Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Amdocs Team. If you also belong to the team, you can get access from here

Amdocs Verified Tick

Compare button icon Compare button icon Compare
3.8

based on 3.9k Reviews

Filter interviews by

Amdocs Cyber Security Consultant Interview Questions and Answers

Updated 24 May 2024

Amdocs Cyber Security Consultant Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-

I applied via Job Portal

Round 1 - Technical 

(1 Question)

  • Q1. XSS,IDOR,CORS,SSRF

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Practice baaics networking questions Tcp/ip etc.
  • Q2. Fibre is also important, practice that too.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Pipes and cistern
  • Q2. Time and work
Round 2 - Aptitude Test 

Time and work, distance speed and time,pipes and cistern, blood relation

Interview Preparation Tips

Interview preparation tips for other job seekers - Time management is the key
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-

I applied via Job Portal

Round 1 - Technical 

(2 Questions)

  • Q1. Explain osi model in detail.
  • Ans. 

    The OSI model is a conceptual framework that defines the functions of a network into seven distinct layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It was developed by the International Organization for Standardization (ISO) in 1984.

    • The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has its own specific functions and prot...

  • Answered by AI
  • Q2. Tell me your responsibalities in your current role.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is vcn in cloud
  • Ans. 

    VCN stands for Virtual Cloud Network, which is a customizable and private network in the cloud.

    • VCN allows you to define your own IP address range, subnets, route tables, and gateways.

    • It provides isolation and security for your cloud resources.

    • You can connect multiple VCNs together or to your on-premises network using VPN or dedicated connections.

  • Answered by AI
  • Q2. Public cloud concept

Interview Preparation Tips

Interview preparation tips for other job seekers - Cloud operations concept

Skills evaluated in this interview

Interview experience
2
Poor
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Jul 2023.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. How we can rectify the pc which is generate broadcast
  • Ans. 

    To rectify a PC generating broadcast, check for misconfigured network settings, update network drivers, disable unnecessary services, and monitor network traffic.

    • Check for misconfigured network settings such as incorrect IP address or subnet mask

    • Update network drivers to ensure compatibility and stability

    • Disable unnecessary services or applications that may be causing excessive network traffic

    • Monitor network traffic us...

  • Answered by AI
  • Q2. What are type of network cable
  • Ans. 

    Types of network cables include Ethernet, coaxial, fiber optic, and twisted pair cables.

    • Ethernet cables are commonly used for wired networks and come in categories like Cat5, Cat6, and Cat7.

    • Coaxial cables are often used for cable television and internet connections.

    • Fiber optic cables use light to transmit data and are known for their high speed and reliability.

    • Twisted pair cables, such as Cat5e and Cat6, are commonly u...

  • Answered by AI
  • Q3. What is stacking why we need
  • Ans. 

    Stacking is a method of connecting multiple network switches to increase performance, redundancy, and manageability.

    • Stacking allows multiple switches to be managed as a single entity

    • It provides increased bandwidth and redundancy by combining the capabilities of multiple switches

    • Stacking simplifies network management tasks by allowing configuration changes to be applied to all switches in the stack at once

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Please focus on real time base scenario

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Feb 2023. There were 2 interview rounds.

Round 1 - Aptitude Test 

An aptitude test is a measure of your ability to learn or perform required tasks and succeed in the environment you're in.

Round 2 - HR 

(1 Question)

  • Q1. Why did you decide to apply to this role?
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What is the different between firewall and gateway
  • Ans. 

    Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.

    • Firewall is a security system that filters network traffic based on predetermined security rules.

    • Gateway is a node that acts as an entry and exit point for data between two networks.

    • Firewall can be a software program or a hardware device, while gateway is typical...

  • Answered by AI
  • Q2. How to mitigate DOS and DDOS attack
  • Ans. 

    To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.

    • Implement firewalls to filter out malicious traffic

    • Use intrusion detection systems to detect and block suspicious activity

    • Implement rate limiting to prevent overwhelming the network with excessive requests

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - just make sure you read the JD very well

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - One-on-one 

(2 Questions)

  • Q1. What is kerberos protocol?
  • Ans. 

    Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.

    • Developed by MIT in the 1980s

    • Uses symmetric key cryptography

    • Involves a Key Distribution Center (KDC)

    • Prevents eavesdropping and replay attacks

  • Answered by AI
  • Q2. Explain three way hand-shake
  • Ans. 

    Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.

    • Client sends a SYN (synchronize) packet to the server to initiate a connection

    • Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request

    • Client sends an ACK (acknowledgment) packet back to the server to confirm the connection

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. How TLS work ?
  • Ans. 

    TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.

    • TLS encrypts data to ensure confidentiality during transmission.

    • It uses cryptographic algorithms to authenticate the parties involved in the communication.

    • TLS also provides mechanisms for data integrity to prevent tampering.

    • Handshake process involves negotiation of encryption algorithms and exchange o...

  • Answered by AI
  • Q2. TLS algorithms ?

Interview Preparation Tips

Interview preparation tips for other job seekers - both round question was co-related with eachother

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Jan 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - verbal test 

(1 Question)

  • Q1. Read back dictation on screen
  • Ans. 

    The question requires the candidate to read back a dictated text on the screen.

    • The candidate should listen carefully to the dictated text.

    • The candidate should then read back the text accurately.

    • The candidate should ensure that they have understood the text before reading it back.

    • Examples: 'Please read back the following sentence: The quick brown fox jumps over the lazy dog.'

    • Examples: 'Please read back the following par...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. What is OSPF, BGP, networking
  • Ans. 

    OSPF and BGP are routing protocols used in networking to determine the best path for data to travel.

    • OSPF (Open Shortest Path First) is an interior gateway protocol used to route IP packets within a single network.

    • BGP (Border Gateway Protocol) is an exterior gateway protocol used to route data between different networks.

    • Networking refers to the practice of connecting devices together to share resources and communicate w...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare for managerial questions more in comparison to technical questions

Skills evaluated in this interview

Amdocs Interview FAQs

How many rounds are there in Amdocs Cyber Security Consultant interview?
Amdocs interview process usually has 1 rounds. The most common rounds in the Amdocs interview process are Technical.

Tell us how to improve this page.

Amdocs Cyber Security Consultant Interview Process

based on 1 interview

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
Oracle Interview Questions
3.7
 • 897 Interviews
Google Interview Questions
4.4
 • 870 Interviews
Mphasis Interview Questions
3.4
 • 802 Interviews
View all
Software Developer
8.1k salaries
unlock blur

₹5 L/yr - ₹17 L/yr

Software Engineer
1.9k salaries
unlock blur

₹4 L/yr - ₹16.1 L/yr

Softwaretest Engineer
1.7k salaries
unlock blur

₹3.8 L/yr - ₹13.9 L/yr

Functional Test Engineer
1.2k salaries
unlock blur

₹2.8 L/yr - ₹12.1 L/yr

Associate Software Engineer
950 salaries
unlock blur

₹3.2 L/yr - ₹12 L/yr

Explore more salaries
Compare Amdocs with

TCS

3.7
Compare

IBM

4.0
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview