Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Kratikal Tech Private Limited Team. If you also belong to the team, you can get access from here

Kratikal Tech Private Limited Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

Kratikal Tech Private Limited Cyber Security Analyst Interview Questions and Answers

Updated 19 May 2024

Kratikal Tech Private Limited Cyber Security Analyst Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2023. There were 3 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Confidential not to say
Round 2 - Technical 

(1 Question)

  • Q1. Confidential not to say
Round 3 - HR 

(1 Question)

  • Q1. Confidential not to say

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be throughout with the basics and what you know tell that don't be apart from that!

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Technical 

(6 Questions)

  • Q1. How to reset Password Protected BIOS Configuration
  • Ans. 

    To reset a password protected BIOS configuration, you can use various methods such as removing the CMOS battery, using a BIOS reset jumper, or using manufacturer-specific software.

    • Remove the CMOS battery from the motherboard for a few minutes to reset the BIOS settings.

    • Locate the BIOS reset jumper on the motherboard and move it to the reset position for a few seconds.

    • Use manufacturer-specific software or tools to reset...

  • Answered by AI
  • Q2. Tell me Something About DNS Server
  • Ans. 

    DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.

    • DNS stands for Domain Name System.

    • It translates domain names into IP addresses.

    • DNS servers help in resolving domain names to their corresponding IP addresses.

    • They play a crucial role in the functioning of the internet.

    • DNS servers use a hierarchical structure for efficient name resolution.

    • They use different typ...

  • Answered by AI
  • Q3. Explain XSS Attack , how will you perform, which resources are needed
  • Ans. 

    XSS attack is a type of web vulnerability where attackers inject malicious scripts into trusted websites to steal sensitive information or perform unauthorized actions.

    • XSS stands for Cross-Site Scripting.

    • Attackers exploit vulnerabilities in web applications to inject malicious scripts.

    • These scripts are then executed by unsuspecting users visiting the compromised website.

    • XSS attacks can be classified into three types: s...

  • Answered by AI
  • Q4. Which is the type of data stored in OSI Model Data Link Layer
  • Ans. 

    The type of data stored in OSI Model Data Link Layer is the frame or packet.

    • The Data Link Layer is responsible for the physical transmission of data between network nodes.

    • It encapsulates the network layer packet into a frame with additional control information.

    • Examples of data stored in this layer include Ethernet frames, MAC addresses, and error detection codes.

  • Answered by AI
  • Q5. MITM Attack, and Disadvantages
  • Ans. 

    MITM Attack is a type of cyber attack where an attacker intercepts communication between two parties to gain unauthorized access or steal information.

    • MITM stands for Man-in-the-Middle.

    • The attacker positions themselves between the sender and receiver to intercept and manipulate the communication.

    • Disadvantages of MITM attacks include unauthorized access to sensitive information, data theft, and potential for further expl...

  • Answered by AI
  • Q6. Difference between SSL and TLS
  • Ans. 

    SSL and TLS are cryptographic protocols used to secure communication over the internet.

    • SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.

    • SSL is the predecessor of TLS.

    • Both protocols provide encryption and authentication for secure communication.

    • TLS is considered more secure than SSL.

    • SSL uses a combination of symmetric and asymmetric encryption, while TLS primarily uses symmetric encryption...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Focus mainly on Network Pentesting Part and a Good Knowledge of Operating System

Skills evaluated in this interview

Interview experience
2
Poor
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Technical 

(2 Questions)

  • Q1. What is xss? And how can it be fixed?
  • Ans. 

    XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

    • XSS attacks can be prevented by properly validating and sanitizing user input.

    • Developers should also use output encoding to prevent malicious scripts from being executed.

    • Using Content Security Policy (CSP) can also help prevent XSS attacks.

    • Examples of XSS att...

  • Answered by AI
  • Q2. What is csrf? And how can it be fixed
  • Ans. 

    CSRF stands for Cross-Site Request Forgery. It is a type of attack that tricks a user into performing an action they did not intend to.

    • CSRF occurs when a malicious website or email tricks a user into clicking a link or button that performs an action on a different website where the user is already authenticated.

    • To prevent CSRF attacks, websites can use techniques such as CSRF tokens, which are unique values generated f...

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Jul 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - HR 

(1 Question)

  • Q1. Describe yourself apart from resume.
Round 3 - Technical 

(1 Question)

  • Q1. What does CIA stands for?
  • Ans. 

    CIA stands for Confidentiality, Integrity, and Availability in the context of information security.

    • Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.

    • Integrity: Ensuring that information is accurate and has not been tampered with.

    • Availability: Ensuring that information is accessible when needed by authorized users.

    • Example: Encrypting sensitive data to maintain confident...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be well prepared about topics mentioned in CV.

I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.

Interview Questionnaire 

5 Questions

  • Q1. Questions on linked list
  • Q2. Questions on resume
  • Q3. About my interests
  • Q4. My interest in symantec
  • Q5. Place to work

Interview Preparation Tips

College Name: IIT Madras

I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. How you find loop in a linked list
  • Ans. 

    To find a loop in a linked list, we use Floyd's cycle-finding algorithm.

    • Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.

    • If there is a loop in the linked list, the two pointers will eventually meet.

    • To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.

    • The meeting point is the start of the loop.

  • Answered by AI
  • Q2. What is LRU, MRU and LFU
  • Ans. 

    LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.

    • LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.

    • MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.

    • LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...

  • Answered by AI
  • Q3. Camel banana problem

Interview Preparation Tips

Round: Test
Experience: coding test in hacker rank. can code in any language except in C and C++.
Duration: 1 hour
Total Questions: 2

Round: Technical Interview
Experience: In technical round the questions are on OS, basics of C(mainly in linked lists) and maths puzzle

They mostly see how you are approaching towards a problem.
It is first time that I heard the camel banana problem. So I struggled for some time and came up with a solution. He said he liked the approach but it can be optimized.

Round: HR Interview
Experience: It started with explain about yourselves. and then he asked to explain about one project with technical details. Later he asked me to explain binary search for a guy who don't know much of technical knowledge. He continued with why we only do 2 partitions why can we make it up to 3. Later he asked me what I liked most in my mobile phone. I said chatting apps. So he asked me that if I was hired as a developer to make a chatting app how will I do it.
Tips: way of thinking and way of approaching towards a problem.

Round: HR Interview
Experience: This round was focused mainly on whether I like to work in Bangalore or not. How I first heard about Symantec. how I will suit for the company. what are my future plans.

Skills: C, OS, Math Puzzles
College Name: IIT Madras

Skills evaluated in this interview

Intern Interview Questions & Answers

FireEye user image Siriguppa Aditya

posted on 15 May 2017

I was interviewed before May 2016.

Interview Preparation Tips

Round: Test
Experience: Test had all kinds of questions apti+c-apti+cse concepts+coding.
It covered all the things related to computer science.There were 3 coding questions among 39
Duration: 1 hour
Total Questions: 39

Round: Technical Interview
Experience: Resume Related

Round: Technical Interview
Experience: Resume related and tested my knowledge on networking

I was interviewed in Feb 2017.

Interview Preparation Tips

Round: Test
Experience: Very first, the interviewers and their employees gave presentation about their products and company. They were very cool and very positive to motivate candidates. After that they started Round 1 that is test based on aptitude and logical problem, also containing c programmin and operating system problems.
Tips: If you have studied basics very well, you will clear the round 1 very easily. Study C programming and Linux Operating System concepts.
Duration: 1 hour 30 minutes
Total Questions: 60

Round: Technical Interview
Experience: I am not specifying any question above because 2nd round i.e Technical Round 1 was continued to abt 1 and hour hours taken by 1 interviewer. If you give all answers confindently, obviously they all must be correct, you will be qualified to next techincal round.
Tips: Same as mentioned in round 1.
Study C programming & Operating System.

Round: Technical Interview
Experience: This was Technical Round 2. It was taken by 3 interviewers asking questions randomly from random subject. Also, one took rapid fire round for 20-25 questions. If you qualified this round, then you can assume that you are selected. This round was also continued more than 1 hour.
Tips: Study Networking concepts

Round: HR Interview
Experience: If you are called for HR interview, then you can assume that you already selected as employee for company. This is round is just for formality to tell you CTC and location and joining, etc.
One thing I would like to mention that in each round they will ask you to tell about yourself. So prepare that too. In HR round, they asked me some tricky puzzles to solve since I mentioned that I am very good in maths so.

College Name: Datta Meghe College of Engineering

I applied via Campus Placement and was interviewed before Oct 2020. There were 4 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Layers in the TCP-IP model
  • Ans. 

    TCP-IP model has 4 layers: Application, Transport, Internet, and Network Interface.

    • Application layer deals with user interface and application protocols (HTTP, FTP, SMTP, etc.)

    • Transport layer provides end-to-end data transfer and error recovery (TCP, UDP)

    • Internet layer handles routing and addressing (IP)

    • Network Interface layer deals with physical network connection (Ethernet, Wi-Fi, etc.)

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for Computer Networks and Operating systems. Have good hands-on experience in research and development

Skills evaluated in this interview

Analyst Interview Questions & Answers

Gen user image Anonymous

posted on 12 Apr 2022

I applied via Referral and was interviewed before Apr 2021. There was 1 interview round.

Round 1 - One-on-one 

(1 Question)

  • Q1. Why do you want join us

Interview Preparation Tips

Interview preparation tips for other job seekers - Be honest and clarify all your doubt
Contribute & help others!
anonymous
You can choose to be anonymous

Kratikal Tech Private Limited Interview FAQs

How many rounds are there in Kratikal Tech Private Limited Cyber Security Analyst interview?
Kratikal Tech Private Limited interview process usually has 3 rounds. The most common rounds in the Kratikal Tech Private Limited interview process are Technical and HR.

Recently Viewed

INTERVIEWS

ICICI Prudential Life Insurance

No Interviews

INTERVIEWS

Shadowfax Technologies

No Interviews

SALARIES

Kratikal Tech Private Limited

INTERVIEWS

Kratikal Tech Private Limited

No Interviews

INTERVIEWS

Namekart

5.6k top interview questions

LIST OF COMPANIES

Discover companies

Find best workplace

INTERVIEWS

Sears Holdings

No Interviews

JOBS

Kratikal Tech Private Limited

No Jobs

JOBS

Kratikal Tech Private Limited

No Jobs

INTERVIEWS

Sears Holdings

No Interviews

Tell us how to improve this page.

Kratikal Tech Private Limited Cyber Security Analyst Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

XenonStack Interview Questions
3.3
 • 25 Interviews
Convin Interview Questions
4.3
 • 21 Interviews
Gen Interview Questions
4.0
 • 17 Interviews
Miko Interview Questions
2.9
 • 10 Interviews
Netomi Interview Questions
4.4
 • 9 Interviews
Safe Security Interview Questions
2.9
 • 8 Interviews
Habilelabs Interview Questions
4.2
 • 8 Interviews
View all
Kratikal Tech Private Limited Cyber Security Analyst Salary
based on 7 salaries
₹3 L/yr - ₹8.1 L/yr
13% less than the average Cyber Security Analyst Salary in India
View more details

Kratikal Tech Private Limited Cyber Security Analyst Reviews and Ratings

based on 1 review

1.0/5

Rating in categories

1.0

Skill development

1.0

Work-life balance

1.0

Salary

1.0

Job security

1.0

Company culture

1.0

Promotions

1.0

Work satisfaction

Explore 1 Review and Rating
Security Analyst
24 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

HR Executive
14 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Software Developer
11 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Software Engineer
11 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Business Development Executive
9 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Kratikal Tech Private Limited with

Safe Security

2.9
Compare

TAC Security

2.7
Compare

QUICK HEAL TECHNOLOGIES

3.7
Compare

Cyberbit

1.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview
Rate your experience using AmbitionBox
Terrible
Terrible
Poor
Poor
Average
Average
Good
Good
Excellent
Excellent