i
TCS
Filter interviews by
Clear (1)
Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.
Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.
MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.
Kill Chain helps organizations understand and defend against cyber attacks, whil...
I was interviewed in Jul 2024.
It was all related to maths and some brain storming questions
Yes, I am comfortable working night shifts as needed for the role of Cyber Security Analyst.
I am flexible with my work schedule and can adapt to working night shifts
I understand the importance of 24/7 monitoring and response in the field of cyber security
I have previous experience working night shifts in a similar role, such as incident response or network monitoring
I was interviewed in Jun 2024.
I am a dedicated Cyber Security Analyst with a strong background in network security and threat detection.
Experienced in conducting security assessments and implementing security measures
Skilled in analyzing security incidents and responding to cyber threats
Proficient in using security tools such as SIEM, IDS/IPS, and endpoint protection
Certified in relevant cybersecurity certifications like CISSP or CEH
Seeking new challenges and opportunities for growth in the field of cyber security.
Desire to work on more advanced projects
Opportunity to learn new technologies and techniques
Seeking a more challenging and dynamic work environment
What people are saying about TCS
TCS interview questions for designations
I applied via Naukri.com and was interviewed in May 2023. There were 4 interview rounds.
Assignment in cyber security analyst
I applied via LinkedIn and was interviewed before Aug 2023. There was 1 interview round.
I applied via Referral and was interviewed before Oct 2023. There was 1 interview round.
DNS (Domain Name System) is a protocol used to translate domain names into IP addresses.
DNS is essential for translating human-readable domain names (like google.com) into machine-readable IP addresses (like 172.217.3.206)
DNS operates using a client-server architecture, where the client (usually a web browser) sends a DNS query to a DNS server to resolve a domain name
DNS uses various protocols such as UDP (User Datagra...
CSRF is a type of attack where the attacker tricks the user into performing actions on a website without their knowledge, while SSRF is a vulnerability that allows an attacker to send crafted requests from a vulnerable server.
CSRF (Cross-Site Request Forgery) is an attack where the attacker tricks a user into performing actions on a website without their knowledge.
SSRF (Server-Side Request Forgery) is a vulnerability t...
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
I applied via Company Website and was interviewed before Feb 2023. There were 2 interview rounds.
HackQuest conducted online
About Hacquest Questions and general
I applied via Campus Placement and was interviewed before Sep 2021. There were 3 interview rounds.
A C program for designing calculator
Use switch case for different operations
Use scanf to take input from user
Use printf to display output
Use functions for each operation
Use loops for continuous calculations
based on 12 interviews
3 Interview rounds
based on 138 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹0 L/yr - ₹0 L/yr |
IT Analyst
66.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
AST Consultant
51.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant System Engineer
29.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
29.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Amazon
Wipro
Infosys
Accenture