Upload Button Icon Add office photos

Filter interviews by

Atos Soc Analyst 1 Interview Questions and Answers

Updated 11 Jul 2024

Atos Soc Analyst 1 Interview Experiences

3 interviews found

Soc Analyst 1 Interview Questions & Answers

user image Anonymous

posted on 11 Jul 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Phishing mail analysis
  • Q2. SQL injections attack

Soc Analyst 1 Interview Questions & Answers

user image Anonymous

posted on 26 Mar 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected
Round 1 - Technical 

(1 Question)

  • Q1. Basics of networking concepts Cyber attacks

Soc Analyst 1 Interview Questions Asked at Other Companies

asked in CyberProof
Q1. How do you investigate an email phishing?
asked in TCS
Q2. what is soc analyst day to day activity?roles and responsibilitie ... read more
Q3. what is cross site scripting? how does lateral movement work in a ... read more
asked in NTT Data
Q4. how to approach rdp connection during analysis
asked in Atech Cloud
Q5. Policies incorporated by companies in Phishing attack
Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred over a network.

    • Each layer has specific functions and interacts with adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Session, Presentation, and

  • Answered by AI
  • Q2. Different types of attacks
  • Ans. 

    Different types of attacks include phishing, malware, DDoS, and social engineering.

    • Phishing: fraudulent emails or websites to trick users into revealing sensitive information

    • Malware: malicious software designed to harm or exploit a computer system

    • DDoS: Distributed Denial of Service attacks overwhelm a system with traffic, causing it to crash

    • Social engineering: manipulating individuals into divulging confidential inform

  • Answered by AI
Round 2 - HR 

(2 Questions)

  • Q1. Are u available to relocate
  • Q2. What are u negatives and positives
  • Ans. 

    Positives include strong analytical skills and attention to detail. Negatives may include lack of experience or difficulty working in a team.

    • Positives: strong analytical skills, attention to detail, ability to work independently

    • Negatives: lack of experience, difficulty working in a team, limited knowledge of specific tools or technologies

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Just go through the basics

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. What is soc role
  • Q2. What is virus and explain it
Round 2 - Technical 

(2 Questions)

  • Q1. Roles and responsibilities
  • Q2. Project details
Round 3 - HR 

(2 Questions)

  • Q1. Why to select you
  • Q2. Expected ctc and responsibilities

Interview Preparation Tips

Interview preparation tips for other job seekers - Good
Interview experience
4
Good
Difficulty level
Hard
Process Duration
More than 8 weeks
Result
Not Selected
Round 1 - Aptitude Test 

Logical reasoning and verbal ability.

Interview experience
2
Poor
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - One-on-one 

(1 Question)

  • Q1. Basic networking Dhcp ARP Firewall Proxy WAF DMZ
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(3 Questions)

  • Q1. What is event id for successful login
  • Ans. 

    Event ID 4624 is for successful login in Windows Security Event Log.

    • Event ID 4624 is logged in the Windows Security Event Log when a user successfully logs on to a computer.

    • This event is commonly used by security analysts to track user activity and identify potential security incidents.

    • The event includes information such as the account name, account domain, logon type, and logon process.

    • For example, in a Windows enviro...

  • Answered by AI
  • Q2. What is event id for login fail
  • Ans. 

    Event ID 4625 is for login fail

    • Event ID 4625 is generated when a user fails to log in to a system

    • It is commonly seen in Windows Security event logs

    • The event provides information on the account that failed to log in, the reason for the failure, and the source of the login attempt

  • Answered by AI
  • Q3. 4625 for login fail
  • Ans. 

    This question is likely asking about the reason code 4625 for a login failure.

    • 4625 is the event ID for a failed login attempt in Windows systems

    • It could indicate a user entering incorrect credentials or an account being locked out

    • Common reasons for event 4625 include mistyped passwords, expired accounts, or disabled accounts

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. What's diffrence between VA and PT
  • Ans. 

    VA stands for Vulnerability Assessment, which identifies vulnerabilities in systems and networks. PT stands for Penetration Testing, which simulates real-world attacks to exploit vulnerabilities.

    • VA is a proactive approach to identifying vulnerabilities, while PT is a more hands-on, simulated attack

    • VA typically involves scanning systems for known vulnerabilities, while PT involves attempting to exploit vulnerabilities t...

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about your self
  • Q2. What is DDos attack
  • Ans. 

    DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.

    • DDoS stands for Distributed Denial of Service

    • Attackers use multiple compromised systems to flood the target with traffic

    • Goal is to make the target inaccessible to its intended users

    • Common types include UDP flood, ICMP flood, and SYN flood

    • Examples: Mirai botnet attack

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare all type of attacks throuly
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. How to mitigate ddos attack
  • Ans. 

    Mitigating DDoS attacks involves implementing various strategies to protect against overwhelming traffic.

    • Implementing a strong firewall to filter out malicious traffic

    • Utilizing a content delivery network (CDN) to distribute traffic and reduce strain on servers

    • Using DDoS mitigation services or tools to detect and block attacks

    • Configuring network devices to limit the impact of attacks

    • Regularly monitoring network traffic

  • Answered by AI
  • Q2. How to approach rdp connection during analysis
  • Ans. 

    Approach RDP connection during analysis by examining logs, network traffic, and user activity.

    • Review RDP logs for any suspicious activity or unauthorized access.

    • Analyze network traffic for any anomalies or unusual patterns related to RDP connections.

    • Monitor user activity to identify any unauthorized or suspicious RDP sessions.

    • Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.

    • Look for faile...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - just be comfortable and share all the knowledge of the topic

Skills evaluated in this interview

Atos Interview FAQs

How many rounds are there in Atos Soc Analyst 1 interview?
Atos interview process usually has 1-2 rounds. The most common rounds in the Atos interview process are Technical and HR.
What are the top questions asked in Atos Soc Analyst 1 interview?

Some of the top questions asked at the Atos Soc Analyst 1 interview -

  1. What are u negatives and positi...read more
  2. what is OSI Mo...read more
  3. Different types of atta...read more

Tell us how to improve this page.

Atos Soc Analyst 1 Interview Process

based on 3 interviews in last 1 year

1 Interview rounds

  • Technical Round
View more

Soc Analyst 1 Interview Questions from Similar Companies

View all
Atos Soc Analyst 1 Salary
based on 13 salaries
₹4.2 L/yr - ₹6.3 L/yr
At par with the average Soc Analyst 1 Salary in India
View more details

Atos Soc Analyst 1 Reviews and Ratings

based on 3 reviews

4.3/5

Rating in categories

4.0

Skill development

4.3

Work-life balance

3.9

Salary

4.0

Job security

4.6

Company culture

3.2

Promotions

4.0

Work satisfaction

Explore 3 Reviews and Ratings
Associate Consultant
5.2k salaries
unlock blur

₹3 L/yr - ₹11.8 L/yr

Consultant
3.8k salaries
unlock blur

₹6.9 L/yr - ₹27 L/yr

Senior Consultant
1.9k salaries
unlock blur

₹10.8 L/yr - ₹35.5 L/yr

System Engineer
916 salaries
unlock blur

₹2 L/yr - ₹6.3 L/yr

Software Engineer
772 salaries
unlock blur

₹2.4 L/yr - ₹10 L/yr

Explore more salaries
Compare Atos with

TCS

3.7
Compare

Infosys

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview