Upload Button Icon Add office photos

Filter interviews by

Cyber Group Cyber Security Analyst Interview Questions and Answers

Updated 3 Mar 2023

Cyber Group Cyber Security Analyst Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(3 Questions)

  • Q1. What is CEH what is CCNA
  • Ans. 

    CEH stands for Certified Ethical Hacker. CCNA stands for Cisco Certified Network Associate.

    • CEH is a certification for professionals who want to work as ethical hackers and penetration testers.

    • CCNA is a certification for professionals who want to work with Cisco networking technologies.

    • CEH covers topics such as footprinting and reconnaissance, scanning networks, enumeration, system hacking, and more.

    • CCNA covers topics s...

  • Answered by AI
  • Q2. What is it top compnyes
  • Ans. 

    Top companies in cyber security are those that provide innovative and effective solutions to protect against cyber threats.

    • Top companies invest heavily in research and development to stay ahead of emerging threats

    • They offer a range of services including threat intelligence, incident response, and vulnerability assessments

    • Examples of top companies include Symantec, McAfee, and Cisco

    • These companies have a strong reputati...

  • Answered by AI
  • Q3. What is it low and how to work
  • Ans. 

    The question is unclear and lacks context.

    • Please provide more information or clarify the question.

    • Without context, it is impossible to provide a meaningful answer.

    • Low can refer to many things in cyber security, such as low-level attacks or low-risk vulnerabilities.

    • Working in cyber security involves analyzing and mitigating risks to protect systems and data.

    • It is important to stay up-to-date on the latest threats and se...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Hi, my self Sohel khan and my deploma ccna and ceh

Interview questions from similar companies

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

I applied via Campus Placement and was interviewed in Jul 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Coding Test 

OS, DBMS, DLD, Networking, and Cryptography

Round 3 - Technical 

(2 Questions)

  • Q1. Questions about resume
  • Q2. Define cryptography and different types
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties. There are two types: symmetric and asymmetric.

    • Symmetric cryptography uses the same key for encryption and decryption, such as AES and DES.

    • Asymmetric cryptography uses a public key for encryption and a private key for decryption, such as RSA and ECC.

    • Other types include hashing algorithms like SHA-256 and digital signatures like DSA.

    • Cr...

  • Answered by AI
Round 4 - HR 

(1 Question)

  • Q1. What will you do if you get a better offer than Bosch

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep calm and be very clear on your basics

I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Lots of questions asked, difficulty level easy to difficult. You can find easy questions Just typing cyber security analyst interview questions on Google. About difficult if you have good understanding the...
Round 2 - Technical 

(1 Question)

  • Q1. Managerial technical round, some technical questions, mostly generally discussion, senior manager is assessing you , so keep yourself calm and decent.

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your ans very precisely, referring to some case study or real time vulnerability.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response
Round 1 - Technical 

(4 Questions)

  • Q1. Ospf more deep knowledge
  • Q2. Ospf scenario based question
  • Q3. STP loop prevention how its working
  • Ans. 

    STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.

    • STP (Spanning Tree Protocol) identifies redundant paths in a network

    • STP selects a root bridge to be the central point of the network

    • STP blocks certain ports to prevent loops while still allowing for redundancy

    • If a link fails, STP will unblock a previously blocked port to maintain connectivity

  • Answered by AI
  • Q4. More info about Routing if you good any one routing just inform based on they will ask

Interview Preparation Tips

Interview preparation tips for other job seekers - If looking Network engineer just learn more about routing and switching

Any routing protocol recommend OSPF
VLAN
STP
HSRP

how traffic flow

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. UST is good interviewer is not good
  • Q2. Even we don't know the question atleast Interviewer required minimum patience .Iritating
Round 2 - Technical 

(2 Questions)

  • Q1. Basic question only OSPF
  • Q2. Load balancer configuration
Round 3 - Technical 

(2 Questions)

  • Q1. OSPF, Load balancer
  • Q2. Load balancing configuration

Interview Preparation Tips

Interview preparation tips for other job seekers - UST is good but depends upon the interviewer if interviewer is good then ww can share if interviewer is rude is very uncomfortable becoz our positivity will lost
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is DNS please explain
  • Ans. 

    DNS stands for Domain Name System, which translates domain names to IP addresses.

    • DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).

    • It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.

    • DNS servers store records of domain names and their corresponding IP addresses, allowing for effi...

  • Answered by AI
  • Q2. What is DHCP please explain
  • Ans. 

    DHCP stands for Dynamic Host Configuration Protocol, used to automatically assign IP addresses to devices on a network.

    • DHCP eliminates the need for manual IP address configuration on each device

    • It assigns IP addresses dynamically, allowing for efficient use of available addresses

    • DHCP servers lease IP addresses to devices for a specific period of time

    • DHCP also provides other network configuration information, such as su...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What do you understand by RSA?
  • Ans. 

    RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.

    • RSA is a public-key cryptosystem used for secure data transmission.

    • It involves generating a public key and a private key for encryption and decryption.

    • RSA encryption is based on the difficulty of factoring large prime numbers.

    • It is commonly used in secure communication protocols like HTTPS.

    • RSA can be used for digital signa

  • Answered by AI
  • Q2. Basic principles of security management?
  • Ans. 

    Basic principles of security management involve risk assessment, access control, incident response, and security awareness.

    • Risk assessment: Identifying and evaluating potential risks to the organization's security.

    • Access control: Implementing measures to control who has access to sensitive information or resources.

    • Incident response: Developing plans and procedures to respond to security incidents effectively.

    • Security a...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be yourself
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - Aptitude Test 

Basic question like as time ditance

Round 2 - Coding Test 

Basic of dsa sql dbms

Interview Preparation Tips

Interview preparation tips for other job seekers - please be carefull and confident while giving interview

I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Coding Test 

Coding test contains 2 questions

Interview Preparation Tips

Interview preparation tips for other job seekers - we want to prepare well for any assessment and interviews

Cyber Group Interview FAQs

How many rounds are there in Cyber Group Cyber Security Analyst interview?
Cyber Group interview process usually has 2 rounds. The most common rounds in the Cyber Group interview process are Resume Shortlist and One-on-one Round.
What are the top questions asked in Cyber Group Cyber Security Analyst interview?

Some of the top questions asked at the Cyber Group Cyber Security Analyst interview -

  1. what is it low and how to w...read more
  2. what is CEH what is C...read more
  3. what is it top compn...read more

Tell us how to improve this page.

Cyber Group Cyber Security Analyst Interview Process

based on 1 interview

Interview experience

4
  
Good
View more
Software Developer
19 salaries
unlock blur

₹4.5 L/yr - ₹10.5 L/yr

Software Engineer
15 salaries
unlock blur

₹4.5 L/yr - ₹12.5 L/yr

Consultant2
9 salaries
unlock blur

₹8 L/yr - ₹10.5 L/yr

Senior Software Engineer
9 salaries
unlock blur

₹10 L/yr - ₹25 L/yr

Associate 1
6 salaries
unlock blur

₹8 L/yr - ₹14.5 L/yr

Explore more salaries
Compare Cyber Group with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview