Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Ingram Micro Team. If you also belong to the team, you can get access from here

Ingram Micro Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Ingram Micro Cyber Security Consultant Interview Questions and Answers

Updated 22 Jan 2021

Ingram Micro Cyber Security Consultant Interview Experiences

1 interview found

I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.

Interview Questionnaire 

6 Questions

  • Q1. Do you have any experience in Penetration testing?
  • Ans. 

    Yes, I have experience in Penetration testing.

    • I have conducted penetration testing for various clients in different industries.

    • I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.

    • I have experience in both manual and automated penetration testing.

    • I have provided detailed reports on vulnerabilities found and recommendations for remediation.

    • I stay up-to-date...

  • Answered by AI
  • Q2. What is your role in previous organization?
  • Q3. How you can implement network segmentation?
  • Ans. 

    Network segmentation can be implemented by creating separate subnetworks and controlling access between them.

    • Identify the different types of data and systems that need to be protected

    • Create separate subnetworks for each type of data/system

    • Use firewalls and access controls to control traffic between subnetworks

    • Regularly review and update the segmentation strategy

    • Example: separating guest Wi-Fi network from corporate net

  • Answered by AI
  • Q4. What is the role of firewall and how it can be used efficiently to improve the security
  • Ans. 

    Firewall is a network security system that monitors and controls incoming and outgoing network traffic.

    • Firewall acts as a barrier between a trusted internal network and untrusted external network

    • It can be used to block unauthorized access to a network

    • It can also be used to block outgoing traffic to prevent data leakage

    • Firewalls can be hardware or software-based

    • Examples of firewalls include Cisco ASA, Fortinet FortiGate

  • Answered by AI
  • Q5. Basic TCP/IP questions
  • Q6. How did you managed to complete a task in which you don't have prior knowledge or experience?

Interview Preparation Tips

Interview preparation tips for other job seekers - Even though you don't know the exact answer, share your relevant ideas and experience

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. Cyber security attack and remediation
  • Q2. Scenario based questions
  • Q3. Tell me about yourself
Round 2 - HR 

(2 Questions)

  • Q1. Basic questions
  • Q2. Salary discussion
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Switching protocols port details
  • Q2. Routung protocols and port details
Round 2 - Technical 

(2 Questions)

  • Q1. Basic OSI, TCP,
  • Q2. DhCP dns working

Interview Preparation Tips

Interview preparation tips for other job seekers - Learn more OSI , protocols, routing ospf , firewall
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Att&ck frame work
  • Q3. Event life cycle of any siem solution
  • Ans. 

    The event life cycle of a SIEM solution involves several stages from data collection to incident response.

    • Data collection: SIEM collects logs and events from various sources such as network devices, servers, and applications.

    • Normalization: The collected data is normalized to a common format for easier analysis and correlation.

    • Aggregation: Events are grouped together based on common attributes to identify patterns and t...

  • Answered by AI
  • Q4. Port numbers, protocols
  • Q5. Explain OSI model briefly
  • Ans. 

    The OSI model is a conceptual framework that defines the functions of a network protocol stack.

    • The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The model helps in understanding how data is transmitted and received in a network.

    • For example, the Physical layer deals wi...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Basics much important in first round.
In second round expect some scenario based questions.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Easy, CSPM,CWPP Policy related question,Networking, Data structures

I applied via LinkedIn and was interviewed in Jun 2022. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. SQL Injection and CSS Attacks
  • Q2. Port Numbers of different protocols
  • Ans. 

    Port numbers for different protocols

    • HTTP - 80

    • HTTPS - 443

    • FTP - 20, 21

    • SSH - 22

    • SMTP - 25

    • DNS - 53

    • POP3 - 110

    • IMAP - 143

    • LDAP - 389

    • RDP - 3389

  • Answered by AI
  • Q3. Steps to consider after Phishing attack
  • Ans. 

    Steps to take after a phishing attack

    • Immediately disconnect from the internet

    • Change all passwords associated with the compromised account

    • Notify the appropriate parties (IT department, bank, etc.)

    • Run a virus scan on all devices used to access the compromised account

    • Educate yourself and others on how to identify and avoid phishing attacks

  • Answered by AI
  • Q4. Some Alerts/incidents and their remediations.
  • Q5. A couple behavioural questions too

Interview Preparation Tips

Interview preparation tips for other job seekers - Interviewers were quite friendly and cool.
Everything went well.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. About yourself and what you have done all these things
  • Q2. Why you are willing to join this company
Round 3 - Coding Test 

They test your coding skills how much you can code

Interview Preparation Tips

Interview preparation tips for other job seekers - Please be prepared for the job and speak with confidence

I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.

Interview Questionnaire 

2 Questions

  • Q1. Bgp, vrrp, basic troubleshooting and work experience
  • Q2. Ospf, WAN, LAN and process

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview was about 3 technical rounds with Hr discussion

Interview Questionnaire 

1 Question

  • Q1. What is SOC?
  • Ans. 

    SOC stands for Security Operations Center, a centralized unit that monitors and defends an organization's IT infrastructure.

    • SOC is responsible for detecting, analyzing, and responding to security incidents.

    • It uses various tools and technologies to monitor network traffic, logs, and events.

    • SOC analysts investigate alerts and incidents to determine the scope and impact of the threat.

    • They also work with other teams to dev...

  • Answered by AI

Skills evaluated in this interview

Ingram Micro Interview FAQs

What are the top questions asked in Ingram Micro Cyber Security Consultant interview?

Some of the top questions asked at the Ingram Micro Cyber Security Consultant interview -

  1. What is the role of firewall and how it can be used efficiently to improve the ...read more
  2. Do you have any experience in Penetration testi...read more
  3. How you can implement network segmentati...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

Synechron Interview Questions
3.6
 • 360 Interviews
Movate Interview Questions
3.3
 • 249 Interviews
SS&C TECHNOLOGIES Interview Questions
3.4
 • 168 Interviews
ThoughtWorks Interview Questions
3.9
 • 145 Interviews
Sopra Steria Interview Questions
3.8
 • 125 Interviews
Luxoft Interview Questions
3.7
 • 121 Interviews
TEKsystems Interview Questions
3.4
 • 115 Interviews
TransUnion Interview Questions
4.0
 • 89 Interviews
View all
Ingram Micro Cyber Security Consultant Salary
based on 4 salaries
₹7 L/yr - ₹8 L/yr
32% less than the average Cyber Security Consultant Salary in India
View more details

Ingram Micro Cyber Security Consultant Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

5.0

Skill development

5.0

Work-life balance

5.0

Salary

5.0

Job security

5.0

Company culture

5.0

Promotions

5.0

Work satisfaction

Explore 1 Review and Rating
Software Engineer
142 salaries
unlock blur

₹3 L/yr - ₹13.3 L/yr

Senior Software Engineer
124 salaries
unlock blur

₹6 L/yr - ₹20 L/yr

DEP Manager, Sales
103 salaries
unlock blur

₹5 L/yr - ₹13 L/yr

Product Manager
72 salaries
unlock blur

₹7.1 L/yr - ₹25 L/yr

Senior Associate
57 salaries
unlock blur

₹3 L/yr - ₹7.3 L/yr

Explore more salaries
Compare Ingram Micro with

Tech Data

4.1
Compare

Redington

4.0
Compare

Tech Data Corporation

4.6
Compare

SYNNEX Corporation

1.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview