Genpact
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .
To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.
Analyze the attack vector to understand how the attack occurred
Contain the attack by isolating affected systems and limiting further damage
Investigate the root cause of the attack to prevent future incidents
Implement necessary se...
To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.
Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks
Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities
Implement security patches provided by soft...
A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.
Honeypots are used to detect and analyze cyber threats in a controlled environment.
They can be deployed within an organization's network to attract and monitor malicious activities.
Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...
I handle security incidents by following established incident response procedures and utilizing various security tools.
Immediately isolate affected systems to prevent further damage
Collect and analyze relevant data to determine the scope and impact of the incident
Contain the incident by blocking malicious activity and removing threats
Communicate with stakeholders to keep them informed of the situation
Document the incid...
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to mainta
The port number for RDP (Remote Desktop Protocol) is 3389.
Port number for RDP is 3389
RDP uses TCP protocol
Commonly used for remote desktop connections
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
I came across a vulnerability in a web application that allowed for SQL injection attacks.
Identified lack of input validation in user inputs
Discovered that the application was directly executing user-supplied SQL queries
Suggested implementing parameterized queries to prevent SQL injection
Tested the vulnerability by attempting to inject SQL code through input fields
It depends on the specific use case and requirements.
TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.
UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.
Choose TCP for applications that require reliable data transmission, such as ...
Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.
Hashing is commonly used in password storage to securely store user passwords without storing the actual password.
Hashing is used in digital signatures to ensure the integrity of the signed data.
Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.
File integrity checks ...
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is online test. In this test there is question of apti and also coding and from 5g question.
There are two questions asked and time is enough to solve 60 minutes
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Check if the reversed string is equal to the original string
Create a function to add two numbers
Define a function that takes two parameters as input
Inside the function, add the two numbers together and return the result
Example: function addNumbers(num1, num2) { return num1 + num2; }
Binary search code implementation in Python
Define a function that takes a sorted array and a target value as input
Initialize two pointers, low and high, to the start and end of the array respectively
While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target
If array[mid] is equal to target, return mid
If array[mid] is less than target, update low to mid + 1
If array[mid]...
A program to check if a given name is a palindrome or not.
Convert the name to lowercase to handle case-insensitivity
Remove any spaces or special characters from the name
Reverse the name and compare it with the original name to check for palindrome
malloc and calloc are functions in C programming used for dynamic memory allocation.
malloc function is used to allocate a single block of memory of a specified size.
calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I would like simple test
I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.
Configured routers and switches to optimize network performance
Assisted in setting up VLANs and implementing security protocols
Troubleshooted network connectivity issues for end users
Participated in network infrastructure upgrades and maintenance
Interview experience
based on 3 reviews
Rating in categories
Process Developer
36.2k
salaries
| ₹1 L/yr - ₹6.8 L/yr |
Process Associate
28k
salaries
| ₹0.9 L/yr - ₹6.5 L/yr |
Assistant Manager
19.8k
salaries
| ₹5 L/yr - ₹14 L/yr |
Management Trainee
19.2k
salaries
| ₹1.6 L/yr - ₹8.5 L/yr |
Manager
7.4k
salaries
| ₹5.7 L/yr - ₹24 L/yr |
Accenture
Capgemini
TCS
Cognizant