i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.
Basic information about experience
I applied via campus placement at Guru Nanak Dev University (GNDU) and was interviewed in Apr 2024. There were 3 interview rounds.
Asked about Reasoning, English, Computer networks, Database Management system, Electronics
15 min discussion on any topic given on the spot, 1 min for thinking
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.
It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.
Exa...
OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail
Log sources are essential for hunting threats in a network environment.
Collect logs from network devices such as firewalls, routers, and switches.
Utilize logs from endpoint security solutions like antivirus and EDR tools.
Incorporate logs from servers, including authentication logs and system logs.
Monitor logs from cloud services and applications for any suspicious activities.
Analyze logs from SIEM solutions to correlat
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
They ask questions based on security
Injection is a technique used to introduce code or data into a computer program or system.
Injection is commonly used in cyber attacks to exploit vulnerabilities in software.
Types of injection include SQL injection, cross-site scripting (XSS), and command injection.
Injection attacks can lead to unauthorized access, data theft, and system compromise.
SQL injection is a type of injection attack that allows an attacker to execute malicious SQL statements.
SQL injection involves inserting malicious SQL code into input fields of a web application
Attackers can manipulate databases, steal data, and even delete or modify records
Examples include entering ' OR '1'='1' into a login form to bypass authentication
I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.
2 hours, basic dsa questions, cyber security related mcqs
Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables and defining relationships between them.
It helps in reducing data redundancy by storing data in a structured and organized manner.
Normalization also helps in improving data integrity by ensuring that data is consistent ...
Truncate is a DDL command that removes all records from a table, while delete is a DML command that removes specific records.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity columns, while delete does not.
Truncate cannot be rolled back, while delete can be rolled back using a transaction.
Truncate does not fire triggers, while delete does.
I will protect my digital data by implementing strong encryption, regular backups, and strict access controls.
Implement strong encryption algorithms to secure data in transit and at rest
Regularly backup data to prevent loss in case of cyber attacks or hardware failures
Enforce strict access controls by using multi-factor authentication and least privilege principle
Some types of cyber attacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelming a system with a f...
I applied via Campus Placement and was interviewed in Aug 2023. There were 2 interview rounds.
There was group of 5 people in the gd and the topic was Electric Vehicles
20 minutes were given to conclude the gd
I applied via Referral and was interviewed in Nov 2022. There were 3 interview rounds.
I applied via Referral and was interviewed before Aug 2022. There were 3 interview rounds.
General aptitude test - Quant, DI/LR, English
I applied via Referral and was interviewed in Oct 2022. There was 1 interview round.
based on 1 interview
Interview experience
based on 7 reviews
Rating in categories
Consultant
33.3k
salaries
| ₹6.3 L/yr - ₹23.4 L/yr |
Senior Consultant
20.9k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
14.2k
salaries
| ₹3.9 L/yr - ₹12.5 L/yr |
Assistant Manager
10.1k
salaries
| ₹7.8 L/yr - ₹24 L/yr |
Manager
7.1k
salaries
| ₹15.8 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant