i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I was interviewed in Aug 2024.
I was interviewed before Feb 2024.
Explanation of the scenario-based cyber kill chain.
posted on 3 Jul 2024
It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty
Consultants provide expert advice and guidance to clients in a specific field or industry.
Consultants analyze client needs and provide tailored solutions
They offer recommendations based on industry best practices
Consultants may also assist with implementation and training
They often work on a project basis or provide ongoing support
Examples: Cyber Security Consultants help organizations improve their security posture, I
I applied via campus placement at BP Poddar Institute of Management & Technology, Kolkata and was interviewed before Dec 2023. There were 4 interview rounds.
It was a medium level test.
I applied via campus placement at Guru Nanak Dev University (GNDU) and was interviewed in Apr 2024. There were 3 interview rounds.
Asked about Reasoning, English, Computer networks, Database Management system, Electronics
15 min discussion on any topic given on the spot, 1 min for thinking
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.
It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.
Exa...
OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail
posted on 3 Jul 2024
It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty
Consultants provide expert advice and guidance to clients in a specific field or industry.
Consultants analyze client needs and provide tailored solutions
They offer recommendations based on industry best practices
Consultants may also assist with implementation and training
They often work on a project basis or provide ongoing support
Examples: Cyber Security Consultants help organizations improve their security posture, I
I applied via Referral and was interviewed in Oct 2022. There was 1 interview round.
I applied via Campus Placement and was interviewed in Aug 2023. There were 2 interview rounds.
There was group of 5 people in the gd and the topic was Electric Vehicles
20 minutes were given to conclude the gd
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
Aptittude test consist of basic quantitative and logical questions
I applied via LinkedIn and was interviewed in Feb 2021. There were 3 interview rounds.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cyber security involves a range of technologies, processes, and practices designed to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and intrusion detection systems.
Cyber security al...
Phishing attack is a type of social engineering attack where attackers trick victims into revealing sensitive information.
Phishing attacks can be carried out through emails, phone calls, or text messages.
Attackers often use fake websites or login pages to steal login credentials.
Phishing attacks can also be used to distribute malware or ransomware.
Examples of phishing attacks include spear phishing, whaling, and vishin...
To identify the genuine mail, check the sender's email address and verify the content and attachments.
Check the sender's email address for any discrepancies or variations.
Verify the content of the email for any grammatical errors or suspicious requests.
Check the attachments for any malware or suspicious file types.
Contact the sender directly to confirm the authenticity of the email.
Use email filtering and anti-phishing...
The constantly evolving nature of cyber threats and the challenge of staying ahead of them excites me about cyber security.
The thrill of solving complex puzzles and identifying vulnerabilities
The opportunity to work with cutting-edge technology and tools
The sense of purpose in protecting individuals and organizations from cyber attacks
The potential for continuous learning and professional growth
Examples: discovering a ...
To make the system secure from a user point of view, I would implement strong authentication measures and educate users on safe browsing habits.
Implement multi-factor authentication
Enforce strong password policies
Regularly update and patch software
Provide security awareness training to users
Restrict user access to sensitive data
Monitor user activity for suspicious behavior
based on 2 interviews
Interview experience
based on 9 reviews
Rating in categories
Consultant
33.3k
salaries
| ₹6.3 L/yr - ₹23.1 L/yr |
Senior Consultant
20.9k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
14.2k
salaries
| ₹3.8 L/yr - ₹12.6 L/yr |
Assistant Manager
10k
salaries
| ₹7.8 L/yr - ₹24 L/yr |
Manager
7.1k
salaries
| ₹15.8 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant