i
NTT DATA, Inc.
Filter interviews by
I applied via Referral and was interviewed before Mar 2022. There were 4 interview rounds.
Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.
Admin account has full control over AD objects and can perform any action on them
OU is a container object used to organize and manage AD objects
OU can be used to delegate administrative control over specific objects to non-administrative users
Example: Sales OU can contain all ...
Top trending discussions
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Security refers to measures taken to protect people, property, and information from harm or unauthorized access.
Security involves implementing procedures, technologies, and personnel to prevent and respond to threats
Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures
Security measures can vary depending on the specific needs and risks of a particular environment or
Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.
Prevent unauthorized access to facilities
Monitor surveillance cameras and alarms
Respond to emergencies and incidents
Enforce safety and security policies
Provide a visible deterrent to potential criminals
Vehicles are checked before entering the gate by security officers for safety and security purposes.
Check for valid identification and authorization to enter the premises
Inspect the vehicle for any suspicious items or signs of tampering
Verify the purpose of the visit and destination within the premises
Use mirrors to check the undercarriage of the vehicle for any hidden objects
Check the trunk and interior of the vehicle
Vehicles are checked at the gate by security officers for safety and security purposes.
Security officers visually inspect vehicles for any suspicious items or behavior
Security officers may use mirrors to check the undercarriage of vehicles for hidden items
Security officers may use metal detectors to check for weapons or other prohibited items
Security officers may ask drivers to open trunks or other compartments for ins
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
posted on 22 Feb 2024
OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.
OWASP provides resources such as tools, documentation, and guidelines for web application security.
It publishes a list of the top 10 most critical web application security risks.
OWASP also offers training and conferences to educate professionals on security best practices.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Prioritizing and remediating vulnerabilities using OWASP Top 10
Start by identifying the vulnerabilities that pose the highest risk to the organization
Use the OWASP Top 10 as a guide to prioritize vulnerabilities
Consider the likelihood and potential impact of each vulnerability
Remediate vulnerabilities based on their priority level
Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities
Example...
Some of the top questions asked at the NTT DATA, Inc. Security Advisor interview -
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Associate
460
salaries
| ₹1.9 L/yr - ₹7.8 L/yr |
Software Development Senior Analyst
423
salaries
| ₹4.5 L/yr - ₹16 L/yr |
Software Development Analyst
406
salaries
| ₹3.3 L/yr - ₹11.5 L/yr |
Software Development Specialist
320
salaries
| ₹6.8 L/yr - ₹18.5 L/yr |
Software Engineer
309
salaries
| ₹3 L/yr - ₹12.7 L/yr |
Accenture
TCS
Infosys
Wipro