i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I was interviewed before Feb 2024.
Explanation of the scenario-based cyber kill chain.
I was interviewed in Aug 2024.
posted on 3 Jul 2024
It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty
Consultants provide expert advice and guidance to clients in a specific field or industry.
Consultants analyze client needs and provide tailored solutions
They offer recommendations based on industry best practices
Consultants may also assist with implementation and training
They often work on a project basis or provide ongoing support
Examples: Cyber Security Consultants help organizations improve their security posture, I
I applied via campus placement at BP Poddar Institute of Management & Technology, Kolkata and was interviewed before Dec 2023. There were 4 interview rounds.
It was a medium level test.
I applied via campus placement at Guru Nanak Dev University (GNDU) and was interviewed in Apr 2024. There were 3 interview rounds.
Asked about Reasoning, English, Computer networks, Database Management system, Electronics
15 min discussion on any topic given on the spot, 1 min for thinking
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.
It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.
Exa...
OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail
posted on 3 Jul 2024
It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty
Consultants provide expert advice and guidance to clients in a specific field or industry.
Consultants analyze client needs and provide tailored solutions
They offer recommendations based on industry best practices
Consultants may also assist with implementation and training
They often work on a project basis or provide ongoing support
Examples: Cyber Security Consultants help organizations improve their security posture, I
I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.
2 hours, basic dsa questions, cyber security related mcqs
Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables and defining relationships between them.
It helps in reducing data redundancy by storing data in a structured and organized manner.
Normalization also helps in improving data integrity by ensuring that data is consistent ...
Truncate is a DDL command that removes all records from a table, while delete is a DML command that removes specific records.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity columns, while delete does not.
Truncate cannot be rolled back, while delete can be rolled back using a transaction.
Truncate does not fire triggers, while delete does.
I will protect my digital data by implementing strong encryption, regular backups, and strict access controls.
Implement strong encryption algorithms to secure data in transit and at rest
Regularly backup data to prevent loss in case of cyber attacks or hardware failures
Enforce strict access controls by using multi-factor authentication and least privilege principle
Some types of cyber attacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelming a system with a f...
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
They ask questions based on security
Injection is a technique used to introduce code or data into a computer program or system.
Injection is commonly used in cyber attacks to exploit vulnerabilities in software.
Types of injection include SQL injection, cross-site scripting (XSS), and command injection.
Injection attacks can lead to unauthorized access, data theft, and system compromise.
SQL injection is a type of injection attack that allows an attacker to execute malicious SQL statements.
SQL injection involves inserting malicious SQL code into input fields of a web application
Attackers can manipulate databases, steal data, and even delete or modify records
Examples include entering ' OR '1'='1' into a login form to bypass authentication
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
Aptittude test consist of basic quantitative and logical questions
I applied via campus placement at BP Poddar Institute of Management & Technology, Kolkata and was interviewed before Dec 2023. There were 4 interview rounds.
It was a medium level test.
based on 2 interviews
Interview experience
based on 9 reviews
Rating in categories
Consultant
33.3k
salaries
| ₹6.3 L/yr - ₹23.4 L/yr |
Senior Consultant
20.9k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
14.2k
salaries
| ₹3.9 L/yr - ₹12.5 L/yr |
Assistant Manager
10.1k
salaries
| ₹7.8 L/yr - ₹24 L/yr |
Manager
7.1k
salaries
| ₹15.8 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant