i
Infosys
Filter interviews by
I applied via LinkedIn and was interviewed in Dec 2023. There was 1 interview round.
STAUTHTRACE is used for authorization trace while ST01 is used for system trace in SAP.
STAUTHTRACE is used to trace authorization checks in SAP system.
ST01 is used to trace all the activities happening in the SAP system.
STAUTHTRACE helps in identifying authorization issues while ST01 helps in monitoring system activities.
Example: Use STAUTHTRACE to trace authorization failures during a user's attempt to access a transa...
The app may not be assigned to the user's role in the Fiori launchpad.
Check if the app is assigned to the user's role in the Fiori launchpad configuration.
Ensure that the user has the necessary authorizations to access the app.
Verify if the app is hidden or disabled in the launchpad settings.
Check if there are any errors or issues with the app that are preventing it from being displayed.
What people are saying about Infosys
posted on 5 Jul 2024
I applied via Recruitment Consulltant and was interviewed in Jun 2024. There was 1 interview round.
A role is a collection of permissions and responsibilities assigned to a user within a system.
Roles define what actions a user can perform within a system
Roles help in enforcing segregation of duties
Roles can be customized based on job functions or responsibilities
Examples: Admin role, Sales role, Finance role
Yes, I have worked on GRC Access control implementation.
Implemented GRC Access Control for managing user access to critical systems and data
Configured and maintained user roles, authorization profiles, and segregation of duties (SoD) rules
Performed risk analysis and remediation for access violations
Provided training and support to end users on GRC Access Control functionalities
User buffer is a temporary storage area in memory used to hold user input before processing.
User buffer is used to store user input temporarily before processing it.
It helps in managing and processing user input efficiently.
User buffer can be used in various applications like data entry forms, command line interfaces, etc.
SAP Fiori is a user experience (UX) for SAP software, while SAP UI5 is a framework for developing web applications.
SAP Fiori is a collection of apps with a simple and easy-to-use interface.
SAP UI5 is a development toolkit for building web applications with HTML5 and JavaScript.
SAP Fiori is more focused on providing a seamless user experience, while SAP UI5 is more about development tools and frameworks.
SAP Fiori apps c...
I applied via Walk-in and was interviewed in Apr 2024. There was 1 interview round.
posted on 8 May 2024
Role tables in SAP GRC and Security Consultant are used to define roles and their associated authorizations.
Role tables store information about roles, including role name, description, and associated authorizations.
Roles are assigned to users to grant them access to specific functions or data within the SAP system.
Examples of role tables in SAP GRC and Security Consultant include AGR_1251 (Role Names) and AGR_1252 (Rol
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
Interview experience
based on 1 review
Rating in categories
Technology Analyst
55.9k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
50.1k
salaries
| ₹2.8 L/yr - ₹8 L/yr |
System Engineer
39.2k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.7k
salaries
| ₹5.2 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.5k
salaries
| ₹6.2 L/yr - ₹16.8 L/yr |
TCS
Wipro
Cognizant
Accenture