Upload Button Icon Add office photos

Filter interviews by

Anzen Technologies Information Security Consultant Interview Questions, Process, and Tips

Updated 23 Apr 2024

Top Anzen Technologies Information Security Consultant Interview Questions and Answers

  • Q1. 1. Approach of VA & PT 2. Best Vulnerability you identified in web application security 3. Approach for web application security 4. Nmap scanning techniques 5. Sql in ...read more
  • Q2. Difference between virus and warms?
  • Q3. What is OSI model?
View all 6 questions

Anzen Technologies Information Security Consultant Interview Experiences

2 interviews found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-

I applied via Job Portal

Round 1 - Technical 

(1 Question)

  • Q1. 1. Approach of VA & PT 2. Best Vulnerability you identified in web application security 3. Approach for web application security 4. Nmap scanning techniques 5. Sql injection
  • Ans. 

    The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.

    • Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.

    • Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access to se...

  • Answered by AI

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Sep 2022. There were 2 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. Self Introduction
  • Q2. What is OSI model?
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It helps in understanding how different networking protocols work together.

    • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has specific functions and co...

  • Answered by AI
  • Q3. Difference between virus and warms?
  • Ans. 

    Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.

    • Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.

    • Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.

    • Viruses can be dormant until triggered by...

  • Answered by AI
Round 2 - Technical 

(3 Questions)

  • Q1. Types of Viruses?
  • Ans. 

    Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.

    • File infectors: attach themselves to executable files and spread when the infected file is run.

    • Macro viruses: infect documents and spreadsheets that support macros.

    • Boot sector viruses: infect the master boot record of a storage device.

    • Ransomware: encrypts files and demands payment for decryption.

  • Answered by AI
  • Q2. Type of firewall?
  • Ans. 

    There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.

    • Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.

    • Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.

    • Application firewalls filter traffic at the application layer of the OSI model an...

  • Answered by AI
  • Q3. Any well-known cyber-attacks.
  • Ans. 

    One well-known cyber-attack is the WannaCry ransomware attack.

    • WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.

    • The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.

    • WannaCry was attributed to North Korea by various security experts and agencies.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Find some other company since the questions they ask is only a formality and these are really basic questions in cyber security.

Skills evaluated in this interview

Information Security Consultant Interview Questions Asked at Other Companies

Q1. Help me understand If I need to take over a higher-privilege acco ... read more
asked in LTIMindtree
Q2. How would you implement a data security or Data Loss Prevention ( ... read more
Q3. What is Blind XSS? What is the technique to find one?
Q4. What will be the best way to send CSRF token in the Clint Server ... read more
asked in Genpact
Q5. In Which port the data base communication with DLP server.

Interview questions from similar companies

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(1 Question)

  • Q1. SSRF is client side or server side
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. What is tcp/ip model
  • Ans. 

    TCP/IP model is a networking protocol suite that defines how data is transmitted over a network.

    • Consists of four layers: Application, Transport, Internet, Link

    • Each layer has specific functions and protocols

    • Example: TCP operates at the Transport layer, while IP operates at the Internet layer

  • Answered by AI
Round 3 - Behavioral 

(1 Question)

  • Q1. What is your strength
Round 4 - HR 

(1 Question)

  • Q1. How many members in family

Skills evaluated in this interview

I applied via Recruitment Consultant

Interview Questionnaire 

4 Questions

  • Q1. What is Symantec DLP.
  • Ans. 

    Symantec DLP is a data loss prevention software that helps organizations protect sensitive data from being leaked or stolen.

    • Symantec DLP uses advanced detection techniques to identify and prevent data breaches.

    • It can monitor and control data across various channels, including email, web, and cloud applications.

    • Symantec DLP can also classify and encrypt sensitive data to ensure its protection.

    • It helps organizations comp...

  • Answered by AI
  • Q2. How many types to protect data from dlp solution.
  • Ans. 

    There are several types of solutions to protect data from DLP, including network-based, endpoint-based, and cloud-based solutions.

    • Network-based solutions monitor traffic on the network and can block or quarantine sensitive data.

    • Endpoint-based solutions monitor data on individual devices and can prevent unauthorized access or transmission.

    • Cloud-based solutions monitor data stored in the cloud and can prevent unauthorize...

  • Answered by AI
  • Q3. In Which port the data base communication with DLP server.
  • Ans. 

    The database communication with DLP server can happen through various ports depending on the configuration.

    • The port number can be configured during the installation of the DLP server.

    • Commonly used ports for database communication are 1433 for SQL Server, 1521 for Oracle, and 3306 for MySQL.

    • Firewalls and network security policies may also affect the port used for communication.

    • It is important to ensure that the appropri...

  • Answered by AI
  • Q4. What is Classification
  • Ans. 

    Classification is the process of categorizing data or information based on certain criteria.

    • It involves grouping similar items together.

    • It helps in organizing and managing data effectively.

    • Examples include classifying emails as spam or not spam, or categorizing documents based on their content.

    • Classification can also be used in machine learning to train models to recognize patterns and make predictions.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be Curious dont hesitate from the interviewer.
Focus on your basic skills.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Risky user investigation and defination
  • Q2. Mitre attack frame work
Interview experience
2
Poor
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Risk user analysis,table used for it
  • Q2. Mitre attack framework,different techniques
  • Ans. 

    The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.

    • MITRE ATT&CK provides a comprehensive list of techniques used by attackers to compromise systems.

    • Techniques are categorized into tactics such as Initial Access, Execution, Persistence, etc.

    • Examples of techniques include Spearphishing Attachment, Command and Scripting Interpreter, and Registry Run Keys / S

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - learn process based questions,ask interviewer o ask question clearly
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About sql and my sql
Round 3 - Technical 

(1 Question)

  • Q1. About informatica power center
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Hardware Support, Software Support, Network Support, Customer Handling, Asset Management
Round 3 - Assignment 

Sanrio base question

I was interviewed in May 2022.

Round 1 - Technical 

(2 Questions)

  • Q1. Are u able to do?if u join
  • Q2. Why should we hire u

Interview Preparation Tips

Interview preparation tips for other job seekers - I will do better.thak you for giving me a wonderful opportunity to in your company

Anzen Technologies Interview FAQs

How many rounds are there in Anzen Technologies Information Security Consultant interview?
Anzen Technologies interview process usually has 2 rounds. The most common rounds in the Anzen Technologies interview process are Technical and Resume Shortlist.
How to prepare for Anzen Technologies Information Security Consultant interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Anzen Technologies. The most common topics and skills that interviewers at Anzen Technologies expect are Adobe Acrobat Professional, Marketing Budget, NMAP, SIEM and SOC.
What are the top questions asked in Anzen Technologies Information Security Consultant interview?

Some of the top questions asked at the Anzen Technologies Information Security Consultant interview -

  1. 1. Approach of VA & PT 2. Best Vulnerability you identified in web application ...read more
  2. Difference between virus and war...read more
  3. What is OSI mod...read more

Tell us how to improve this page.

Anzen Technologies Information Security Consultant Interview Process

based on 2 interviews

Interview experience

2.5
  
Poor
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.9
 • 8.1k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Amazon Interview Questions
4.1
 • 5k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
View all
Anzen Technologies Information Security Consultant Salary
based on 28 salaries
₹2.8 L/yr - ₹10.2 L/yr
31% less than the average Information Security Consultant Salary in India
View more details

Anzen Technologies Information Security Consultant Reviews and Ratings

based on 8 reviews

3.0/5

Rating in categories

3.0

Skill development

3.0

Work-life balance

3.2

Salary

3.3

Job security

3.0

Company culture

3.0

Promotions

3.0

Work satisfaction

Explore 8 Reviews and Ratings
Information Security Consultant
28 salaries
unlock blur

₹2.8 L/yr - ₹10.1 L/yr

Associate Consultant
23 salaries
unlock blur

₹2.5 L/yr - ₹6 L/yr

Associate Information Security Consultant
11 salaries
unlock blur

₹2.5 L/yr - ₹5.5 L/yr

Consultant
6 salaries
unlock blur

₹5.5 L/yr - ₹8.5 L/yr

Information Security Analyst
6 salaries
unlock blur

₹2.2 L/yr - ₹5.5 L/yr

Explore more salaries
Compare Anzen Technologies with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview