Upload Button Icon Add office photos

Filter interviews by

Anzen Technologies Information Security Consultant Interview Questions, Process, and Tips

Updated 23 Apr 2024

Top Anzen Technologies Information Security Consultant Interview Questions and Answers

  • Q1. 1. Approach of VA & PT 2. Best Vulnerability you identified in web application security 3. Approach for web application security 4. Nmap scanning techniques 5. Sql in ...read more
  • Q2. Difference between virus and warms?
  • Q3. What is OSI model?
View all 6 questions

Anzen Technologies Information Security Consultant Interview Experiences

2 interviews found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-

I applied via Job Portal

Round 1 - Technical 

(1 Question)

  • Q1. 1. Approach of VA & PT 2. Best Vulnerability you identified in web application security 3. Approach for web application security 4. Nmap scanning techniques 5. Sql injection
  • Ans. 

    The interview questions cover topics like vulnerability assessment, penetration testing, web application security, Nmap scanning techniques, and SQL injection.

    • Vulnerability Assessment (VA) & Penetration Testing (PT) involve identifying and exploiting security weaknesses in systems.

    • Best vulnerability identified in web application security could be a critical SQL injection vulnerability allowing unauthorized access to se...

  • Answered by AI

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Sep 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. Self Introduction
  • Q2. What is OSI model?
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It helps in understanding how different networking protocols work together.

    • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has specific functions and co...

  • Answered by AI
  • Q3. Difference between virus and warms?
  • Ans. 

    Viruses need a host to replicate and spread, while worms are standalone programs that can self-replicate and spread over networks.

    • Viruses require a host file to attach to and replicate, while worms are standalone programs that can spread independently.

    • Viruses are usually spread through infected files or documents, while worms can spread over networks without needing a host file.

    • Viruses can be dormant until triggered by...

  • Answered by AI
Round 3 - Technical 

(3 Questions)

  • Q1. Types of Viruses?
  • Ans. 

    Types of viruses include file infectors, macro viruses, boot sector viruses, and ransomware.

    • File infectors: attach themselves to executable files and spread when the infected file is run.

    • Macro viruses: infect documents and spreadsheets that support macros.

    • Boot sector viruses: infect the master boot record of a storage device.

    • Ransomware: encrypts files and demands payment for decryption.

  • Answered by AI
  • Q2. Type of firewall?
  • Ans. 

    There are several types of firewalls, including network firewalls, host-based firewalls, and application firewalls.

    • Network firewalls filter traffic between two or more networks and operate at the network layer of the OSI model.

    • Host-based firewalls are installed on individual computers and control traffic in and out of that specific device.

    • Application firewalls filter traffic at the application layer of the OSI model an...

  • Answered by AI
  • Q3. Any well-known cyber-attacks.
  • Ans. 

    One well-known cyber-attack is the WannaCry ransomware attack.

    • WannaCry ransomware attack occurred in 2017, affecting over 200,000 computers in 150 countries.

    • The attack exploited a vulnerability in Microsoft Windows systems, encrypting files and demanding ransom in Bitcoin.

    • WannaCry was attributed to North Korea by various security experts and agencies.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Find some other company since the questions they ask is only a formality and these are really basic questions in cyber security.

Skills evaluated in this interview

Information Security Consultant Interview Questions Asked at Other Companies

Q1. Help me understand If I need to take over a higher-privilege acco ... read more
asked in LTIMindtree
Q2. How would you implement a data security or Data Loss Prevention ( ... read more
Q3. What is Blind XSS? What is the technique to find one?
Q4. What will be the best way to send CSRF token in the Clint Server ... read more
asked in Genpact
Q5. In Which port the data base communication with DLP server.

Interview questions from similar companies

I applied via Referral and was interviewed before Apr 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Technical questions on eloqua, email marketing

Interview Preparation Tips

Interview preparation tips for other job seekers - Be comfident while answering

I applied via Campus Placement and was interviewed before May 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. TELL ME ABOUT YOURSELF

Interview Preparation Tips

Interview preparation tips for other job seekers - JUST BE YOURSELF

I applied via Naukri.com and was interviewed in Oct 2021. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Tell me a little about your self?

Interview Preparation Tips

Interview preparation tips for other job seekers - Ask if they have any hesitations

I applied via Approached by Company and was interviewed before May 2021. There were 4 interview rounds.

Round 1 - Coding Test 

Online questions were based on scenarios to write SQL queries. Also got few questions on Python as well for which I had only limited knowledge.

Round 2 - Technical 

(8 Questions)

  • Q1. I'm listing some of the questions here which the interviewers (2 panel resources) asked me regarding Informatica ETL, Oracle DB and I might have missed some of them. What types of indexes are used on Orac...
  • Q2. What happens if Treat source row property as "Update" at session level but at target object "Delete" is checked?
  • Ans. 

    The source row will be treated as an update, but the target object will be deleted.

    • The session level property 'Treat source row as Update' will be applied to the source row.

    • The target object will be deleted regardless of the update status of the source row.

    • This can result in data loss if the source row contains important information.

  • Answered by AI
  • Q3. What are the different types of dimension tables?
  • Ans. 

    Dimension tables are used in data warehousing to provide descriptive information about the data in fact tables.

    • Slowly changing dimensions

    • Junk dimensions

    • Degenerate dimensions

    • Role-playing dimensions

    • Bridge dimensions

  • Answered by AI
  • Q4. What schema type was used in your previous project? And explain why it was used?
  • Ans. 

    We used a relational schema in our previous project as it was suitable for the data structure and allowed for efficient querying.

    • Relational schema was used as it allowed for efficient querying of data

    • The data structure was suitable for a relational schema

    • We were able to easily join tables to retrieve necessary data

    • Examples include using SQL to query a database with multiple tables

    • Normalization was used to reduce data r

  • Answered by AI
  • Q5. Difference between Joiner and Lookup transformations?
  • Ans. 

    Joiner combines data from multiple sources based on a common key, while Lookup retrieves data from a reference table based on a matching key.

    • Joiner is used to combine data from two or more sources based on a common key column.

    • Lookup is used to retrieve data from a reference table based on a matching key column.

    • Joiner can perform inner, outer, left, and right joins, while Lookup can only perform an inner join.

    • Joiner can...

  • Answered by AI
  • Q6. Scenario: I have records in a flat file ending with ; character at the end of each them. How to load these records into DB based on this character? What property will be used in Informatica?
  • Q7. How version control happened in your previous project?
  • Ans. 

    We used Git for version control in our previous project.

    • We created a Git repository for the project.

    • All team members were added as collaborators to the repository.

    • We followed the Git flow branching model.

    • We used pull requests for code review and merging.

    • We used tags to mark important releases.

    • We regularly pushed our changes to the remote repository.

    • We used Git commands like commit, push, pull, merge, and rebase.

    • We used...

  • Answered by AI
  • Q8. Which SCD type you worked on before and explain on that?
  • Ans. 

    I have worked on SCD Type 2 before.

    • SCD Type 2 is used to track historical changes in data.

    • It creates a new record for each change and maintains a history of changes.

    • It includes start and end dates for each record.

    • Example: Tracking changes in employee salary over time.

  • Answered by AI
Round 3 - One-on-one 

(1 Question)

  • Q1. This round was taken by the project manager on a phone call. He asked me few basic fundamental questions related to my skills and the things which I worked on in my previous project. He also told me about ...
Round 4 - HR 

(1 Question)

  • Q1. Just F2F discussion with HR finalising on the compensation structure, learning opportunities and the organisational benefits as an employee.

Interview Preparation Tips

Interview preparation tips for other job seekers - If you're an experienced person, be confident about the things which you handled in previous project and be precise on to the point. Don't elaborate too much as the interviewers might build up questions based on that. Be strong in your technical areas of expertise. Expect scenario based questions related to your skills.

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Why shud I hire

Interview Preparation Tips

Interview preparation tips for other job seekers - Go as like attitude beast

I applied via Walk-in and was interviewed in Mar 2020. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. Why should we hire you ?
  • Q2. Latest project running in the intustry?

Interview Preparation Tips

Interview preparation tips for other job seekers - Student should have to clear , to thier goals , excellent communication skills , Answer every question with clam , and must have patience.

I applied via Naukri.com and was interviewed before Jul 2020. There were 3 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Performa in 3par
  • Ans. 

    Performa is a performance monitoring tool for HPE 3PAR storage arrays.

    • Performa provides real-time monitoring of storage performance metrics.

    • It helps identify performance bottlenecks and optimize storage performance.

    • Performa can generate reports and alerts based on user-defined thresholds.

    • It can also be used for capacity planning and trend analysis.

    • Examples of performance metrics monitored by Performa include IOPS, late

  • Answered by AI
  • Q2. San zoning

Interview Preparation Tips

Interview preparation tips for other job seekers - Brushup basics.

I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

5 Questions

  • Q1. Tell me about your self ?
  • Q2. What is your strength?
  • Q3. What is aadhar card (because i am in aadhhar process)
  • Ans. 

    Aadhaar card is a unique identification card issued by the Indian government to residents of India.

    • Aadhaar card is a 12-digit unique identification number issued by the Unique Identification Authority of India (UIDAI).

    • It serves as proof of identity and address for Indian residents.

    • Aadhaar card contains biometric and demographic information of the cardholder, including fingerprints and iris scans.

    • It is used for various ...

  • Answered by AI
  • Q4. Check reading and conversation skill
  • Q5. Are u agree with night shift

Interview Preparation Tips

Interview preparation tips for other job seekers - All questions will be easy, which we can answer ourselves.

Anzen Technologies Interview FAQs

How many rounds are there in Anzen Technologies Information Security Consultant interview?
Anzen Technologies interview process usually has 2 rounds. The most common rounds in the Anzen Technologies interview process are Technical and Resume Shortlist.
How to prepare for Anzen Technologies Information Security Consultant interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Anzen Technologies. The most common topics and skills that interviewers at Anzen Technologies expect are Adobe Acrobat Professional, Marketing Budget, NMAP, SIEM and SOC.
What are the top questions asked in Anzen Technologies Information Security Consultant interview?

Some of the top questions asked at the Anzen Technologies Information Security Consultant interview -

  1. 1. Approach of VA & PT 2. Best Vulnerability you identified in web application ...read more
  2. Difference between virus and war...read more
  3. What is OSI mod...read more

Tell us how to improve this page.

Anzen Technologies Information Security Consultant Interview Process

based on 2 interviews

Interview experience

2.5
  
Poor
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.7k Interviews
Accenture Interview Questions
3.8
 • 8.3k Interviews
Infosys Interview Questions
3.6
 • 7.7k Interviews
Wipro Interview Questions
3.7
 • 5.7k Interviews
Cognizant Interview Questions
3.7
 • 5.7k Interviews
Amazon Interview Questions
4.0
 • 5.1k Interviews
Capgemini Interview Questions
3.7
 • 4.9k Interviews
HCLTech Interview Questions
3.5
 • 3.9k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.9k Interviews
Genpact Interview Questions
3.8
 • 3.2k Interviews
View all
Anzen Technologies Information Security Consultant Salary
based on 27 salaries
₹2.8 L/yr - ₹9.8 L/yr
31% less than the average Information Security Consultant Salary in India
View more details

Anzen Technologies Information Security Consultant Reviews and Ratings

based on 7 reviews

3.2/5

Rating in categories

3.2

Skill development

3.2

Work-life balance

3.2

Salary

3.4

Job security

3.2

Company culture

3.2

Promotions

3.2

Work satisfaction

Explore 7 Reviews and Ratings
Associate Consultant
31 salaries
unlock blur

₹2.5 L/yr - ₹6 L/yr

Information Security Consultant
27 salaries
unlock blur

₹2.8 L/yr - ₹9.8 L/yr

Associate Information Security Consultant
15 salaries
unlock blur

₹2.5 L/yr - ₹5.5 L/yr

Junior Analyst
9 salaries
unlock blur

₹1.8 L/yr - ₹3 L/yr

Information Security Analyst
8 salaries
unlock blur

₹2.2 L/yr - ₹5.5 L/yr

Explore more salaries
Compare Anzen Technologies with

TCS

3.7
Compare

Accenture

3.8
Compare

Cognizant

3.7
Compare

Infosys

3.6
Compare
Did you find this page helpful?
Yes No
write
Share an Interview