Add office photos
Employer?
Claim Account for FREE

SISA Information Security

3.0
based on 110 Reviews
Filter interviews by

Kenstar Interview Questions and Answers

Updated 11 Mar 2024

Q1. Linq questions: First vs Firstordefault, single vs singleordefault, convert generic list to non generic type.

Ans.

Explanation of Linq methods First, FirstOrDefault, Single, SingleOrDefault and converting generic list to non generic type.

  • First returns the first element of a sequence, throws an exception if sequence is empty.

  • FirstOrDefault returns the first element of a sequence or default value if sequence is empty.

  • Single returns the only element of a sequence, throws an exception if sequence has more than one element or is empty.

  • SingleOrDefault returns the only element of a sequence or d...read more

Add your answer

Q2. Examples for False Positive identified in SIEM

Ans.

False positives in SIEM

  • Misconfigured rules triggering alerts

  • Legitimate traffic being flagged as malicious

  • Inaccurate threat intelligence data

  • Inadequate correlation rules

  • Outdated signatures or patterns

Add your answer

Q3. complete phishing analysis

Ans.

Phishing analysis involves examining suspicious emails or websites to identify potential threats.

  • Check the sender's email address for any inconsistencies or misspellings

  • Look for urgent language or requests for personal information

  • Verify the legitimacy of any links by hovering over them before clicking

  • Check for poor grammar or spelling errors in the email content

  • Report any suspicious emails to the appropriate IT or security team

Add your answer

Q4. Difference between hashing and encryption

Ans.

Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.

  • Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.

  • Hashing is irreversible while encryption is reversible.

  • Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DES.

  • Hashing is faster than encryption as it involves a one-w...read more

Add your answer
Discover Kenstar interview dos and don'ts from real experiences

Q5. What is CryptoGraphy

Ans.

Cryptography is the practice of secure communication in the presence of third parties.

  • It involves techniques for secure communication and data protection

  • Uses mathematical algorithms to encrypt and decrypt data

  • Examples include AES, RSA, and SHA

  • Cryptography is used in various fields such as finance, military, and healthcare

Add your answer

Q6. Explain cyber kill chain

Ans.

Cyber kill chain is a framework that describes the stages of a cyber attack.

  • It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • The goal is to identify and disrupt the attack at an early stage.

  • For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from progressing to the next stage.

  • The cyber kill chain is oft...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Kenstar

based on 11 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 2.1k Interview Questions
4.0
 • 1.2k Interview Questions
3.5
 • 412 Interview Questions
4.1
 • 398 Interview Questions
4.0
 • 362 Interview Questions
3.9
 • 245 Interview Questions
View all
Top SISA Information Security Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter