i
Tata Communications
Filter interviews by
I applied via campus placement at Shailesh J Mehta School of Management, Mumbai and was interviewed in Oct 2023. There were 2 interview rounds.
Case study based on previous work experience, mostly about market entry and situations
I applied via Approached by Company and was interviewed in Jun 2022. There were 2 interview rounds.
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The framework helps organizations understand and defend against cyber attacks.
For example, if an attacker is in the reconnaissance stage, they are gathering information about the target.
By understandin...
Cyber kill chain and Mitre framework are both used for cyber threat intelligence, but the former focuses on attack stages while the latter provides a comprehensive framework for threat intelligence.
Cyber kill chain is a model that describes the stages of a cyber attack, from reconnaissance to exfiltration.
Mitre framework is a comprehensive framework for organizing and analyzing threat intelligence, including attack pat...
Password spraying is trying a few commonly used passwords on multiple accounts, while brute-force attack is trying all possible combinations of characters to crack a password.
Password spraying is a type of attack where a few commonly used passwords are tried on multiple accounts to gain unauthorized access.
Brute-force attack is a type of attack where all possible combinations of characters are tried to crack a password...
DNS exfiltration is a technique used to steal data by sending it out of a network via DNS queries.
It involves using DNS queries to send sensitive data outside of a network.
Attackers can use this technique to bypass firewalls and other security measures.
DNS exfiltration can be difficult to detect because DNS traffic is often allowed through firewalls.
Examples of data that can be exfiltrated via DNS include usernames, pa
We have created use cases for customer onboarding, order management, and inventory tracking.
Customer onboarding: designed a process for new customers to sign up and create an account
Order management: created a system for tracking orders from placement to delivery
Inventory tracking: developed a method for monitoring stock levels and reordering when necessary
Yes, I have created use cases with multiple devices.
I have experience creating use cases for mobile and desktop devices.
I have also created use cases for wearable devices and IoT devices.
One example is when I created use cases for a mobile app that could be used in conjunction with a smartwatch.
Another example is when I created use cases for a web application that could be accessed from both desktop and mobile devices.
Developed a use case for streamlining team communication and task management
Created a centralized platform for team members to communicate and collaborate on tasks
Implemented task tracking and progress monitoring features
Reduced miscommunication and increased productivity
Received positive feedback from team members and management
WAF use cases include protection against OWASP Top 10 vulnerabilities, DDoS attacks, and web application attacks.
Protection against SQL injection attacks
Prevention of cross-site scripting (XSS) attacks
Blocking of malicious bots and crawlers
Mitigation of distributed denial-of-service (DDoS) attacks
Enforcement of security policies and compliance regulations
Monitoring and logging of web traffic for threat detection and in
Daily activities for maintaining SIEM solution
Monitor SIEM alerts and investigate any potential security incidents
Review and update SIEM rules and policies
Ensure SIEM data sources are properly configured and updated
Perform regular backups and test disaster recovery procedures
Stay up-to-date with the latest security threats and trends
Collaborate with other teams to ensure proper integration with other security tools
Prov...
Use cases to prevent web attacks on various devices
Implementing firewalls and intrusion detection systems on servers
Using anti-virus and anti-malware software on client devices
Regularly updating software and security patches
Enforcing strong password policies and multi-factor authentication
Conducting regular security audits and penetration testing
Implementing HTTPS and SSL certificates on websites
Using content security ...
A use case to prevent SQL injection attacks
Implement input validation and sanitization
Use parameterized queries
Limit database user privileges
Regularly update and patch database software
The device that receives maximum EPS varies depending on the context and industry.
In the telecommunications industry, the device that receives maximum EPS is the base station.
In the automotive industry, the device that receives maximum EPS is the electronic control unit (ECU).
In the medical industry, the device that receives maximum EPS varies depending on the specific medical device.
EPS stands for events per second an...
I applied via Naukri.com and was interviewed in Apr 2022. There was 1 interview round.
Retail Management in store involves overseeing the day-to-day operations of a retail establishment.
Managing inventory and stock levels
Ensuring customer satisfaction and resolving complaints
Hiring, training, and scheduling staff
Analyzing sales data and implementing strategies to increase revenue
Maintaining store appearance and cleanliness
Top trending discussions
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
As a member of the Information Security team, the technical project manager will be assigned to the Security Compliance team and will work in collaboration with sponsors, partners, and stakeholders such as Technology, Cybersecurity, HR, Security Audit, External Audit, Legal/Privacy, Business Owners, etc. You will lead compliance projects to ensure delivery of benefits and on-time delivery, renewal for certifications, and compliance reports.
Collection process involves gathering outstanding payments from customers.
Send reminder emails or letters to customers with overdue payments
Make phone calls to follow up on outstanding invoices
Offer payment plans or discounts to encourage prompt payment
Utilize a collections agency as a last resort
Keep detailed records of all communication and payment agreements
I applied via Company Website and was interviewed in Jan 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Dec 2023. There were 2 interview rounds.
Fiber KPI related , Personal
I have skills for manage to systematic team dowload and update any data with our team
The device reboots automatically due to a technical issue.
Check for any software or firmware updates that may resolve the reboot issue
Investigate if any recently installed apps or updates are causing conflicts
Examine the device's hardware components for any faults or malfunctions
Consider the possibility of overheating or power supply issues
Review system logs or error messages for any clues about the cause of the reboot
I left my last job due to a lack of growth opportunities and a desire for a new challenge.
Limited opportunities for advancement
Seeking new challenges and growth
Desire for a change in work environment
Better alignment with personal goals and values
I want work with ACT FIBER NET
Some of the top questions asked at the Tata Communications Team Manager interview -
based on 1 interview
Interview experience
based on 5 reviews
Rating in categories
Network Engineer
1.6k
salaries
| ₹1.5 L/yr - ₹6.6 L/yr |
Assistant Manager
1.3k
salaries
| ₹5.4 L/yr - ₹21 L/yr |
Customer Service Executive
944
salaries
| ₹2.4 L/yr - ₹7 L/yr |
Associate Engineer
907
salaries
| ₹1 L/yr - ₹5.2 L/yr |
Manager
865
salaries
| ₹9.8 L/yr - ₹31 L/yr |
Bharti Airtel
Reliance Communications
Vodafone Idea
Tech Mahindra