i
Ernst & Young
Filter interviews by
I applied via Referral and was interviewed before Sep 2022. There were 4 interview rounds.
Testing communication ability
I applied via Referral and was interviewed in Mar 2022. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Mar 2021. There were 3 interview rounds.
What people are saying about Ernst & Young
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
I applied via campus placement at Guru Nanak Dev University (GNDU) and was interviewed in Apr 2024. There were 3 interview rounds.
Asked about Reasoning, English, Computer networks, Database Management system, Electronics
15 min discussion on any topic given on the spot, 1 min for thinking
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.
It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.
Exa...
OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail
I was interviewed in Aug 2024.
Log sources are essential for hunting threats in a network environment.
Collect logs from network devices such as firewalls, routers, and switches.
Utilize logs from endpoint security solutions like antivirus and EDR tools.
Incorporate logs from servers, including authentication logs and system logs.
Monitor logs from cloud services and applications for any suspicious activities.
Analyze logs from SIEM solutions to correlat
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
They ask questions based on security
Injection is a technique used to introduce code or data into a computer program or system.
Injection is commonly used in cyber attacks to exploit vulnerabilities in software.
Types of injection include SQL injection, cross-site scripting (XSS), and command injection.
Injection attacks can lead to unauthorized access, data theft, and system compromise.
SQL injection is a type of injection attack that allows an attacker to execute malicious SQL statements.
SQL injection involves inserting malicious SQL code into input fields of a web application
Attackers can manipulate databases, steal data, and even delete or modify records
Examples include entering ' OR '1'='1' into a login form to bypass authentication
About a rat that can exfoliate the system and also mirte attack
Assembly language with little python
based on 1 interview
Interview experience
based on 18 reviews
Rating in categories
Senior Consultant
15.7k
salaries
| ₹9.2 L/yr - ₹29.5 L/yr |
Consultant
12k
salaries
| ₹6 L/yr - ₹19 L/yr |
Manager
7.6k
salaries
| ₹17 L/yr - ₹51.2 L/yr |
Assistant Manager
6.4k
salaries
| ₹9.5 L/yr - ₹28.7 L/yr |
Associate Consultant
3.9k
salaries
| ₹3.3 L/yr - ₹12 L/yr |
Deloitte
PwC
EY Global Delivery Services ( EY GDS)
Accenture