Upload Button Icon Add office photos

Filter interviews by

Global IS Consulting Interview Questions and Answers

Updated 22 Nov 2024

8 Interview questions

A Cyber Security Analyst Lead was asked 7mo ago
Q. How do you perform privilege escalation if you have normal user access?
Ans. 

Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.

  • Exploit vulnerabilities in the system to gain higher privileges

  • Use social engineering techniques to trick users into granting higher privileges

  • Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions

View all Cyber Security Analyst Lead interview questions
A Cyber Security Analyst Lead was asked 7mo ago
Q. How do you use the repeater tool in Burp Suite?
Ans. 

Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.

  • Repeater tool allows for manual editing of requests before sending them again

  • Useful for testing different parameters or payloads

  • Helps in analyzing server responses to modified requests

View all Cyber Security Analyst Lead interview questions
A Cyber Security Analyst Lead was asked 7mo ago
Q. How to perform a brute force attack?
Ans. 

Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.

  • Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords

  • Start with common passwords and then move on to more complex ones

  • Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully

View all Cyber Security Analyst Lead interview questions
A Cyber Security Analyst Lead was asked 7mo ago
Q. Explain the different types of XSS vulnerabilities.
Ans. 

Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages

  • Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database

  • DOM-based XSS: the attack occ...

View all Cyber Security Analyst Lead interview questions
A Cyber Security Analyst Lead was asked 7mo ago
Q. What approach do you follow to perform VAPT on web applications, mobile applications, and network infrastructure, given a URL or IP address?
Ans. 

We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.

  • First, conduct a thorough reconnaissance phase to gather information about the target.

  • Next, perform vulnerability scanning to identify potential security weaknesses.

  • Then, conduct penetration testing to exploit the identified vulnerabilities.

  • Finally, provide a detailed rep...

View all Cyber Security Analyst Lead interview questions
A Cyber Security Analyst Lead was asked 7mo ago
Q. Tell me about the OWASP top 10, its uses, and why we use it.
Ans. 

OWASP Top 10 identifies the most critical web application security risks to help organizations improve their security posture.

  • Provides a framework for understanding common vulnerabilities like SQL Injection and Cross-Site Scripting (XSS).

  • Helps prioritize security efforts by focusing on the most prevalent and impactful risks.

  • Facilitates communication between technical and non-technical stakeholders regarding securi...

View all Cyber Security Analyst Lead interview questions
A Cyber Security Analyst Lead was asked 7mo ago
Q. Differentiate between different attacks (like; CSRF/SSRF, LFI/RFI Stored XSS/DOM based XSS, etc.)
Ans. 

Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.

  • CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge

  • SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers

  • LFI (Local File Inclusion) - attacker can include files on a server through a web brows...

View all Cyber Security Analyst Lead interview questions
Are these interview questions helpful?
A Cyber Security Analyst Lead was asked 7mo ago
Q. List of common ports for network communication
Ans. 

Common ports for network communication

  • Port 80 - HTTP (Hypertext Transfer Protocol)

  • Port 443 - HTTPS (Hypertext Transfer Protocol Secure)

  • Port 25 - SMTP (Simple Mail Transfer Protocol)

  • Port 22 - SSH (Secure Shell)

  • Port 21 - FTP (File Transfer Protocol)

View all Cyber Security Analyst Lead interview questions

Global IS Consulting Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - Technical 

(9 Questions)

  • Q1. About OWASP top 10, uses, and why we use?
  • Ans. 

    OWASP Top 10 identifies the most critical web application security risks to help organizations improve their security posture.

    • Provides a framework for understanding common vulnerabilities like SQL Injection and Cross-Site Scripting (XSS).

    • Helps prioritize security efforts by focusing on the most prevalent and impactful risks.

    • Facilitates communication between technical and non-technical stakeholders regarding security is...

  • Answered by AI
  • Q2. Differentiate between different attacks (like; CSRF/SSRF, LFI/RFI Stored XSS/DOM based XSS, etc.)
  • Ans. 

    Different attacks have unique characteristics and targets, such as CSRF/SSRF, LFI/RFI, Stored XSS/DOM based XSS.

    • CSRF (Cross-Site Request Forgery) - attacker tricks a user into performing actions on a website without their knowledge

    • SSRF (Server-Side Request Forgery) - attacker can make the server perform requests to other servers

    • LFI (Local File Inclusion) - attacker can include files on a server through a web browser

    • RFI...

  • Answered by AI
  • Q3. How to preform privilege escalation if we have normal user access?
  • Ans. 

    Privilege escalation can be achieved by exploiting vulnerabilities in the system or using social engineering techniques.

    • Exploit vulnerabilities in the system to gain higher privileges

    • Use social engineering techniques to trick users into granting higher privileges

    • Utilize known privilege escalation techniques such as DLL hijacking or abusing misconfigured permissions

  • Answered by AI
  • Q4. Different types of xss, explain
  • Ans. 

    Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • Reflected XSS: occurs when the malicious script is reflected off a web server, such as in search results or error messages

    • Stored XSS: the injected script is permanently stored on the target server, such as in a comment section or database

    • DOM-based XSS: the attack occurs i...

  • Answered by AI
  • Q5. List of common ports for network communication
  • Ans. 

    Common ports for network communication

    • Port 80 - HTTP (Hypertext Transfer Protocol)

    • Port 443 - HTTPS (Hypertext Transfer Protocol Secure)

    • Port 25 - SMTP (Simple Mail Transfer Protocol)

    • Port 22 - SSH (Secure Shell)

    • Port 21 - FTP (File Transfer Protocol)

  • Answered by AI
  • Q6. How to preform bruteforce
  • Ans. 

    Bruteforce is a method used to crack passwords by systematically trying all possible combinations until the correct one is found.

    • Use automated tools like Hydra or Burp Suite to try different combinations of usernames and passwords

    • Start with common passwords and then move on to more complex ones

    • Bruteforcing can be time-consuming and may trigger account lockouts if not done carefully

  • Answered by AI
  • Q7. How to use burpsuite, and nessus
  • Ans. 

    Burp Suite is a web vulnerability scanner and proxy tool, while Nessus is a vulnerability assessment tool.

    • Burp Suite is used for web application security testing, including scanning for vulnerabilities and intercepting and modifying HTTP traffic.

    • Nessus is used for network vulnerability scanning and assessment, identifying security issues in systems and applications.

    • Both tools are essential for identifying and addressin...

  • Answered by AI
  • Q8. Use repeater in burpsuite
  • Ans. 

    Repeater in Burp Suite is used to manually modify and re-send individual HTTP requests.

    • Repeater tool allows for manual editing of requests before sending them again

    • Useful for testing different parameters or payloads

    • Helps in analyzing server responses to modified requests

  • Answered by AI
  • Q9. What approach we follow to preform vapt on web applications, mobile applications, and network infra. If we have the url/ip address?
  • Ans. 

    We follow a systematic approach for performing VAPT on web applications, mobile applications, and network infra with the provided URL/IP address.

    • First, conduct a thorough reconnaissance phase to gather information about the target.

    • Next, perform vulnerability scanning to identify potential security weaknesses.

    • Then, conduct penetration testing to exploit the identified vulnerabilities.

    • Finally, provide a detailed report w...

  • Answered by AI
Round 2 - HR 

(3 Questions)

  • Q1. Certifications details
  • Q2. Salary expectation
  • Q3. Willing to relocate if needed

Interview Preparation Tips

Topics to prepare for Global IS Consulting Cyber Security Analyst Lead interview:
  • Ceh
  • CEH pratical
  • oscp
  • Cissp
  • crtp
  • Networking
  • Web Application
  • OWASP
  • cis benchmark
Interview preparation tips for other job seekers - If your are looking for jobs, then first please make your basic/base strong then go for advance, that will provide you extra support in your answer. Also have some hand-on practical practice to crack any technical interview.

Skills evaluated in this interview

Top trending discussions

View All
Interview Tips & Stories
2w
toobluntforu
·
works at
Cvent
Can speak English, can’t deliver in interviews
I feel like I can't speak fluently during interviews. I do know english well and use it daily to communicate, but the moment I'm in an interview, I just get stuck. since it's not my first language, I struggle to express what I actually feel. I know the answer in my head, but I just can’t deliver it properly at that moment. Please guide me
Got a question about Global IS Consulting?
Ask anonymously on communities.

Interview questions from similar companies

Intern Interview Questions & Answers

Cognizant user image vagmi gupta

posted on 13 Jul 2022

I appeared for an interview before Jul 2021.

Round 1 - Technical 

(2 Questions)

  • Q1. About your project and s1kills
  • Q2. Interview went well .

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare atleast one language or technology

Data Analyst Interview Questions & Answers

Amazon user image himanshu kohli

posted on 31 May 2021

I applied via Walk-in and was interviewed before May 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Introducing your self

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident

I applied via Naukri.com

Interview Questionnaire 

2 Questions

  • Q1. Why Amazon?
  • Ans. 

    Amazon's innovation, customer focus, and diverse opportunities align with my career goals and values.

    • Customer Obsession: Amazon prioritizes customer satisfaction, evident in initiatives like Prime and personalized recommendations.

    • Innovation: The company is a leader in technology and logistics, constantly pushing boundaries with services like AWS and drone delivery.

    • Diversity of Roles: Amazon offers a wide range of caree...

  • Answered by AI
  • Q2. What do you expect from Amazon?
  • Ans. 

    I expect Amazon to foster innovation, provide growth opportunities, and maintain a customer-centric culture.

    • Opportunities for professional development, such as training programs and mentorship.

    • A collaborative work environment that encourages teamwork and idea sharing.

    • Access to cutting-edge technology and resources to drive innovation.

    • A strong focus on customer satisfaction, ensuring that every decision prioritizes the ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be open to anything, and keep your expectations low as your expectations might kill you. Just relax and take everything in a healthy way

Interview Questionnaire 

2 Questions

  • Q1. Technical
  • Q2. Be yourself

I applied via Naukri.com and was interviewed before Feb 2020. There were 3 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. What are different types of cloud?
  • Q2. What is workflow,trigger, different types of reports, roles, profiles, permission set, sharing rules etc?
  • Ans. 

    Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.

    • Workflow is a series of automated steps that can be used to streamline business processes.

    • Triggers are used to execute code before or after a record is inserted, updated, or deleted.

    • Reports are used to display data in a visual format, such as a table or chart.

    • Roles are used to define the hierarchy of ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Google the question related to your topic and also become 100% prepared with your resume.

Skills evaluated in this interview

I appeared for an interview before Jul 2020.

Interview Questionnaire 

1 Question

  • Q1. Is Infosys listed?
  • Ans. 

    Yes, Infosys is listed on the Indian stock exchanges as well as on the NYSE.

    • Infosys is listed on the Bombay Stock Exchange (BSE) and National Stock Exchange of India (NSE)

    • It is also listed on the New York Stock Exchange (NYSE)

    • Infosys has a market capitalization of over $80 billion as of 2021

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well in advance
Are these interview questions helpful?

I applied via Job Fair and was interviewed before Feb 2021. There were 2 interview rounds.

Round 1 - Aptitude Test 
Round 2 - One-on-one 

(1 Question)

  • Q1. Basic accounting methods and journals

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident About what you are saying

I applied via Naukri.com and was interviewed in Nov 2019. There were 3 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Why are you looking for the job change?
  • Ans. 

    I'm seeking new challenges and opportunities for growth that align with my career goals and aspirations.

    • Desire for professional growth: I'm looking to expand my skill set and take on more leadership responsibilities.

    • Seeking a better cultural fit: My current company has a different work culture than what I thrive in; I value collaboration and innovation.

    • Interest in new technologies: I'm excited about working with cuttin...

  • Answered by AI
  • Q2. Relevant technical questions, as per my current technology

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep it simple and be yourself. That's what the interviewers looked into. Also a thorough understanding of the technology is a must and that is what will help you in cracking the interview. You don't have to go in-depth, just the overview and what happens when is what they look for. Good communication skills is also an added incentive, something I always try to work on. All the best

I applied via Approached by Company and was interviewed before May 2018. There were 6 interview rounds.

Interview Questionnaire 

5 Questions

  • Q1. This is face to face interview... They are observing our behaviour... Attitude... Etc
  • Q2. Introduce u r self....
  • Ans. 

    I am a dedicated and hardworking individual with a passion for learning and growth.

    • I have a Bachelor's degree in Business Administration from XYZ University.

    • I have 3 years of experience working in marketing and sales roles.

    • I am proficient in Microsoft Office Suite and have strong communication skills.

    • I am a team player and enjoy collaborating with others to achieve common goals.

  • Answered by AI
  • Q3. U r carrier objections
  • Ans. 

    My career objectives focus on continuous growth, contributing to team success, and making a positive impact in my field.

    • Aim to develop expertise in my field, such as becoming a certified project manager.

    • Seek leadership opportunities to guide and mentor junior team members.

    • Aspire to work on innovative projects that challenge my skills and creativity.

    • Desire to contribute to a company's mission, like improving customer sa...

  • Answered by AI
  • Q4. About TCS
  • Q5. Why should u select TCS
  • Ans. 

    TCS is a global leader in IT services with a strong reputation for innovation and client satisfaction.

    • TCS has a proven track record of delivering high-quality services to clients worldwide.

    • TCS offers a wide range of opportunities for career growth and development.

    • TCS values diversity and inclusion, creating a supportive work environment for employees.

    • TCS invests in cutting-edge technologies and training programs to kee...

  • Answered by AI

Interview Preparation Tips

Round: Group Discussion
Experience: Any kind of topic u cn select... Sales, accounts, service

Round: Test
Experience: Aptitude test... Mathematic and problem solving... General knowledge is very important

Round: Telephonic
Experience: This is final round... BH directly interact with us...

General Tips: Be confident... Be clam.... Keep smiling face... That is the way to win
Skills: Communication, Body Language, Leadership, Presentation Skills, Time Management
Duration: <1 week

Global IS Consulting Interview FAQs

How many rounds are there in Global IS Consulting interview?
Global IS Consulting interview process usually has 2 rounds. The most common rounds in the Global IS Consulting interview process are Technical and HR.
What are the top questions asked in Global IS Consulting interview?

Some of the top questions asked at the Global IS Consulting interview -

  1. what approach we follow to preform vapt on web applications, mobile application...read more
  2. how to preform privilege escalation if we have normal user acce...read more
  3. About OWASP top 10, uses, and why we u...read more

Tell us how to improve this page.

Overall Interview Experience Rating

5/5

based on 1 interview experience

Difficulty level

Moderate 100%

Duration

Less than 2 weeks 100%
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.6
 • 11.1k Interviews
Accenture Interview Questions
3.7
 • 8.7k Interviews
Infosys Interview Questions
3.6
 • 7.9k Interviews
Wipro Interview Questions
3.7
 • 6.1k Interviews
Cognizant Interview Questions
3.7
 • 5.9k Interviews
Amazon Interview Questions
4.0
 • 5.4k Interviews
Capgemini Interview Questions
3.7
 • 5.1k Interviews
Tech Mahindra Interview Questions
3.5
 • 4.1k Interviews
HCLTech Interview Questions
3.5
 • 4.1k Interviews
Genpact Interview Questions
3.7
 • 3.4k Interviews
View all

Global IS Consulting Reviews and Ratings

based on 1 review

4.0/5

Rating in categories

4.0

Skill development

4.0

Work-life balance

3.0

Salary

4.0

Job security

4.0

Company culture

3.0

Promotions

5.0

Work satisfaction

Explore 1 Review and Rating
Compare Global IS Consulting with

TCS

3.6
Compare

Accenture

3.7
Compare

Wipro

3.7
Compare

Cognizant

3.7
Compare
write
Share an Interview