i
TCS
Filter interviews by
I applied via Job Portal and was interviewed in Jan 2023. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Jul 2023. There was 1 interview round.
Check LDAP server settings, firewall rules, and CyberArk configuration for connectivity issues.
Verify LDAP server address and port in CyberArk configuration
Check firewall rules to ensure LDAP traffic is allowed
Ensure CyberArk has the necessary permissions to connect to LDAP server
Test connectivity using tools like telnet or LDAP browser
Review logs for error messages related to LDAP connectivity
PSM connection workflow involves initiating a connection, validating user credentials, and providing secure access to target systems.
Initiate connection request from user
Validate user credentials using Cyberark PSM
Establish secure connection to target system
Monitor and record session activities
Terminate connection after session ends
CP stands for Central Policy and CCP stands for Customized Central Policy.
CP is a predefined policy provided by Cyberark, while CCP is a policy customized by the administrator.
CP is a general policy that applies to all users, while CCP can be tailored to specific user roles or permissions.
CP may not meet all the organization's security requirements, whereas CCP can be adjusted to address specific needs.
CP is easier to ...
DR drill stands for Disaster Recovery drill, which is a planned exercise to test the effectiveness of a company's disaster recovery plan.
DR drill is a simulation of an actual disaster scenario to ensure that the organization's systems and processes can be restored in case of a real disaster.
It involves testing the backup and recovery procedures, communication protocols, and overall readiness of the organization to hand...
PSMGW & PSMApp users are CyberArk Privileged Session Manager Gateway and Application users used for managing privileged accounts and sessions.
PSMGW users are used for managing privileged accounts and sessions through the Privileged Session Manager Gateway.
PSMApp users are used for managing privileged accounts and sessions through the Privileged Session Manager Application.
The port to communicate with PVWA URL is 443.
PVWA URL uses port 443 for communication
Port 443 is the default port for HTTPS connections
posted on 20 Dec 2024
Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.
Monitor computer networks for security breaches
Investigate security incidents and provide incident response
Implement security measures to protect against cyber attacks
Conduct security assessments and audits to identify vulnerabilities
Stay up-to-date on the latest cyber threats
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
C,C#,C++,Dart,Go,Type script
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.
Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.
It helps organizations understand and defend against common attack patterns.
Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.
posted on 2 Jan 2024
IP blocking is a common security measure to prevent unauthorized access to devices and networks.
Implement IP blocking on login devices to prevent unauthorized access from specific IPs.
Regularly check for malicious IPs in devices and block them to prevent security breaches.
Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.
Consider implementing automated scripts or tools to s...
Yes, email gateways can block email spam if configured properly.
Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.
Spam emails are typically identified based on keywords, sender reputation, and other factors.
Advanced email gateways may also use machine learning algorithms to detect and block spam.
Regular updates and monitoring of email gateway s...
F5 devices can be used for security white listing to control access to specific applications or services.
F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.
This helps prevent unauthorized access and reduces the attack surface for potential threats.
For example, an organization can use F5 devices to white list specific IP addresses for remote
When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.
Ensure compatibility of new devices with existing infrastructure
Backup configurations and data before starting the upgrade
Test the new devices in a controlled environment before deploying them
Consider any security implications of the upgrade
Train staff on how to use the new devices effectively
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
posted on 3 May 2023
I applied via Company Website and was interviewed in Apr 2023. There were 5 interview rounds.
I have faced challenges in managing privileged accounts and securing them from cyber threats.
Managing and securing privileged accounts
Identifying and mitigating cyber threats
Ensuring compliance with security regulations
Educating employees on cybersecurity best practices
The biggest challenge during upgradation & migration is ensuring compatibility and minimizing downtime.
Ensuring compatibility of the new system with existing infrastructure
Minimizing downtime during the transition
Testing the new system thoroughly before deployment
Ensuring data integrity and security during migration
Training employees on the new system
Managing user access and permissions during migration
Some of the top questions asked at the TCS Cyberark Administrator interview -
based on 3 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
68.2k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.9k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
28.6k
salaries
| ₹8.9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture