Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by TCS Team. If you also belong to the team, you can get access from here

TCS Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 88k Reviews

Filter interviews by

TCS SAP Security & GRC Consultant Interview Questions and Answers

Updated 5 Nov 2022

TCS SAP Security & GRC Consultant Interview Experiences

2 interviews found

I applied via Recruitment Consulltant and was interviewed in Oct 2022. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Questions are based on your resume. And your experience in related skills.
  • Q2. Prepare to give your introduction firstly. Later they proceed with their questions.

Interview Preparation Tips

Interview preparation tips for other job seekers - Keep yourself updated and we'll Prepared each time. That will be telecalling or whatsapp video interview, we can't expect at what time they call us for interview. So be prepared.

I applied via Shine and was interviewed in Oct 2021. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. How we use SU10 TCODE
  • Ans. 

    SU10 TCODE is used to mass maintain user master records in SAP.

    • SU10 TCODE allows for mass changes to user master records in SAP.

    • It can be used to update user attributes such as name, email, phone number, etc.

    • It can also be used to assign or remove roles and authorizations for multiple users at once.

    • SU10 TCODE provides a convenient way to manage user data efficiently.

    • Example: Using SU10 TCODE, you can update the email a

  • Answered by AI
  • Q2. How we use PFCG T CODE
  • Ans. 

    PFCG T CODE is used in SAP to create and maintain authorization roles and profiles.

    • PFCG T CODE is used to create and maintain authorization roles and profiles in SAP.

    • It allows the user to define the activities and transactions that can be performed by different users or user groups.

    • PFCG T CODE provides a graphical interface to assign authorizations to roles and manage user access.

    • It helps in ensuring that users have th...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Knowledge and work efficiency is very important

Skills evaluated in this interview

SAP Security & GRC Consultant Interview Questions Asked at Other Companies

asked in NTT Data
Q1. -Tell me about MSMP workflow and what is the usage of BRF+ applic ... read more
asked in NTT Data
Q2. -Unable to submit a GRC ARM request? How do you troubleshoot?
asked in NTT Data
Q3. -Custom Tcodes and how do get risk analysis for custom tcodes?
asked in NTT Data
Q4. -Difference between Centralized and Decentralized EAM system? Whi ... read more
asked in Infosys
Q5. CUA configuration? How can we use CUA configuration for users

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via LinkedIn and was interviewed in Nov 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(10 Questions)

  • Q1. -Overview of your experience.
  • Q2. -Difference between SU24, SU25 and SU22?
  • Ans. 

    SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.

    • SU22 is used to set default values for authorization fields

    • SU24 is used to maintain authorization checks for transactions and reports

    • SU25 is used to maintain the upgrade of authorization objects during system upgrades

    • All three transactions are used in SAP to m

  • Answered by AI
  • Q3. -Do you have any Fiori experience
  • Q4. -Have you worked on Password Self Service?
  • Q5. -Unable to submit a GRC ARM request? How do you troubleshoot?
  • Ans. 

    To troubleshoot GRC ARM request submission issue, follow these steps:

    • Check if the user has the necessary authorization to submit the request

    • Verify if the request is complete and all mandatory fields are filled

    • Check if there are any system errors or connectivity issues

    • Review the GRC logs to identify any errors or warnings

    • If the issue persists, escalate to the GRC support team for further investigation

  • Answered by AI
  • Q6. -Tell me about MSMP workflow and what is the usage of BRF+ application?
  • Ans. 

    MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.

    • MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.

    • It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.

    • BRF+ is an application used to create business rules that ca...

  • Answered by AI
  • Q7. -How do you import roles in GRC?
  • Ans. 

    Roles can be imported in GRC using the Role Upload functionality.

    • Navigate to Access Management > Role Upload

    • Select the system and upload the role file in CSV format

    • Map the fields and validate the data

    • Submit the job for import

  • Answered by AI
  • Q8. -Custom Tcodes and how do get risk analysis for custom tcodes?
  • Ans. 

    Risk analysis for custom tcodes can be done using SAP GRC Access Control.

    • Create custom roles and assign tcodes to them

    • Run risk analysis using SAP GRC Access Control

    • Analyze the results and mitigate any identified risks

    • Regularly review and update custom roles and tcodes

    • Consider using SAP GRC Access Control's continuous compliance monitoring feature

  • Answered by AI
  • Q9. -Expert mode in PFCG?
  • Ans. 

    Expert mode in PFCG allows advanced customization of authorization roles.

    • Expert mode provides access to additional tabs and fields for fine-tuning roles.

    • It allows for more complex authorization logic and the ability to add custom fields.

    • Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.

    • Examples of advanced customization include restricting access to specific transac

  • Answered by AI
  • Q10. -Difference between Centralized and Decentralized EAM system? Which is preferable?
  • Ans. 

    Centralized EAM system has a single database while Decentralized EAM system has multiple databases.

    • Centralized EAM system is easier to manage and maintain.

    • Decentralized EAM system provides more flexibility and autonomy to individual departments.

    • Preference depends on the organization's size, structure, and requirements.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - -Be aware of the basics and confident on your topics
-Revise your resume. Questions will be from your resume.

Skills evaluated in this interview

I applied via Referral and was interviewed in Oct 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. T code maintance or how to customize t code
  • Ans. 

    T code maintenance involves customizing transaction codes in SAP system.

    • T code maintenance is done using transaction code SE93.

    • It involves creating, modifying or deleting transaction codes.

    • Customization can be done by changing the screen layout, adding fields, etc.

    • Authorization checks can also be added to the transaction code.

    • Examples of customized transaction codes are ZMM01 for creating material master data and ZFI01

  • Answered by AI
  • Q2. User tables t code Usr01 and agr*
  • Q3. CUA configuration? How can we use CUA configuration for users
  • Ans. 

    CUA configuration allows central management of users across multiple systems.

    • CUA stands for Central User Administration

    • It allows for central management of user accounts across multiple systems in a landscape

    • Users can be created, modified, and deleted from a central location

    • Password policies can be enforced across all systems

    • Example: A company with multiple SAP systems can use CUA to manage user accounts across all syst

  • Answered by AI
  • Q4. EAM component usage in GRC?
  • Ans. 

    EAM component is used in GRC for managing access to critical assets.

    • EAM stands for Enterprise Asset Management

    • EAM component in GRC helps in managing access to critical assets

    • It enables organizations to identify, track, and manage access to assets such as servers, databases, and applications

    • EAM component also helps in identifying and mitigating risks associated with these assets

    • For example, EAM can be used to manage acc...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be Confident what you are going to answer To the interviewr

I applied via LinkedIn and was interviewed in Jul 2021. There was 1 interview round.

Interview Questionnaire 

4 Questions

  • Q1. Scenario based questions like how do you troubleshoot Authorization issues if the authority is already there for a user.
  • Q2. Critical tables
  • Q3. Su24 tcode functions
  • Q4. Adding object to custom T code
  • Ans. 

    To add an object to a custom T code in SAP Security & GRC, you need to follow these steps:

    • Identify the custom T code where you want to add the object

    • Access the transaction code SE93 to maintain the T code

    • Enter the T code and click on the 'Create' button

    • Provide a short description and select the appropriate program type

    • In the 'Objects' tab, click on the 'Add Object' button

    • Enter the object name and description

    • Save the ch...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I took very less time to answer all questions and if less than half an hour my technical discussion was done

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
Not Selected
Round 1 - Technical 

(1 Question)

  • Q1. Difference between service user and dialog user in FFID
  • Ans. 

    Service user is used for background processing, while dialog user is used for interactive processing in FFID.

    • Service user is used for background processing tasks that do not require user interaction.

    • Dialog user is used for interactive processing tasks that require user input.

    • Service user can be used for automated jobs like data imports, whereas dialog user is used for manual transactions.

    • Service user typically has high...

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Mostly from tcp/ip , dns, dhcp and firewall
Round 2 - Technical 

(1 Question)

  • Q1. Tcp/ip , dns , dhcp , paloalto firewall all features

Security Analyst Interview Questions & Answers

Atos user image Likhith K Arya

posted on 28 Feb 2024

Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is 3 way hand shaking
  • Ans. 

    3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

    • Three packets are involved: SYN, SYN-ACK, ACK

    • SYN packet is sent by the client to the server to initiate the connection

    • SYN-ACK packet is sent by the server to the client as a response

    • ACK packet is sent by the client to the server to confirm the connection

  • Answered by AI
  • Q2. What is OSI Model
  • Ans. 

    The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI Model stands for Open Systems Interconnection Model.

    • It helps in understanding how data is transferred between devices in a network.

    • Each layer has specific functions and communicates with the adjacent layers.

    • Examples of layers include Physical, Data Link, Network, Transport, Sessio

  • Answered by AI
  • Q3. Tell about your work culture
  • Q4. Difference between tcp and udp
  • Ans. 

    TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

    • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

    • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

    • TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...

  • Answered by AI
  • Q5. What is firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters traffic based on rules set by the network administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - It will be easy

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI

TCS Interview FAQs

How many rounds are there in TCS SAP Security & GRC Consultant interview?
TCS interview process usually has 1-2 rounds. The most common rounds in the TCS interview process are Technical and Resume Shortlist.
How to prepare for TCS SAP Security & GRC Consultant interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at TCS. The most common topics and skills that interviewers at TCS expect are SAP Security, GRC, Consulting, Access Control and Auditing.
What are the top questions asked in TCS SAP Security & GRC Consultant interview?

Some of the top questions asked at the TCS SAP Security & GRC Consultant interview -

  1. How we use PFCG T C...read more
  2. How we use SU10 TC...read more
  3. Prepare to give your introduction firstly. Later they proceed with their questi...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

Accenture Interview Questions
3.9
 • 8.2k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.8
 • 3k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
IBM Interview Questions
4.0
 • 2.4k Interviews
View all
TCS SAP Security & GRC Consultant Salary
based on 290 salaries
₹3 L/yr - ₹10.8 L/yr
21% less than the average SAP Security & GRC Consultant Salary in India
View more details

TCS SAP Security & GRC Consultant Reviews and Ratings

based on 28 reviews

3.9/5

Rating in categories

3.9

Skill development

4.1

Work-life balance

3.1

Salary

4.3

Job security

3.8

Company culture

3.1

Promotions

3.8

Work satisfaction

Explore 28 Reviews and Ratings
System Engineer
1.1L salaries
unlock blur

₹1 L/yr - ₹9 L/yr

IT Analyst
67.1k salaries
unlock blur

₹5.1 L/yr - ₹16 L/yr

AST Consultant
51.3k salaries
unlock blur

₹8 L/yr - ₹25 L/yr

Assistant System Engineer
29.8k salaries
unlock blur

₹2.2 L/yr - ₹5.6 L/yr

Associate Consultant
29.1k salaries
unlock blur

₹9 L/yr - ₹32 L/yr

Explore more salaries
Compare TCS with

Amazon

4.1
Compare

Wipro

3.7
Compare

Infosys

3.6
Compare

Accenture

3.8
Compare
Did you find this page helpful?
Yes No
write
Share an Interview