Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Aujas Cybersecurity-NuSummit company Team. If you also belong to the team, you can get access from here

Aujas Cybersecurity-NuSummit company Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Questions and Answers

Updated 12 Dec 2023

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Experiences

2 interviews found

Cyber Security Consultant Interview Questions & Answers

user image Er.Abhishek Patil

posted on 12 Dec 2023

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About VAPT and day to day process
Round 3 - Technical 

(1 Question)

  • Q1. Deep about VA tools and management and CIS benchmark
Round 4 - Technical 

(1 Question)

  • Q1. Client round about VA
Round 5 - HR 

(1 Question)

  • Q1. Final round HR process strength weakness. About compny previous organizations why left organization.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
No response

I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is Blind SQL Injection?
  • Ans. 

    Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.

    • The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.

    • Blind SQL Injection can be time-based or boolean-based.

    • Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...

  • Answered by AI
  • Q2. Difference between PE & IDOR
  • Ans. 

    PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.

    • PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.

    • IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...

  • Answered by AI
  • Q3. CSRF Remediation

Skills evaluated in this interview

Cyber Security Consultant Interview Questions Asked at Other Companies

Q1. What is the role of firewall and how it can be used efficiently t ... read more
Q2. Do you have any experience in Penetration testing?
Q3. How you can implement network segmentation?
asked in TCS
Q4. What is your strong area? What is SDLC? What is Cloud ?
Q5. Client engagement with cybersecurity

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
Not Selected
Round 1 - Technical 

(2 Questions)

  • Q1. What is VTP (VLAN Trunking Protocol)?
  • Q2. What actions would you take if the switch enters ROMMON mode after a reboot?

Interview Preparation Tips

Interview preparation tips for other job seekers - They are having a fixed amount and asking us to accept the same to process offer letter.
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I was interviewed before Mar 2023.

Round 1 - Technical 

(4 Questions)

  • Q1. Basic dns troubleshooting
  • Q2. Encryption algorithms
  • Q3. Firewall related questions
  • Q4. Subnetting related
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. Salary related questions
  • Q2. Location and position

Interview Preparation Tips

Interview preparation tips for other job seekers - 3i infotech is the best company but salary is so poor

Interview Questionnaire 

3 Questions

  • Q1. They ask what you mentioned in resume.
  • Q2. Vlan ,vtp ,stp ,access list .
  • Q3. Routing Protocols bgp ,ospf ,eigrp ,rip ,isis . Question on data centre

Interview Preparation Tips

Interview preparation tips for other job seekers - CCNA certification is mandatory, it will give u hood salary hike.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Packet flow in PALO ALTO FIREWALL?
  • Ans. 

    Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.

    • Packet enters the firewall through an ingress interface

    • Firewall performs policy lookup to determine if the packet should be allowed or denied

    • If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.

    • NAT (Network Address Trans...

  • Answered by AI
  • Q2. Ospf states and explain?
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

    • OSPF is a link-state routing protocol

    • It uses Dijkstra's algorithm to calculate the shortest path

    • OSPF routers exchange link-state advertisements (LSAs)

    • It supports VLSM (Variable Length Subnet Masking)

    • OSPF areas are used to divide large networks into smaller segments

  • Answered by AI
  • Q3. Election of DR AND BDR IN OSPF?
  • Ans. 

    DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.

    • DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.

    • The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.

    • If two routers have the same pr...

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. Depends upon client,iOS Upgradation,ospf,bgp,hsrp,vlan,vpn,nat, firewall rule.blocking.l etc
  • Q2. Need to read sd wan
  • Q3. Firewall traffic flow
  • Q4. Stp and vtp how to work need depth knowledge
Round 3 - HR 

(1 Question)

  • Q1. About joining and PKG.

Interview Preparation Tips

Interview preparation tips for other job seekers - Read about switch and firewall and one routing protocol

I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. What is MPLS What is DNS What is Subnetting
  • Ans. 

    MPLS is a protocol used for efficient data transfer. DNS is a system that translates domain names to IP addresses. Subnetting is dividing a network into smaller subnetworks.

    • MPLS stands for Multiprotocol Label Switching and is used to route network traffic efficiently.

    • DNS stands for Domain Name System and is used to translate domain names to IP addresses.

    • Subnetting is the process of dividing a network into smaller subne...

  • Answered by AI
  • Q2. What is difference IPv4 and IPV6
  • Ans. 

    IPv6 is the successor to IPv4, with larger address space, improved security, and better support for mobile devices.

    • IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses

    • IPv6 has a hierarchical addressing structure, allowing for more efficient routing

    • IPv6 includes built-in security features, such as IPsec

    • IPv6 has better support for mobile devices, with features like mobile IP and flow labeling

  • Answered by AI
Round 2 - Group Discussion 

Discuss Banking Network

Round 3 - HR 

(2 Questions)

  • Q1. What are your salary expectations?
  • Ans. 

    I expect a competitive salary based on my experience, skills, and the responsibilities of the role.

    • Research the average salary range for Network Engineers in your area

    • Consider your level of experience and expertise

    • Factor in the job responsibilities and requirements

    • Be prepared to negotiate and discuss benefits

    • Example: I expect a salary in the range of $70,000 to $90,000 per year based on industry standards and my qualif

  • Answered by AI
  • Q2. Tell me about yourself.
  • Ans. 

    I am a highly skilled and experienced Network Engineer with a strong background in designing, implementing, and managing complex network infrastructures.

    • I have a Bachelor's degree in Computer Science and multiple certifications in networking technologies such as CCNA and CCNP.

    • I have worked for 5 years at XYZ Company, where I was responsible for maintaining and troubleshooting network systems for a large enterprise.

    • I ha...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Interviewr check your practical knowledge and your confidence level

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security related questions
  • Q2. VAPT , DAST, SAST in cyber security
  • Q3. Ethical hacking in cyber security
  • Ans. 

    Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.

    • Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.

    • The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.

    • Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Microland Cyber Security Analyst interview:
  • Cyber security
Interview preparation tips for other job seekers - I impressed by the leadership team of this company

Skills evaluated in this interview

Aujas Cybersecurity-NuSummit company Interview FAQs

How many rounds are there in Aujas Cybersecurity-NuSummit company Cyber Security Consultant interview?
Aujas Cybersecurity-NuSummit company interview process usually has 3-4 rounds. The most common rounds in the Aujas Cybersecurity-NuSummit company interview process are Technical, Resume Shortlist and HR.
What are the top questions asked in Aujas Cybersecurity-NuSummit company Cyber Security Consultant interview?

Some of the top questions asked at the Aujas Cybersecurity-NuSummit company Cyber Security Consultant interview -

  1. what is Blind SQL Injecti...read more
  2. Difference between PE & I...read more
  3. Deep about VA tools and management and CIS benchm...read more

Tell us how to improve this page.

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Process

based on 2 interviews

Interview experience

4.5
  
Good
View more

Interview Questions from Similar Companies

NeoSOFT Interview Questions
4.0
 • 263 Interviews
3i Infotech Interview Questions
3.5
 • 141 Interviews
Microland Interview Questions
3.5
 • 125 Interviews
Sify Technologies Interview Questions
3.9
 • 121 Interviews
Mastek Interview Questions
3.6
 • 118 Interviews
Sonata Software Interview Questions
3.4
 • 114 Interviews
Maveric Systems Interview Questions
3.5
 • 114 Interviews
View all
18% less than the average Cyber Security Consultant Salary in India
View more details

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Reviews and Ratings

based on 6 reviews

4.3/5

Rating in categories

4.5

Skill development

3.4

Work-life balance

4.0

Salary

4.8

Job security

4.3

Company culture

3.2

Promotions

3.0

Work satisfaction

Explore 6 Reviews and Ratings
Consultant
317 salaries
unlock blur

₹4.3 L/yr - ₹18.1 L/yr

Senior Consultant
241 salaries
unlock blur

₹9 L/yr - ₹28 L/yr

Associate Consultant
208 salaries
unlock blur

₹2.2 L/yr - ₹10 L/yr

Security Consultant
110 salaries
unlock blur

₹5.5 L/yr - ₹15.5 L/yr

Lead Consultant
81 salaries
unlock blur

₹14.4 L/yr - ₹36 L/yr

Explore more salaries
Compare Aujas Cybersecurity-NuSummit company with

Paladion Networks

3.8
Compare

Kratikal Tech Private Limited

3.7
Compare

InstaSafe

3.7
Compare

Safe Security

2.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview