i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Approached by Company and was interviewed before May 2023. There were 2 interview rounds.
I performed troubleshooting by systematically identifying potential issues, testing solutions, and analyzing results.
Identified the specific issue by gathering information and analyzing data
Developed a plan to address the issue, considering all possible solutions
Implemented the plan by testing different solutions and monitoring results
Analyzed the outcomes to determine the most effective solution
Documented the troubles
Life-limited parts are components in an aircraft that have a specified lifespan and must be replaced after a certain number of hours or cycles.
Life-limited parts are components in an aircraft that have a specified lifespan due to factors like fatigue, wear, or corrosion.
These parts must be replaced after reaching a certain number of flight hours or cycles to ensure the safety and reliability of the aircraft.
Examples of...
I applied via Campus Placement and was interviewed before Jan 2023. There were 3 interview rounds.
Basic aptitude questions
The different data types in C include integer, floating-point, character, and void.
Integer data types include int, short, long, and char.
Floating-point data types include float and double.
Character data type is represented by the char keyword.
Void data type is used to indicate the absence of a value.
I applied via Referral and was interviewed before Jan 2022. There were 2 interview rounds.
Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.
Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.
Kill Chain helps organizations understand and defend against cyber attacks, whil...
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Internshala
Logical thinking, verbal skills
Have to pentest a web app
Basic arrays, strings and dsa
Wuants rivilry adigar Jodi poru
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
Interview experience
based on 2 reviews
Rating in categories
Consultant
55.2k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
50.9k
salaries
| ₹2.9 L/yr - ₹11.8 L/yr |
Senior Consultant
45.9k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
21k
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Engineer
20.1k
salaries
| ₹3.5 L/yr - ₹12.3 L/yr |
Wipro
Accenture
Cognizant
TCS