Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by NTT Data Team. If you also belong to the team, you can get access from here

NTT Data

Compare button icon Compare button icon Compare
3.9

based on 3.8k Reviews

Filter interviews by

NTT Data IT Security Specialist IAM Interview Questions and Answers

Updated 23 May 2022

NTT Data IT Security Specialist IAM Interview Experiences

1 interview found

I applied via Walk-in and was interviewed before May 2021. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. What are your privious projects??
  • Q2. What are the challanges faced in your previous projects??
Round 2 - Case Study 

Cyberark implementation and password management??

Round 3 - HR 

(2 Questions)

  • Q1. What is your Expected CTC??
  • Q2. What are your roles and responsibilities in previous company and company payroll name??

Interview Preparation Tips

Interview preparation tips for other job seekers - No tips will be given from side for job seekers...

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
-
Result
Selected Selected
Round 1 - Aptitude Test 

For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.

✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions

Round 2 - Coding Test 

𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!

We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder

Round 3 - Technical 

(2 Questions)

  • Q1. 2️⃣ 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: This is the actual amount you take home after deductions like: • Employee’s contribution to PF • Income tax (TDS) • Professional tax
  • Q2. 𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀! We’ve all been there—excitedly discussing job offers and hearing about the impressi...

Interview Preparation Tips

Interview preparation tips for other job seekers - 𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!

We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder:

“𝘞𝘩𝘺 𝘥𝘰𝘦𝘴𝘯’𝘵 𝘮𝘺 𝘪𝘯-𝘩𝘢𝘯𝘥 𝘴𝘢𝘭𝘢𝘳𝘺 𝘮𝘢𝘵𝘤𝘩 𝘵𝘩𝘦 𝘊𝘛𝘊 𝘐 𝘸𝘢𝘴 𝘱𝘳𝘰𝘮𝘪𝘴𝘦𝘥?”
Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. What is security
  • Ans. 

    Security refers to measures taken to protect people, property, and information from harm or unauthorized access.

    • Security involves implementing procedures, technologies, and personnel to prevent and respond to threats

    • Examples include surveillance cameras, access control systems, security guards, and cybersecurity measures

    • Security measures can vary depending on the specific needs and risks of a particular environment or

  • Answered by AI
  • Q2. Why the Security officer in side tha industry
  • Ans. 

    Security officers are essential in the industry to protect people, property, and assets from potential threats and ensure a safe environment.

    • Prevent unauthorized access to facilities

    • Monitor surveillance cameras and alarms

    • Respond to emergencies and incidents

    • Enforce safety and security policies

    • Provide a visible deterrent to potential criminals

  • Answered by AI
  • Q3. How we check the veh before intar the gate.
  • Ans. 

    Vehicles are checked before entering the gate by security officers for safety and security purposes.

    • Check for valid identification and authorization to enter the premises

    • Inspect the vehicle for any suspicious items or signs of tampering

    • Verify the purpose of the visit and destination within the premises

    • Use mirrors to check the undercarriage of the vehicle for any hidden objects

    • Check the trunk and interior of the vehicle

  • Answered by AI
  • Q4. How we check the veh out the gate.
  • Ans. 

    Vehicles are checked at the gate by security officers for safety and security purposes.

    • Security officers visually inspect vehicles for any suspicious items or behavior

    • Security officers may use mirrors to check the undercarriage of vehicles for hidden items

    • Security officers may use metal detectors to check for weapons or other prohibited items

    • Security officers may ask drivers to open trunks or other compartments for ins

  • Answered by AI
  • Q5. And coy employee in and out check and activity

Interview Preparation Tips

Interview preparation tips for other job seekers - Security officer role in the company
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain about SIEM TOOL and which SIEM tool you have used ?
  • Ans. 

    SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.

    • SIEM tools help in detecting and responding to security incidents in real-time.

    • They provide centralized visibility into an organization's security posture.

    • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

    • I have experience using Splunk for log management and security

  • Answered by AI
  • Q2. Have you configured policies in defender ?
  • Ans. 

    Yes, I have configured policies in defender.

    • Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.

    • I have set up policies for malware protection, network protection, firewall settings, and device control.

    • Regularly review and update policies to adapt to new threats and vulnerabilities.

    • Example: Configuring Windows Defender policies to block certain file types from being downlo

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well and be confident
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Mostly from tcp/ip , dns, dhcp and firewall
Round 2 - Technical 

(1 Question)

  • Q1. Tcp/ip , dns , dhcp , paloalto firewall all features
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. What is OWASP and it's attributes?
  • Ans. 

    OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.

    • OWASP provides resources such as tools, documentation, and guidelines for web application security.

    • It publishes a list of the top 10 most critical web application security risks.

    • OWASP also offers training and conferences to educate professionals on security best practices.

  • Answered by AI

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. SSL Related ! Qualys VMDR Module scans related ! Application vuln !
  • Q2. Top 10 owasp How to prioritise and remediate vulnerabilities
  • Ans. 

    Prioritizing and remediating vulnerabilities using OWASP Top 10

    • Start by identifying the vulnerabilities that pose the highest risk to the organization

    • Use the OWASP Top 10 as a guide to prioritize vulnerabilities

    • Consider the likelihood and potential impact of each vulnerability

    • Remediate vulnerabilities based on their priority level

    • Perform regular vulnerability assessments to stay up-to-date on new vulnerabilities

    • Example...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Make sure you have projects done with examples to present in interview
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI

NTT Data Interview FAQs

How many rounds are there in NTT Data IT Security Specialist IAM interview?
NTT Data interview process usually has 3 rounds. The most common rounds in the NTT Data interview process are Technical, Case Study and HR.

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.8
 • 8.2k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.8
 • 3.1k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
View all
Software Engineer
935 salaries
unlock blur

₹2.8 L/yr - ₹11 L/yr

Senior Associate
773 salaries
unlock blur

₹1.2 L/yr - ₹7.5 L/yr

Network Engineer
672 salaries
unlock blur

₹1.8 L/yr - ₹10 L/yr

Software Developer
641 salaries
unlock blur

₹3.1 L/yr - ₹12 L/yr

Senior Software Engineer
574 salaries
unlock blur

₹6.5 L/yr - ₹26 L/yr

Explore more salaries
Compare NTT Data with

Tata Communications

4.0
Compare

Bharti Airtel

4.0
Compare

Reliance Communications

4.0
Compare

Vodafone Idea

4.1
Compare
Did you find this page helpful?
Yes No
write
Share an Interview