i
NTT Data
Filter interviews by
I applied via Company Website and was interviewed before Apr 2023. There were 2 interview rounds.
Top trending discussions
I was interviewed in Mar 2024.
Onboarding JDBC apps in Sailpoint involves configuring JDBC connectors and creating application definitions.
Configure JDBC connectors in Sailpoint IdentityNow
Create application definitions for the JDBC apps
Map the necessary attributes for provisioning and reconciliation
Test the connectivity and functionality of the JDBC apps
Developing and deploying rules in Sailpoint IDN involves creating custom rules in the IdentityNow platform and deploying them to enforce access controls.
Create custom rules using the IdentityNow Rule Editor
Test the rules in a non-production environment before deploying
Deploy the rules to the production environment to enforce access controls
Monitor and review the effectiveness of the rules regularly
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before Aug 2021. There were 3 interview rounds.
Handling escalations involves prompt communication, prioritization, and collaboration with stakeholders.
Acknowledge the escalation and gather all relevant information
Assess the severity and prioritize based on impact
Communicate with stakeholders and provide regular updates
Collaborate with cross-functional teams to resolve the issue
Document the escalation and resolution process for future reference
I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.
To make an offline Symantec agent communicate back to SEPM, use a heartbeat mechanism and configure a communication schedule.
Implement a heartbeat mechanism to regularly check the agent's status
Configure the agent to communicate with SEPM at specific intervals
Use a communication schedule to define when the agent should attempt to connect
Ensure the agent has access to necessary network resources and ports
Consider using ...
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
SIEM (Security Information and Event Management) tool is a software solution that aggregates and analyzes security data from various sources.
SIEM tools help in detecting and responding to security incidents in real-time.
They provide centralized visibility into an organization's security posture.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
I have experience using Splunk for log management and security
Yes, I have configured policies in defender.
Yes, I have configured policies in Windows Defender to ensure proper security measures are in place.
I have set up policies for malware protection, network protection, firewall settings, and device control.
Regularly review and update policies to adapt to new threats and vulnerabilities.
Example: Configuring Windows Defender policies to block certain file types from being downlo
posted on 26 Mar 2024
Virtual router and virtual system play a crucial role in network security by providing isolated environments for routing and security policies.
Virtual router is a software-based routing instance that operates within a virtualized environment.
Virtual system is a logical division of a physical firewall that allows for separate security policies and configurations.
Both virtual router and virtual system help in creating is...
App-ID and Content-ID are features used in network security to identify and control applications and content.
App-ID is used to identify applications based on their behavior, not just port and protocol
Content-ID is used to identify and control content within applications
Both features are commonly used in next-generation firewalls for advanced security policies
Example: App-ID can identify and block social media applicati...
U-turn NAT is a network configuration where traffic enters and exits the same interface on a network device.
U-turn NAT is also known as hairpin NAT or NAT loopback.
It allows internal hosts to access resources using their public IP address from within the same network.
This is commonly used in scenarios where internal hosts need to access a server using its public IP address.
U-turn NAT can be configured on firewalls or r
A service route is the path that a service takes to reach its destination, including all the network devices it passes through.
Service routes can include routers, switches, firewalls, and other network devices.
Understanding service routes is important for network security to identify potential vulnerabilities or points of failure.
Examples of service routes include the path an email takes from sender to recipient, or th...
Wildfire is a type of malware analysis service provided by Palo Alto Networks.
Malware analysis service
Identifies and blocks unknown threats in real-time
Utilizes machine learning and AI for threat detection
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
posted on 12 Aug 2021
I applied via Recruitment Consultant
Symantec DLP is a data loss prevention software that helps organizations protect sensitive data from being leaked or stolen.
Symantec DLP uses advanced detection techniques to identify and prevent data breaches.
It can monitor and control data across various channels, including email, web, and cloud applications.
Symantec DLP can also classify and encrypt sensitive data to ensure its protection.
It helps organizations comp...
There are several types of solutions to protect data from DLP, including network-based, endpoint-based, and cloud-based solutions.
Network-based solutions monitor traffic on the network and can block or quarantine sensitive data.
Endpoint-based solutions monitor data on individual devices and can prevent unauthorized access or transmission.
Cloud-based solutions monitor data stored in the cloud and can prevent unauthorize...
The database communication with DLP server can happen through various ports depending on the configuration.
The port number can be configured during the installation of the DLP server.
Commonly used ports for database communication are 1433 for SQL Server, 1521 for Oracle, and 3306 for MySQL.
Firewalls and network security policies may also affect the port used for communication.
It is important to ensure that the appropri...
Classification is the process of categorizing data or information based on certain criteria.
It involves grouping similar items together.
It helps in organizing and managing data effectively.
Examples include classifying emails as spam or not spam, or categorizing documents based on their content.
Classification can also be used in machine learning to train models to recognize patterns and make predictions.
based on 2 reviews
Rating in categories
Software Engineer
932
salaries
| ₹2.8 L/yr - ₹11 L/yr |
Senior Associate
766
salaries
| ₹1.1 L/yr - ₹7.3 L/yr |
Network Engineer
647
salaries
| ₹1.8 L/yr - ₹10 L/yr |
Software Developer
615
salaries
| ₹2.5 L/yr - ₹13 L/yr |
Senior Software Engineer
512
salaries
| ₹6.5 L/yr - ₹24 L/yr |
Tata Communications
Bharti Airtel
Reliance Communications
Vodafone Idea