Filter interviews by
Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables and defining relationships between them.
It helps in reducing data redundancy by storing data in a structured and organized manner.
Normalization also helps in improving data integrity by ensuring that data is consis...
Truncate is a DDL command that removes all records from a table, while delete is a DML command that removes specific records.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity columns, while delete does not.
Truncate cannot be rolled back, while delete can be rolled back using a transaction.
Truncate does not fire triggers, while delete does.
I will protect my digital data by implementing strong encryption, regular backups, and strict access controls.
Implement strong encryption algorithms to secure data in transit and at rest
Regularly backup data to prevent loss in case of cyber attacks or hardware failures
Enforce strict access controls by using multi-factor authentication and least privilege principle
To make the system secure from a user point of view, I would implement strong authentication measures and educate users on safe browsing habits.
Implement multi-factor authentication
Enforce strong password policies
Regularly update and patch software
Provide security awareness training to users
Restrict user access to sensitive data
Monitor user activity for suspicious behavior
What people are saying about PwC
The constantly evolving nature of cyber threats and the challenge of staying ahead of them excites me about cyber security.
The thrill of solving complex puzzles and identifying vulnerabilities
The opportunity to work with cutting-edge technology and tools
The sense of purpose in protecting individuals and organizations from cyber attacks
The potential for continuous learning and professional growth
Examples: discoveri...
Phishing attack is a type of social engineering attack where attackers trick victims into revealing sensitive information.
Phishing attacks can be carried out through emails, phone calls, or text messages.
Attackers often use fake websites or login pages to steal login credentials.
Phishing attacks can also be used to distribute malware or ransomware.
Examples of phishing attacks include spear phishing, whaling, and v...
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cyber security involves a range of technologies, processes, and practices designed to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and intrusion detection systems.
Cyber securi...
To identify the genuine mail, check the sender's email address and verify the content and attachments.
Check the sender's email address for any discrepancies or variations.
Verify the content of the email for any grammatical errors or suspicious requests.
Check the attachments for any malware or suspicious file types.
Contact the sender directly to confirm the authenticity of the email.
Use email filtering and anti-phi...
Fileless malware is a type of malicious software that operates in memory without leaving any trace on the hard drive.
Fileless malware is also known as memory-based malware or non-malware.
It uses legitimate system tools and processes to carry out its malicious activities.
It is difficult to detect and remove as it does not leave any files on the system.
Examples of fileless malware include PowerShell-based attacks an...
Some types of cyber attacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelming a system wit...
I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.
2 hours, basic dsa questions, cyber security related mcqs
Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables and defining relationships between them.
It helps in reducing data redundancy by storing data in a structured and organized manner.
Normalization also helps in improving data integrity by ensuring that data is consistent ...
Truncate is a DDL command that removes all records from a table, while delete is a DML command that removes specific records.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity columns, while delete does not.
Truncate cannot be rolled back, while delete can be rolled back using a transaction.
Truncate does not fire triggers, while delete does.
I will protect my digital data by implementing strong encryption, regular backups, and strict access controls.
Implement strong encryption algorithms to secure data in transit and at rest
Regularly backup data to prevent loss in case of cyber attacks or hardware failures
Enforce strict access controls by using multi-factor authentication and least privilege principle
Some types of cyber attacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelming a system with a f...
I applied via Referral and was interviewed in Oct 2022. There were 2 interview rounds.
I have experience in network security, incident response, and vulnerability assessment within cybersecurity.
Network Security: Implemented firewalls and intrusion detection systems to protect sensitive data.
Incident Response: Led a team in responding to a ransomware attack, successfully restoring systems with minimal downtime.
Vulnerability Assessment: Conducted regular penetration testing to identify and remediate secur...
I applied via LinkedIn and was interviewed before Aug 2022. There were 4 interview rounds.
Easy aptitude test, just check the accuracy.
Bit tough one, Question is from linked list.
I applied via LinkedIn and was interviewed in Feb 2021. There were 3 interview rounds.
Phishing attack is a type of social engineering attack where attackers trick victims into revealing sensitive information.
Phishing attacks can be carried out through emails, phone calls, or text messages.
Attackers often use fake websites or login pages to steal login credentials.
Phishing attacks can also be used to distribute malware or ransomware.
Examples of phishing attacks include spear phishing, whaling, and vishin...
The constantly evolving nature of cyber threats and the challenge of staying ahead of them excites me about cyber security.
The thrill of solving complex puzzles and identifying vulnerabilities
The opportunity to work with cutting-edge technology and tools
The sense of purpose in protecting individuals and organizations from cyber attacks
The potential for continuous learning and professional growth
Examples: discovering a ...
To make the system secure from a user point of view, I would implement strong authentication measures and educate users on safe browsing habits.
Implement multi-factor authentication
Enforce strong password policies
Regularly update and patch software
Provide security awareness training to users
Restrict user access to sensitive data
Monitor user activity for suspicious behavior
Fileless malware is a type of malicious software that operates in memory without leaving any trace on the hard drive.
Fileless malware is also known as memory-based malware or non-malware.
It uses legitimate system tools and processes to carry out its malicious activities.
It is difficult to detect and remove as it does not leave any files on the system.
Examples of fileless malware include PowerShell-based attacks and mac...
Ransomware is a type of malware that encrypts files and demands payment for decryption. Mitigation involves backups, security software, and user education.
Regularly backup important data to prevent loss
Use anti-malware software to detect and prevent ransomware
Educate users on how to identify and avoid phishing emails and suspicious downloads
Implement network segmentation to limit the spread of ransomware
Have an inciden...
Alerts in SIEM tool
SIEM tools generate alerts based on predefined rules and thresholds
Alerts can be categorized based on severity levels
Alerts can be investigated and triaged to determine if they are true positives or false positives
SIEM tools can also automate response actions based on certain alerts
Examples of alerts include failed login attempts, malware detections, and suspicious network traffic
DOS and DDOS attacks are malicious attempts to disrupt the normal functioning of a website or network.
DOS (Denial of Service) attack is a type of attack where a single system floods the target system with traffic, making it unavailable to legitimate users.
DDOS (Distributed Denial of Service) attack is a more sophisticated version of DOS attack, where multiple systems are used to flood the target system with traffic.
DDO...
I applied via Referral and was interviewed before Nov 2019. There were 3 interview rounds.
I am drawn to this company for its innovative approach to cybersecurity and the opportunity to protect vital information.
Reputation: This company is known for its cutting-edge cybersecurity solutions, which aligns with my passion for staying ahead of cyber threats.
Professional Growth: I see immense potential for personal and professional development here, especially through training programs and certifications.
Impactfu...
SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.
SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.
It correlates the data to identify patterns and anomalies that may indicate a security breach.
SIEM provides real-time alerts and reports to security ...
I have experience with various SIEM tools, focusing on threat detection, incident response, and log management.
Splunk: Utilized for real-time monitoring and analysis of security events, enabling quick incident response.
IBM QRadar: Implemented for its advanced analytics capabilities, helping to correlate security data from multiple sources.
LogRhythm: Worked with this SIEM for its user-friendly interface and effective lo...
I applied via LinkedIn and was interviewed in Apr 2021. There was 1 interview round.
I appeared for an interview in Dec 2024, where I was asked the following questions.
Viruses are a type of malware designed to replicate and spread, while malware encompasses all malicious software.
A virus attaches itself to clean files and spreads throughout a computer system.
Malware includes various types such as viruses, worms, trojans, ransomware, and spyware.
Example of a virus: ILOVEYOU virus, which spread via email attachments.
Example of malware: WannaCry ransomware, which encrypts files and dema...
I applied via Referral and was interviewed before Aug 2022. There were 3 interview rounds.
General aptitude test - Quant, DI/LR, English
based on 2 interview experiences
Difficulty level
Duration
based on 6 reviews
Rating in categories
Senior Associate
19k
salaries
| ₹12.7 L/yr - ₹25 L/yr |
Associate
15.1k
salaries
| ₹7.9 L/yr - ₹14.5 L/yr |
Manager
7.6k
salaries
| ₹22.1 L/yr - ₹40 L/yr |
Senior Consultant
4.9k
salaries
| ₹15.9 L/yr - ₹26.3 L/yr |
Associate2
4.7k
salaries
| ₹7.5 L/yr - ₹14 L/yr |
Deloitte
Ernst & Young
Accenture
TCS