i
Tata Communications
Filter interviews by
I applied via Approached by Company and was interviewed in Jun 2022. There were 2 interview rounds.
Cyber kill chain is a framework that describes the stages of a cyber attack.
It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
The framework helps organizations understand and defend against cyber attacks.
For example, if an attacker is in the reconnaissance stage, they are gathering information about the target.
By understandin...
Cyber kill chain and Mitre framework are both used for cyber threat intelligence, but the former focuses on attack stages while the latter provides a comprehensive framework for threat intelligence.
Cyber kill chain is a model that describes the stages of a cyber attack, from reconnaissance to exfiltration.
Mitre framework is a comprehensive framework for organizing and analyzing threat intelligence, including attack pat...
Password spraying is trying a few commonly used passwords on multiple accounts, while brute-force attack is trying all possible combinations of characters to crack a password.
Password spraying is a type of attack where a few commonly used passwords are tried on multiple accounts to gain unauthorized access.
Brute-force attack is a type of attack where all possible combinations of characters are tried to crack a password...
DNS exfiltration is a technique used to steal data by sending it out of a network via DNS queries.
It involves using DNS queries to send sensitive data outside of a network.
Attackers can use this technique to bypass firewalls and other security measures.
DNS exfiltration can be difficult to detect because DNS traffic is often allowed through firewalls.
Examples of data that can be exfiltrated via DNS include usernames, pa
We have created use cases for customer onboarding, order management, and inventory tracking.
Customer onboarding: designed a process for new customers to sign up and create an account
Order management: created a system for tracking orders from placement to delivery
Inventory tracking: developed a method for monitoring stock levels and reordering when necessary
Yes, I have created use cases with multiple devices.
I have experience creating use cases for mobile and desktop devices.
I have also created use cases for wearable devices and IoT devices.
One example is when I created use cases for a mobile app that could be used in conjunction with a smartwatch.
Another example is when I created use cases for a web application that could be accessed from both desktop and mobile devices.
Developed a use case for streamlining team communication and task management
Created a centralized platform for team members to communicate and collaborate on tasks
Implemented task tracking and progress monitoring features
Reduced miscommunication and increased productivity
Received positive feedback from team members and management
WAF use cases include protection against OWASP Top 10 vulnerabilities, DDoS attacks, and web application attacks.
Protection against SQL injection attacks
Prevention of cross-site scripting (XSS) attacks
Blocking of malicious bots and crawlers
Mitigation of distributed denial-of-service (DDoS) attacks
Enforcement of security policies and compliance regulations
Monitoring and logging of web traffic for threat detection and in
Daily activities for maintaining SIEM solution
Monitor SIEM alerts and investigate any potential security incidents
Review and update SIEM rules and policies
Ensure SIEM data sources are properly configured and updated
Perform regular backups and test disaster recovery procedures
Stay up-to-date with the latest security threats and trends
Collaborate with other teams to ensure proper integration with other security tools
Prov...
Use cases to prevent web attacks on various devices
Implementing firewalls and intrusion detection systems on servers
Using anti-virus and anti-malware software on client devices
Regularly updating software and security patches
Enforcing strong password policies and multi-factor authentication
Conducting regular security audits and penetration testing
Implementing HTTPS and SSL certificates on websites
Using content security ...
A use case to prevent SQL injection attacks
Implement input validation and sanitization
Use parameterized queries
Limit database user privileges
Regularly update and patch database software
The device that receives maximum EPS varies depending on the context and industry.
In the telecommunications industry, the device that receives maximum EPS is the base station.
In the automotive industry, the device that receives maximum EPS is the electronic control unit (ECU).
In the medical industry, the device that receives maximum EPS varies depending on the specific medical device.
EPS stands for events per second an...
I was interviewed in Feb 2025.
Technical questions only and communication
I was interviewed in Jan 2025.
Program.cs is the entry point for a .NET Core application.
Contains the Main method where the application starts execution
Responsible for configuring and starting the application
Can be used to set up services, configure logging, and handle command line arguments
Tata Communications interview questions for popular designations
I was interviewed in Jan 2025.
Networking is the practice of connecting computers and other devices to share resources and information.
Networking involves the design, implementation, and management of computer networks.
It allows devices to communicate with each other, share data, and access resources like printers and servers.
Examples of networking technologies include Ethernet, Wi-Fi, and TCP/IP.
Networking also includes security measures to protect
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers for data transmission.
Exampl...
Switches and routers are networking devices used to connect devices within a network and route data between networks.
Switches operate at the data link layer and forward data based on MAC addresses
Routers operate at the network layer and forward data based on IP addresses
Switches are used to create LANs, while routers are used to connect different networks
Switches are faster than routers in forwarding data within a netw
Get interview-ready with Top Tata Communications Interview Questions
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
MessageQueue is a communication system that allows different software components to communicate by sending messages asynchronously.
MessageQueue helps in decoupling different components of a system.
It allows for asynchronous communication between components.
Messages are stored in a queue until they are processed by the receiving component.
Examples include RabbitMQ, Apache Kafka, and Amazon SQS.
Designing a Loadbalancer for Kubernetes involves using an Ingress Controller to route traffic to different services.
Use an Ingress Controller to manage external access to services within a Kubernetes cluster
Define Ingress resources to specify how incoming requests should be routed
Consider using a cloud provider's load balancer service for external traffic
Implement SSL termination and routing rules in the Ingress Contro
Docker migration from one machine to another involves exporting the container as an image, transferring the image to the new machine, and then importing it.
Export the Docker container as an image using 'docker save' command
Transfer the image to the new machine using a secure method like SCP or Docker Hub
Import the image on the new machine using 'docker load' command
Run the container on the new machine using 'docker run
I will troubleshoot the issue, identify the root cause, and work with the team to implement a solution while minimizing downtime.
Quickly assess the situation and gather relevant information
Identify the root cause of the deployment issue
Collaborate with team members to come up with a solution
Implement the solution while minimizing impact on production environment
Communicate with stakeholders about the issue and resoluti
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in May 2024. There were 3 interview rounds.
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
Records management involves organizing, storing, and maintaining an organization's documents and information.
Creating and implementing records management policies and procedures
Organizing and categorizing physical and digital records
Ensuring compliance with record retention regulations
Managing document destruction and archiving processes
Training staff on proper records management practices
I was interviewed in Jan 2025.
Networking is the practice of connecting computers and other devices to share resources and information.
Networking involves the use of hardware such as routers, switches, and cables to create a network.
It also includes the use of software protocols like TCP/IP to facilitate communication between devices.
Networking allows devices to share resources such as files, printers, and internet connections.
Examples of networking
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer has specific functions and communicates with adjacent layers.
Examples of layers include physical layer, data link layer, network layer, transpo
I applied via Job Fair and was interviewed in Jul 2024. There was 1 interview round.
In my last year of graduation, I learned advanced topics in my field of study, completed a capstone project, and gained practical experience through internships.
Studied advanced courses related to my major
Completed a capstone project demonstrating my knowledge and skills
Gained practical experience through internships or co-op programs
Participated in research projects or thesis work
Attended seminars, workshops, and conf
Computer languages are used to communicate instructions to computers, allowing programmers to create software and applications.
Computer languages are used to write code that tells computers what to do.
There are different types of computer languages, such as high-level languages like Python and Java, and low-level languages like Assembly.
Each language has its own syntax and rules for writing code.
Some languages are more...
Top trending discussions
Some of the top questions asked at the Tata Communications interview -
The duration of Tata Communications interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 212 interviews
Interview experience
based on 3.4k reviews
Rating in categories
Network Engineer
1.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
1.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Customer Service Executive
933
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Engineer
840
salaries
| ₹0 L/yr - ₹0 L/yr |
Manager
764
salaries
| ₹0 L/yr - ₹0 L/yr |
Bharti Airtel
Reliance Communications
Vodafone Idea
Tech Mahindra