Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Allied Digital Services Team. If you also belong to the team, you can get access from here

Allied Digital Services Verified Tick

Compare button icon Compare button icon Compare
3.4

based on 538 Reviews

Filter interviews by

Allied Digital Services Senior Security Analyst Interview Questions and Answers

Updated 3 Aug 2023

Allied Digital Services Senior Security Analyst Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(1 Question)

  • Q1. Ctc details Previous experience Location Notice period
Round 3 - One-on-one 

(4 Questions)

  • Q1. Jon description SIEM architecture Networking Concepts MSSP work Client management
  • Q2. Explain SIEM architecture
  • Ans. 

    SIEM architecture refers to the design and structure of a Security Information and Event Management system.

    • SIEM architecture typically consists of data collection, normalization, correlation, and analysis components.

    • Data collection involves gathering security event data from various sources such as logs, network traffic, and endpoints.

    • Normalization standardizes the collected data into a common format for easier analysi...

  • Answered by AI
  • Q3. Critical port no
  • Q4. Previous work experience

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
2
Poor
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(7 Questions)

  • Q1. What is Blind XSS? What is the technique to find one?
  • Ans. 

    Blind XSS is a type of XSS attack where the attacker does not receive the output of the injected script.

    • Blind XSS is also known as non-persistent XSS.

    • It is difficult to detect as the attacker does not receive any feedback.

    • One technique to find Blind XSS is to use a tool like Burp Suite to inject a payload and monitor the server response.

    • Another technique is to use a third-party service like XSS Hunter to track the payl...

  • Answered by AI
  • Q2. What is your favorite vulnerability? explain that
  • Ans. 

    My favorite vulnerability is SQL injection.

    • SQL injection is a type of attack where an attacker injects malicious SQL code into a database query.

    • It can be used to steal sensitive information, modify or delete data, or even take control of the entire database.

    • Preventing SQL injection involves using parameterized queries, input validation, and proper error handling.

    • Examples of high-profile SQL injection attacks include th...

  • Answered by AI
  • Q3. What is CRLF? explain that
  • Ans. 

    CRLF stands for Carriage Return Line Feed. It is a sequence of characters used to represent a line break in text files.

    • CRLF consists of two ASCII control characters: CR (carriage return) and LF (line feed).

    • It is commonly used in HTTP headers to separate lines of text.

    • CRLF can be exploited by attackers to inject malicious code or perform attacks such as HTTP response splitting.

    • To prevent such attacks, input validation a...

  • Answered by AI
  • Q4. How many XSS are there? what will be the mitigation?
  • Ans. 

    There are numerous types of XSS attacks. Mitigation involves input validation and output encoding.

    • There are three main types of XSS attacks: stored, reflected, and DOM-based.

    • Mitigation involves input validation to ensure that user input is safe and output encoding to prevent malicious code from being executed.

    • Examples of input validation include limiting the length of input and restricting the types of characters that ...

  • Answered by AI
  • Q5. Explain the process of SQLi. Mitigation?
  • Ans. 

    SQLi is a type of injection attack where an attacker injects malicious SQL code into a vulnerable application to gain unauthorized access to sensitive data.

    • SQLi involves exploiting vulnerabilities in web applications that allow user input to be executed as SQL commands

    • Attackers can use SQLi to bypass authentication, access sensitive data, modify or delete data, and even take control of the entire database

    • Mitigation tec...

  • Answered by AI
  • Q6. Explain the process of CSRF
  • Ans. 

    CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.

    • The attacker creates a website with a form that submits a request to the target website

    • The user visits the attacker's website and submits the form, unknowingly performing an action on the target website

    • The target website cannot distinguish between a legitimate request and the forged request from the attacke...

  • Answered by AI
  • Q7. What will be the best way to send CSRF token in the Clint Server communication?
  • Ans. 

    The best way to send CSRF token in client-server communication is through HTTP headers.

    • HTTP headers are the most secure way to send CSRF tokens.

    • The token should be sent in the 'X-CSRF-Token' header.

    • The header should be set to 'SameSite=Strict' to prevent cross-site request forgery attacks.

    • The token should be regenerated for each session to prevent replay attacks.

  • Answered by AI
Round 3 - Technical 

(3 Questions)

  • Q1. Help me understand If I need to take over a higher-privilege account with an existing lower-privilege account what are the options available?
  • Ans. 

    Options to take over a higher-privilege account with an existing lower-privilege account.

    • Use privilege escalation techniques to gain higher privileges

    • Exploit vulnerabilities in the system to gain access to higher-privilege accounts

    • Use social engineering to obtain login credentials for higher-privilege accounts

    • Use brute-force attacks to crack passwords for higher-privilege accounts

  • Answered by AI
  • Q2. Some scenario-based questions that are going to land take over an account with XSS
  • Q3. Different types of XSS
  • Ans. 

    XSS or Cross-Site Scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • Reflected XSS: The attacker injects a script that is reflected back to the user through a search query or form input.

    • Stored XSS: The attacker injects a script that is stored on the server and executed whenever the user visits the affected page.

    • DOM-based XSS: The attacker...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I was interviewed by Cigniti and their client Linde, the second interview was organized by Linde. Both interviews cleared, but because of the time delay by Linde, the Final interview was not scheduled till now, now it's almost one month. If anyone get this kind of opportunity from Cigniti think before you accept the offer, in the end, they will not take responsibility for your time and effort. Because of the incident, I loose one of the good opportunities from another organization.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. Questions on Firewall
  • Q2. Questions on Switching
  • Q3. NAT, HA, IPSEC, SSL VPN

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident.. study deep into concepts.. be good with the technical skills on routing, switching and firewalls

I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security related questions
  • Q2. VAPT , DAST, SAST in cyber security
  • Q3. Ethical hacking in cyber security
  • Ans. 

    Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.

    • Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.

    • The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.

    • Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Microland Cyber Security Analyst interview:
  • Cyber security
Interview preparation tips for other job seekers - I impressed by the leadership team of this company

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. Depends upon client,iOS Upgradation,ospf,bgp,hsrp,vlan,vpn,nat, firewall rule.blocking.l etc
  • Q2. Need to read sd wan
  • Q3. Firewall traffic flow
  • Q4. Stp and vtp how to work need depth knowledge
Round 3 - HR 

(1 Question)

  • Q1. About joining and PKG.

Interview Preparation Tips

Interview preparation tips for other job seekers - Read about switch and firewall and one routing protocol

I applied via Approached by Company and was interviewed in Nov 2021. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Osi model, cyber security related questions, types of attacks,and final year project details

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview was every easy if know all the basic concepts of cyber

I applied via LinkedIn and was interviewed before Apr 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. MDM tools and it's characteristics?
  • Ans. 

    MDM tools are used to manage and secure mobile devices in an organization.

    • MDM stands for Mobile Device Management.

    • These tools allow organizations to remotely manage and control mobile devices.

    • Characteristics of MDM tools include device enrollment, policy enforcement, app management, and remote wipe.

    • Examples of MDM tools include Microsoft Intune, VMware AirWatch, and MobileIron.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - If you're fresher or some other domain, they will hire if you interested.

Skills evaluated in this interview

I applied via Naukri.com and was interviewed before May 2017. There were 5 interview rounds.

Interview Questionnaire 

4 Questions

  • Q1. Started with checkpoint, anti spoofing, Clustering, SIC Communication, Checkpoint commands etc
  • Q2. ASA - Security levels, Difference between 8.3 pre and post, Transparent and Routed mode firewall, VPN, Stateful and stateless failover. Commands related to vpn
  • Ans. 

    The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.

    • ASA firewall has security levels assigned to interfaces to control traffic flow

    • The 8.3 version of ASA introduced significant changes in NAT configuration

    • Transparent mode firewall operates at Layer 2 and d...

  • Answered by AI
  • Q3. F5, Basics like LB Methods, VIP, POOL, POOL MEMBERS, Self ip, floating ip, profiles, Failover, commands to check the route etc
  • Q4. Why you wants to join Microland, how soon you can join, and in return the brief notes about the Microland

Interview Preparation Tips

Round: Manager round
Experience: About the nature of work, the incident flow, change flow, ITIL related stuffs , any other expectation apart from the salary stack etc

General Tips: Interview process is very easy here in Microland, if you have theory and bit of practice, can crack it. All the very best
Skills: Security , Communication, Body Language
Duration: 1-3 Months

Skills evaluated in this interview

Allied Digital Services Interview FAQs

How many rounds are there in Allied Digital Services Senior Security Analyst interview?
Allied Digital Services interview process usually has 3 rounds. The most common rounds in the Allied Digital Services interview process are Resume Shortlist, HR and One-on-one Round.
What are the top questions asked in Allied Digital Services Senior Security Analyst interview?

Some of the top questions asked at the Allied Digital Services Senior Security Analyst interview -

  1. Explain SIEM architect...read more
  2. Jon description SIEM architecture Networking Concepts MSSP work Client managem...read more
  3. Critical port...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 Allied Digital Services interview
Job Portal
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.2k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.7k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
LTIMindtree Interview Questions
3.9
 • 2.8k Interviews
Mphasis Interview Questions
3.4
 • 783 Interviews
View all

Allied Digital Services Senior Security Analyst Reviews and Ratings

based on 1 review

3.0/5

Rating in categories

3.0

Skill development

3.0

Work-Life balance

3.0

Salary & Benefits

4.0

Job Security

4.0

Company culture

2.0

Promotions/Appraisal

3.0

Work Satisfaction

Explore 1 Review and Rating
Engineer- Customer Support
197 salaries
unlock blur

₹1.2 L/yr - ₹4.5 L/yr

Desktop Support Engineer
121 salaries
unlock blur

₹1.5 L/yr - ₹4 L/yr

Network Engineer
109 salaries
unlock blur

₹2 L/yr - ₹6 L/yr

Service Desk Engineer
70 salaries
unlock blur

₹2 L/yr - ₹6.5 L/yr

Technical Support Engineer
52 salaries
unlock blur

₹1.5 L/yr - ₹5.5 L/yr

Explore more salaries
Compare Allied Digital Services with

HCLTech

3.5
Compare

Tech Mahindra

3.6
Compare

Wipro

3.7
Compare

TCS

3.7
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview