i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via LinkedIn and was interviewed in Apr 2021. There was 1 interview round.
I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.
Easy aptitude test, just check the accuracy.
Bit tough one, Question is from linked list.
I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.
SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.
SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.
It correlates the data to identify patterns and anomalies that may indicate a security breach.
SIEM provides real-time alerts and reports to security ...
posted on 3 Jul 2024
It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty
Consultants provide expert advice and guidance to clients in a specific field or industry.
Consultants analyze client needs and provide tailored solutions
They offer recommendations based on industry best practices
Consultants may also assist with implementation and training
They often work on a project basis or provide ongoing support
Examples: Cyber Security Consultants help organizations improve their security posture, I
Fileless malware is a type of malicious software that operates in memory without leaving any trace on the hard drive.
Fileless malware is also known as memory-based malware or non-malware.
It uses legitimate system tools and processes to carry out its malicious activities.
It is difficult to detect and remove as it does not leave any files on the system.
Examples of fileless malware include PowerShell-based attacks and mac...
Ransomware is a type of malware that encrypts files and demands payment for decryption. Mitigation involves backups, security software, and user education.
Regularly backup important data to prevent loss
Use anti-malware software to detect and prevent ransomware
Educate users on how to identify and avoid phishing emails and suspicious downloads
Implement network segmentation to limit the spread of ransomware
Have an inciden...
Alerts in SIEM tool
SIEM tools generate alerts based on predefined rules and thresholds
Alerts can be categorized based on severity levels
Alerts can be investigated and triaged to determine if they are true positives or false positives
SIEM tools can also automate response actions based on certain alerts
Examples of alerts include failed login attempts, malware detections, and suspicious network traffic
DOS and DDOS attacks are malicious attempts to disrupt the normal functioning of a website or network.
DOS (Denial of Service) attack is a type of attack where a single system floods the target system with traffic, making it unavailable to legitimate users.
DDOS (Distributed Denial of Service) attack is a more sophisticated version of DOS attack, where multiple systems are used to flood the target system with traffic.
DDO...
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
They ask questions based on security
Injection is a technique used to introduce code or data into a computer program or system.
Injection is commonly used in cyber attacks to exploit vulnerabilities in software.
Types of injection include SQL injection, cross-site scripting (XSS), and command injection.
Injection attacks can lead to unauthorized access, data theft, and system compromise.
SQL injection is a type of injection attack that allows an attacker to execute malicious SQL statements.
SQL injection involves inserting malicious SQL code into input fields of a web application
Attackers can manipulate databases, steal data, and even delete or modify records
Examples include entering ' OR '1'='1' into a login form to bypass authentication
I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.
ISO stands for International Organization for Standardization. An assessment audit is a process of evaluating an organization's compliance with ISO standards.
ISO is an international standard-setting body that develops and publishes standards for various industries to ensure quality, safety, and efficiency.
An assessment audit is a systematic examination of an organization's processes, procedures, and systems to determin...
I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.
Easy aptitude test, just check the accuracy.
Bit tough one, Question is from linked list.
I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.
SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.
SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.
It correlates the data to identify patterns and anomalies that may indicate a security breach.
SIEM provides real-time alerts and reports to security ...
based on 10 reviews
Rating in categories
Consultant
32.8k
salaries
| ₹6.2 L/yr - ₹23 L/yr |
Senior Consultant
20.9k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
13.9k
salaries
| ₹3.8 L/yr - ₹12.6 L/yr |
Assistant Manager
9.9k
salaries
| ₹7.6 L/yr - ₹24 L/yr |
Manager
7k
salaries
| ₹15.7 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant