Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Referral and was interviewed in Feb 2023. There were 2 interview rounds.
OWASP top 10 is a list of the top 10 most critical web application security risks.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
Writing exploit scripts is a crucial skill for a Security Analyst.
Understand the vulnerability and its impact
Research existing exploits and modify them for specific targets
Use scripting languages like Python or PowerShell
Test the exploit in a controlled environment before using it in production
I applied via Company Website and was interviewed in Dec 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed before Mar 2021. There were 2 interview rounds.
Packet flow in HTTP, DNS, TCP, daily work, specific products, VPNs, and Load balancers.
HTTP packets contain request and response headers and data
DNS packets contain queries and responses for domain name resolution
TCP packets establish and maintain connections between hosts
Daily work involves monitoring network traffic and identifying security threats
Specific products may include firewalls, intrusion detection systems, ...
What people are saying about Accenture
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a framework for understanding and categorizing cyber threats.
It consists of tactics, techniques, and procedures (TTPs) used by attackers.
Organizations can use MITRE ATT&CK to improve their threat detection and response capabilities.
Examples of MITRE ATT&CK techniques include spear ...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Vulnerability management in cloud environment involves identifying, prioritizing, and mitigating security weaknesses.
Regularly scan cloud infrastructure for vulnerabilities
Patch and update software to address vulnerabilities
Implement access controls and encryption to protect data
Utilize security tools like intrusion detection systems and firewalls
Monitor and analyze security logs for suspicious activity
Storage maintenance in Azure involves monitoring, optimizing, and managing storage resources to ensure performance and availability.
Regularly monitor storage usage and performance metrics
Optimize storage by implementing tiered storage and data archiving
Manage access controls and permissions to prevent unauthorized access
Implement backup and disaster recovery strategies for data protection
Update storage configurations a
It had multiple aptitude questions with programming questions
I applied via LinkedIn and was interviewed in Sep 2023. There were 2 interview rounds.
Easy test to crack with practice.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
based on 68 reviews
Rating in categories
Application Development Analyst
38.9k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
26.2k
salaries
| ₹6.8 L/yr - ₹20.2 L/yr |
Team Lead
24.1k
salaries
| ₹7 L/yr - ₹25.3 L/yr |
Senior Software Engineer
18.4k
salaries
| ₹6 L/yr - ₹19 L/yr |
Software Engineer
17.6k
salaries
| ₹3.6 L/yr - ₹12.8 L/yr |
TCS
Cognizant
Capgemini
Infosys