i
TCS
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Oct 2022. There was 1 interview round.
I applied via Shine and was interviewed in Oct 2021. There was 1 interview round.
SU10 TCODE is used to mass maintain user master records in SAP.
SU10 TCODE allows for mass changes to user master records in SAP.
It can be used to update user attributes such as name, email, phone number, etc.
It can also be used to assign or remove roles and authorizations for multiple users at once.
SU10 TCODE provides a convenient way to manage user data efficiently.
Example: Using SU10 TCODE, you can update the email a
PFCG T CODE is used in SAP to create and maintain authorization roles and profiles.
PFCG T CODE is used to create and maintain authorization roles and profiles in SAP.
It allows the user to define the activities and transactions that can be performed by different users or user groups.
PFCG T CODE provides a graphical interface to assign authorizations to roles and manage user access.
It helps in ensuring that users have th...
posted on 20 Dec 2022
I applied via LinkedIn and was interviewed in Nov 2022. There were 2 interview rounds.
SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.
SU22 is used to set default values for authorization fields
SU24 is used to maintain authorization checks for transactions and reports
SU25 is used to maintain the upgrade of authorization objects during system upgrades
All three transactions are used in SAP to m
To troubleshoot GRC ARM request submission issue, follow these steps:
Check if the user has the necessary authorization to submit the request
Verify if the request is complete and all mandatory fields are filled
Check if there are any system errors or connectivity issues
Review the GRC logs to identify any errors or warnings
If the issue persists, escalate to the GRC support team for further investigation
MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.
MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.
It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.
BRF+ is an application used to create business rules that ca...
Roles can be imported in GRC using the Role Upload functionality.
Navigate to Access Management > Role Upload
Select the system and upload the role file in CSV format
Map the fields and validate the data
Submit the job for import
Risk analysis for custom tcodes can be done using SAP GRC Access Control.
Create custom roles and assign tcodes to them
Run risk analysis using SAP GRC Access Control
Analyze the results and mitigate any identified risks
Regularly review and update custom roles and tcodes
Consider using SAP GRC Access Control's continuous compliance monitoring feature
Expert mode in PFCG allows advanced customization of authorization roles.
Expert mode provides access to additional tabs and fields for fine-tuning roles.
It allows for more complex authorization logic and the ability to add custom fields.
Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.
Examples of advanced customization include restricting access to specific transac
Centralized EAM system has a single database while Decentralized EAM system has multiple databases.
Centralized EAM system is easier to manage and maintain.
Decentralized EAM system provides more flexibility and autonomy to individual departments.
Preference depends on the organization's size, structure, and requirements.
I applied via Referral and was interviewed in Oct 2022. There were 2 interview rounds.
T code maintenance involves customizing transaction codes in SAP system.
T code maintenance is done using transaction code SE93.
It involves creating, modifying or deleting transaction codes.
Customization can be done by changing the screen layout, adding fields, etc.
Authorization checks can also be added to the transaction code.
Examples of customized transaction codes are ZMM01 for creating material master data and ZFI01
CUA configuration allows central management of users across multiple systems.
CUA stands for Central User Administration
It allows for central management of user accounts across multiple systems in a landscape
Users can be created, modified, and deleted from a central location
Password policies can be enforced across all systems
Example: A company with multiple SAP systems can use CUA to manage user accounts across all syst
EAM component is used in GRC for managing access to critical assets.
EAM stands for Enterprise Asset Management
EAM component in GRC helps in managing access to critical assets
It enables organizations to identify, track, and manage access to assets such as servers, databases, and applications
EAM component also helps in identifying and mitigating risks associated with these assets
For example, EAM can be used to manage acc...
posted on 22 Aug 2021
I applied via LinkedIn and was interviewed in Jul 2021. There was 1 interview round.
To add an object to a custom T code in SAP Security & GRC, you need to follow these steps:
Identify the custom T code where you want to add the object
Access the transaction code SE93 to maintain the T code
Enter the T code and click on the 'Create' button
Provide a short description and select the appropriate program type
In the 'Objects' tab, click on the 'Add Object' button
Enter the object name and description
Save the ch...
Service user is used for background processing, while dialog user is used for interactive processing in FFID.
Service user is used for background processing tasks that do not require user interaction.
Dialog user is used for interactive processing tasks that require user input.
Service user can be used for automated jobs like data imports, whereas dialog user is used for manual transactions.
Service user typically has high...
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
based on 28 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.1k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51.3k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.8k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
29.1k
salaries
| ₹9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture