Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Sequretek It Solutions Team. If you also belong to the team, you can get access from here

Sequretek It Solutions Verified Tick

Compare button icon Compare button icon Compare
4.2

based on 142 Reviews

Filter interviews by

Sequretek It Solutions Security Consultant Interview Questions and Answers

Updated 2 May 2024

Sequretek It Solutions Security Consultant Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Walk-in and was interviewed in Nov 2023. There were 2 interview rounds.

Round 1 - Aptitude Test 

It was a basic aptitude test with a technical topic essay

Round 2 - One-on-one 

(1 Question)

  • Q1. What is VAPT and Bug bounty?
  • Ans. 

    VAPT stands for Vulnerability Assessment and Penetration Testing, while Bug Bounty is a program that rewards individuals for finding and reporting bugs in a company's software.

    • Vulnerability Assessment involves identifying and assessing vulnerabilities in a system or network.

    • Penetration Testing involves simulating cyber attacks to identify security weaknesses that could be exploited by real attackers.

    • Bug Bounty programs...

  • Answered by AI

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is CryptoGraphy
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties.

    • It involves techniques for secure communication and data protection

    • Uses mathematical algorithms to encrypt and decrypt data

    • Examples include AES, RSA, and SHA

    • Cryptography is used in various fields such as finance, military, and healthcare

  • Answered by AI
  • Q2. Difference between hashing and encryption
  • Ans. 

    Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.

    • Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.

    • Hashing is irreversible while encryption is reversible.

    • Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is CryptoGraphy
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties.

    • It involves techniques for secure communication and data protection

    • Uses mathematical algorithms to encrypt and decrypt data

    • Examples include AES, RSA, and SHA

    • Cryptography is used in various fields such as finance, military, and healthcare

  • Answered by AI
  • Q2. Difference between hashing and encryption
  • Ans. 

    Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.

    • Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.

    • Hashing is irreversible while encryption is reversible.

    • Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Dec 2022.

Round 1 - Technical 

(2 Questions)

  • Q1. Examples for False Positive identified in SIEM
  • Ans. 

    False positives in SIEM

    • Misconfigured rules triggering alerts

    • Legitimate traffic being flagged as malicious

    • Inaccurate threat intelligence data

    • Inadequate correlation rules

    • Outdated signatures or patterns

  • Answered by AI
  • Q2. Explain cyber kill chain
  • Ans. 

    Cyber kill chain is a framework that describes the stages of a cyber attack.

    • It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

    • The goal is to identify and disrupt the attack at an early stage.

    • For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be prepared with the contents in your resume, cyber security concepts

Sequretek It Solutions Interview FAQs

How many rounds are there in Sequretek It Solutions Security Consultant interview?
Sequretek It Solutions interview process usually has 2 rounds. The most common rounds in the Sequretek It Solutions interview process are Aptitude Test and One-on-one Round.
How to prepare for Sequretek It Solutions Security Consultant interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Sequretek It Solutions. The most common topics and skills that interviewers at Sequretek It Solutions expect are Dlp, Hips, IT Security and Information Security.

Tell us how to improve this page.

Sequretek It Solutions Security Consultant Interview Process

based on 1 interview

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
PwC Interview Questions
3.4
 • 1.4k Interviews
MathCo Interview Questions
3.0
 • 109 Interviews
Zeta Interview Questions
3.4
 • 69 Interviews
embedUR Systems Interview Questions
3.4
 • 47 Interviews
Subex Interview Questions
3.5
 • 34 Interviews
CoinDCX Interview Questions
3.7
 • 28 Interviews
View all
Sequretek It Solutions Security Consultant Salary
based on 16 salaries
₹3 L/yr - ₹9.5 L/yr
44% less than the average Security Consultant Salary in India
View more details
Associate Consultant
215 salaries
unlock blur

₹1 L/yr - ₹7.3 L/yr

Consultant
52 salaries
unlock blur

₹3.6 L/yr - ₹12 L/yr

SOC Analyst
23 salaries
unlock blur

₹1.8 L/yr - ₹8.2 L/yr

Project Manager
21 salaries
unlock blur

₹8 L/yr - ₹17.5 L/yr

Linux Administrator
20 salaries
unlock blur

₹3 L/yr - ₹8.5 L/yr

Explore more salaries
Compare Sequretek It Solutions with

QUICK HEAL TECHNOLOGIES

3.7
Compare

Paladion Networks

4.0
Compare

Kratikal Tech Private Limited

3.7
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview