Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Aujas Cybersecurity-NuSummit company Team. If you also belong to the team, you can get access from here

Aujas Cybersecurity-NuSummit company Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Questions and Answers

Updated 12 Dec 2023

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Experiences

2 interviews found

Cyber Security Consultant Interview Questions & Answers

user image Er.Abhishek Patil

posted on 12 Dec 2023

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About VAPT and day to day process
Round 3 - Technical 

(1 Question)

  • Q1. Deep about VA tools and management and CIS benchmark
Round 4 - Technical 

(1 Question)

  • Q1. Client round about VA
Round 5 - HR 

(1 Question)

  • Q1. Final round HR process strength weakness. About compny previous organizations why left organization.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
No response

I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is Blind SQL Injection?
  • Ans. 

    Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.

    • The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.

    • Blind SQL Injection can be time-based or boolean-based.

    • Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...

  • Answered by AI
  • Q2. Difference between PE & IDOR
  • Ans. 

    PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.

    • PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.

    • IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...

  • Answered by AI
  • Q3. CSRF Remediation

Skills evaluated in this interview

Cyber Security Consultant Interview Questions Asked at Other Companies

Q1. What is the role of firewall and how it can be used efficiently t ... read more
Q2. Do you have any experience in Penetration testing?
Q3. How you can implement network segmentation?
asked in TCS
Q4. What is your strong area? What is SDLC? What is Cloud ?
Q5. Client engagement with cybersecurity

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is wireless
  • Ans. 

    Wireless refers to the transmission of data without the use of physical cables or wires.

    • Wireless technology uses radio waves to transmit data over a network.

    • Examples of wireless technology include Wi-Fi, Bluetooth, and cellular networks.

    • Wireless networks are convenient for mobile devices and allow for greater flexibility in connectivity.

  • Answered by AI
  • Q2. What is switch congratulations
  • Ans. 

    Switch congestion occurs when a network switch is overwhelmed with traffic, leading to delays or dropped packets.

    • Switch congestion can occur when there is a high volume of data being transmitted through the switch

    • It can lead to delays in data transmission or even dropped packets

    • Switch congestion can be alleviated by implementing Quality of Service (QoS) policies or upgrading to higher capacity switches

  • Answered by AI
  • Q3. Aruna wifi configuration
  • Q4. Wireless device configuration
  • Ans. 

    Wireless device configuration involves setting up and managing wireless networks for optimal performance.

    • Understand the network requirements and goals

    • Select appropriate wireless devices and access points

    • Configure SSIDs, security settings, and encryption protocols

    • Optimize placement of access points for coverage and performance

    • Monitor and troubleshoot network performance

  • Answered by AI
  • Q5. Customer support

Interview Preparation Tips

Interview preparation tips for other job seekers - Ok

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
Not Selected
Round 1 - Technical 

(2 Questions)

  • Q1. What is VTP (VLAN Trunking Protocol)?
  • Q2. What actions would you take if the switch enters ROMMON mode after a reboot?

Interview Preparation Tips

Interview preparation tips for other job seekers - They are having a fixed amount and asking us to accept the same to process offer letter.
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - Aptitude Test 

Basic question like as time ditance

Round 2 - Coding Test 

Basic of dsa sql dbms

Interview Preparation Tips

Interview preparation tips for other job seekers - please be carefull and confident while giving interview
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I was interviewed before Mar 2023.

Round 1 - Technical 

(4 Questions)

  • Q1. Basic dns troubleshooting
  • Q2. Encryption algorithms
  • Q3. Firewall related questions
  • Q4. Subnetting related
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. Salary related questions
  • Q2. Location and position

Interview Preparation Tips

Interview preparation tips for other job seekers - 3i infotech is the best company but salary is so poor
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - HR 

(2 Questions)

  • Q1. Route switch firewall
  • Q2. Firewall Fortigate

Interview Preparation Tips

Interview preparation tips for other job seekers - Good company
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Packet flow in PALO ALTO FIREWALL?
  • Ans. 

    Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.

    • Packet enters the firewall through an ingress interface

    • Firewall performs policy lookup to determine if the packet should be allowed or denied

    • If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.

    • NAT (Network Address Trans...

  • Answered by AI
  • Q2. Ospf states and explain?
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

    • OSPF is a link-state routing protocol

    • It uses Dijkstra's algorithm to calculate the shortest path

    • OSPF routers exchange link-state advertisements (LSAs)

    • It supports VLSM (Variable Length Subnet Masking)

    • OSPF areas are used to divide large networks into smaller segments

  • Answered by AI
  • Q3. Election of DR AND BDR IN OSPF?
  • Ans. 

    DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.

    • DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.

    • The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.

    • If two routers have the same pr...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Assignment 

English , GK, arithmetic

Round 3 - Technical 

(3 Questions)

  • Q1. Asking interview questions
  • Q2. Company culture and values
  • Q3. Benifits of a device bias
  • Ans. 

    Device bias can lead to improved performance, efficiency, and user experience in network engineering.

    • Device bias can result in optimized network traffic routing, leading to faster data transmission.

    • It can enhance security measures by prioritizing certain devices for access control and monitoring.

    • Device bias can improve overall network stability and reliability by allocating resources more effectively.

    • For example, imple...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Work at a startup

Aujas Cybersecurity-NuSummit company Interview FAQs

How many rounds are there in Aujas Cybersecurity-NuSummit company Cyber Security Consultant interview?
Aujas Cybersecurity-NuSummit company interview process usually has 3-4 rounds. The most common rounds in the Aujas Cybersecurity-NuSummit company interview process are Technical, Resume Shortlist and HR.
What are the top questions asked in Aujas Cybersecurity-NuSummit company Cyber Security Consultant interview?

Some of the top questions asked at the Aujas Cybersecurity-NuSummit company Cyber Security Consultant interview -

  1. what is Blind SQL Injecti...read more
  2. Difference between PE & I...read more
  3. Deep about VA tools and management and CIS benchm...read more

Tell us how to improve this page.

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Process

based on 2 interviews

Interview experience

4.5
  
Good
View more

Interview Questions from Similar Companies

NeoSOFT Interview Questions
3.9
 • 261 Interviews
3i Infotech Interview Questions
3.4
 • 141 Interviews
Microland Interview Questions
3.5
 • 126 Interviews
Sify Technologies Interview Questions
3.9
 • 121 Interviews
Mastek Interview Questions
3.5
 • 118 Interviews
Maveric Systems Interview Questions
3.5
 • 115 Interviews
Sonata Software Interview Questions
3.4
 • 113 Interviews
View all
16% less than the average Cyber Security Consultant Salary in India
View more details

Aujas Cybersecurity-NuSummit company Cyber Security Consultant Reviews and Ratings

based on 6 reviews

4.3/5

Rating in categories

4.5

Skill development

3.4

Work-life balance

4.0

Salary

4.8

Job security

4.3

Company culture

3.2

Promotions

3.0

Work satisfaction

Explore 6 Reviews and Ratings
Consultant
319 salaries
unlock blur

₹4.3 L/yr - ₹17.4 L/yr

Senior Consultant
239 salaries
unlock blur

₹9 L/yr - ₹28 L/yr

Associate Consultant
207 salaries
unlock blur

₹2.2 L/yr - ₹10.2 L/yr

Security Consultant
110 salaries
unlock blur

₹5.5 L/yr - ₹15.5 L/yr

Lead Consultant
84 salaries
unlock blur

₹14.4 L/yr - ₹36 L/yr

Explore more salaries
Compare Aujas Cybersecurity-NuSummit company with

Paladion Networks

3.7
Compare

Kratikal Tech Private Limited

3.7
Compare

InstaSafe

3.7
Compare

Safe Security

2.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview