i
HCLTech
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Jun 2024. There was 1 interview round.
A role is a collection of permissions and responsibilities assigned to a user within a system.
Roles define what actions a user can perform within a system
Roles help in enforcing segregation of duties
Roles can be customized based on job functions or responsibilities
Examples: Admin role, Sales role, Finance role
Yes, I have worked on GRC Access control implementation.
Implemented GRC Access Control for managing user access to critical systems and data
Configured and maintained user roles, authorization profiles, and segregation of duties (SoD) rules
Performed risk analysis and remediation for access violations
Provided training and support to end users on GRC Access Control functionalities
User buffer is a temporary storage area in memory used to hold user input before processing.
User buffer is used to store user input temporarily before processing it.
It helps in managing and processing user input efficiently.
User buffer can be used in various applications like data entry forms, command line interfaces, etc.
SAP Fiori is a user experience (UX) for SAP software, while SAP UI5 is a framework for developing web applications.
SAP Fiori is a collection of apps with a simple and easy-to-use interface.
SAP UI5 is a development toolkit for building web applications with HTML5 and JavaScript.
SAP Fiori is more focused on providing a seamless user experience, while SAP UI5 is more about development tools and frameworks.
SAP Fiori apps c...
What people are saying about HCLTech
I applied via Walk-in and was interviewed in Apr 2024. There was 1 interview round.
posted on 10 Jun 2024
I applied via LinkedIn and was interviewed in Dec 2023. There was 1 interview round.
STAUTHTRACE is used for authorization trace while ST01 is used for system trace in SAP.
STAUTHTRACE is used to trace authorization checks in SAP system.
ST01 is used to trace all the activities happening in the SAP system.
STAUTHTRACE helps in identifying authorization issues while ST01 helps in monitoring system activities.
Example: Use STAUTHTRACE to trace authorization failures during a user's attempt to access a transa...
The app may not be assigned to the user's role in the Fiori launchpad.
Check if the app is assigned to the user's role in the Fiori launchpad configuration.
Ensure that the user has the necessary authorizations to access the app.
Verify if the app is hidden or disabled in the launchpad settings.
Check if there are any errors or issues with the app that are preventing it from being displayed.
posted on 8 May 2024
Role tables in SAP GRC and Security Consultant are used to define roles and their associated authorizations.
Role tables store information about roles, including role name, description, and associated authorizations.
Roles are assigned to users to grant them access to specific functions or data within the SAP system.
Examples of role tables in SAP GRC and Security Consultant include AGR_1251 (Role Names) and AGR_1252 (Rol
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
posted on 22 Jul 2024
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
Interview experience
based on 1 review
Rating in categories
Software Engineer
22.7k
salaries
| ₹1.2 L/yr - ₹8 L/yr |
Technical Lead
20.9k
salaries
| ₹6.9 L/yr - ₹25 L/yr |
Senior Software Engineer
15.6k
salaries
| ₹4 L/yr - ₹16.5 L/yr |
Lead Engineer
14.8k
salaries
| ₹4.2 L/yr - ₹14 L/yr |
Analyst
14.1k
salaries
| ₹1.3 L/yr - ₹6.6 L/yr |
TCS
Wipro
Accenture
Cognizant