
Softtek


Softtek Interview Questions and Answers
Q1. difference between change and re concile account and verify
Change account modifies the account while reconcile and verify ensure accuracy of account information.
Change account involves modifying the account information
Reconcile account ensures that the account balance is accurate
Verify account ensures that the account information is correct
Change account is proactive while reconcile and verify are reactive
Example: Changing the account holder's name is a change account action while reconciling the account balance with bank statements ...read more
Q2. current company security architecture (Cyberark)
Our current company security architecture is based on Cyberark.
We use Cyberark to manage privileged access to critical systems and applications.
Cyberark helps us enforce least privilege access and monitor privileged activity.
We have integrated Cyberark with our SIEM solution for better visibility and threat detection.
We regularly review and update our Cyberark policies and configurations to ensure maximum security.
Overall, Cyberark has been a valuable tool in our security ars...read more
Q3. components of CYberark
CyberArk is a privileged access management solution that includes components such as Password Vault, Privileged Session Manager, and Endpoint Privilege Manager.
Password Vault - stores and manages privileged account credentials
Privileged Session Manager - monitors and records privileged sessions for auditing purposes
Endpoint Privilege Manager - enforces least privilege policies on endpoints
Application Identity Manager - manages and secures application-to-application passwords ...read more
Q4. Explaince group policy analytics what is MDM wins over GPO applied group policy and mdm policy for co-managed device, which policy wins gpo or mdm, why? user is not able to login on his device, what is the issu...
read moreQ5. explaince conditonal access details and methods of conditional access
Q6. What is a closure
A closure is a function that has access to its own scope, as well as the outer scope in which it was defined.
A closure allows a function to access variables from an outer function even after the outer function has finished executing.
Closures are commonly used in event handlers, callbacks, and for data privacy.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }
Interview Process at Softtek

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

