with C#, .Net, and SQL.
Over 5 years of hands-on experience with C# and .Net development
Proficient in writing complex SQL queries and stored procedures
Experience in optimizing database performance and data modeling
Familiar with Entity Framework and LINQ for data access
Developed multiple web applications using ASP.NET MVC framework
Implemented a CRM project for a retail company to streamline customer interactions and improve sales.
Analyzed business requirements and designed the CRM system architecture
Customized CRM software to fit the specific needs of the retail company
Integrated CRM with existing systems for seamless data flow
Trained end users on how to effectively use the CRM system
Implemented data analytics tools to track customer interaction
Yes, I have explored AI features integrating with CRM and I believe Copilot capabilities can greatly enhance productivity and efficiency.
I have experience implementing AI chatbots for customer service in CRM systems
AI features can automate repetitive tasks, improve data accuracy, and provide personalized customer interactions
Copilot capabilities can assist users in making data-driven decisions and predicting customer b...
Marketing CRM includes customer data management, campaign tracking, lead generation, and customer engagement.
Customer data management involves storing and organizing customer information such as contact details, purchase history, and preferences.
Campaign tracking allows marketers to monitor the performance of their marketing campaigns, including metrics like open rates, click-through rates, and conversions.
Lead generat...
Workflows are a series of tasks that are automated to achieve a specific goal, while Power Automate is a tool that allows users to create automated workflows.
Workflows are a sequence of tasks that are executed in a specific order to achieve a desired outcome
Power Automate is a platform that enables users to automate workflows across various applications and services
Workflows can be manual or automated, while Power Auto...
Yes, in C# you can quickly write code to a plugin using classes.
Yes, in C# you can quickly write code to a plugin by creating a class that implements a specific interface or inherits from a base class.
Classes in C# are blueprints for creating objects. They can contain fields, properties, methods, events, and more.
For example, you can create a plugin interface and then create a class that implements that interface to wr
The duration of Accenture interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 6.8k interviews
Interview experience
based on 56.6k reviews
Rating in categories
Bangalore / Bengaluru
8-12 Yrs
Not Disclosed
Bangalore / Bengaluru
3-6 Yrs
Not Disclosed
Application Development Analyst
38.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Application Development - Senior Analyst
26.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
24.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
18.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
17.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Cognizant
Capgemini
Infosys