Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by TCS Team. If you also belong to the team, you can get access from here

TCS Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 84.9k Reviews

Filter interviews by

TCS Cyberark Administrator Interview Questions and Answers

Updated 15 Feb 2023

TCS Cyberark Administrator Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Job Portal and was interviewed in Jan 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Questions Related your current CyberArk Environment
  • Q2. CyberArk Components Vault , PVWA, CMP, PSM PSM-SSP, PTA , SIEM Tools , Issue Troubleshooting related to vault and its components
Round 3 - Behavioral 

(1 Question)

  • Q1. CyberArk Components , License capacity and how you manage 2 issues at time and ITIL process
Round 4 - HR 

(1 Question)

  • Q1. Salary discussion and why you leaving current job etc

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare will CyberArk and all off it components Troubleshooting and your CyberArk Environment

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jul 2023. There was 1 interview round.

Round 1 - Technical 

(7 Questions)

  • Q1. While integration LDAP in cyberark Facing connectivity issue.
  • Ans. 

    Check LDAP server settings, firewall rules, and CyberArk configuration for connectivity issues.

    • Verify LDAP server address and port in CyberArk configuration

    • Check firewall rules to ensure LDAP traffic is allowed

    • Ensure CyberArk has the necessary permissions to connect to LDAP server

    • Test connectivity using tools like telnet or LDAP browser

    • Review logs for error messages related to LDAP connectivity

  • Answered by AI
  • Q2. CPM failed to restart the services
  • Q3. Workflow of PSM connection
  • Ans. 

    PSM connection workflow involves initiating a connection, validating user credentials, and providing secure access to target systems.

    • Initiate connection request from user

    • Validate user credentials using Cyberark PSM

    • Establish secure connection to target system

    • Monitor and record session activities

    • Terminate connection after session ends

  • Answered by AI
  • Q4. Difference between CP & CCP
  • Ans. 

    CP stands for Central Policy and CCP stands for Customized Central Policy.

    • CP is a predefined policy provided by Cyberark, while CCP is a policy customized by the administrator.

    • CP is a general policy that applies to all users, while CCP can be tailored to specific user roles or permissions.

    • CP may not meet all the organization's security requirements, whereas CCP can be adjusted to address specific needs.

    • CP is easier to ...

  • Answered by AI
  • Q5. Explain about DR drill
  • Ans. 

    DR drill stands for Disaster Recovery drill, which is a planned exercise to test the effectiveness of a company's disaster recovery plan.

    • DR drill is a simulation of an actual disaster scenario to ensure that the organization's systems and processes can be restored in case of a real disaster.

    • It involves testing the backup and recovery procedures, communication protocols, and overall readiness of the organization to hand...

  • Answered by AI
  • Q6. What is PSMGW & PSMApp users
  • Ans. 

    PSMGW & PSMApp users are CyberArk Privileged Session Manager Gateway and Application users used for managing privileged accounts and sessions.

    • PSMGW users are used for managing privileged accounts and sessions through the Privileged Session Manager Gateway.

    • PSMApp users are used for managing privileged accounts and sessions through the Privileged Session Manager Application.

  • Answered by AI
  • Q7. What is port to communicate with PVWA URL
  • Ans. 

    The port to communicate with PVWA URL is 443.

    • PVWA URL uses port 443 for communication

    • Port 443 is the default port for HTTPS connections

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Before interview practice more and be confident.

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Technical questions related to cybersecurity
Round 2 - Technical 

(1 Question)

  • Q1. Detailed discussion on technically.
Round 3 - HR 

(1 Question)

  • Q1. Questions related to experience.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about the nature of work
  • Ans. 

    Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.

    • Monitor computer networks for security breaches

    • Investigate security incidents and provide incident response

    • Implement security measures to protect against cyber attacks

    • Conduct security assessments and audits to identify vulnerabilities

    • Stay up-to-date on the latest cyber threats

  • Answered by AI
  • Q2. Web application security related and owasp top 10
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Attack technique
  • Ans. 

    Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.

    • Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.

    • It helps organizations understand and defend against common attack patterns.

    • Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Apr 2023. There were 5 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Have been asked about architecture, implementation, operations, upgradation and migration.
  • Q2. What are the major challenges you faced so far?
  • Ans. 

    I have faced challenges in managing privileged accounts and securing them from cyber threats.

    • Managing and securing privileged accounts

    • Identifying and mitigating cyber threats

    • Ensuring compliance with security regulations

    • Educating employees on cybersecurity best practices

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. Biggest challenge during upgradation & migration
  • Ans. 

    The biggest challenge during upgradation & migration is ensuring compatibility and minimizing downtime.

    • Ensuring compatibility of the new system with existing infrastructure

    • Minimizing downtime during the transition

    • Testing the new system thoroughly before deployment

    • Ensuring data integrity and security during migration

    • Training employees on the new system

    • Managing user access and permissions during migration

  • Answered by AI
Round 4 - Technical 

(1 Question)

  • Q1. DR failover & failback procedure
Round 5 - Behavioral 

(1 Question)

  • Q1. Have been asked about level of work

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well!!😊

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Be real with your knowledge and be confident with the cyber security concepts
Round 3 - HR 

(1 Question)

  • Q1. Salary expectations Location Joining date

TCS Interview FAQs

How many rounds are there in TCS Cyberark Administrator interview?
TCS interview process usually has 4 rounds. The most common rounds in the TCS interview process are Resume Shortlist, Technical and Behavioral.
How to prepare for TCS Cyberark Administrator interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at TCS. The most common topics and skills that interviewers at TCS expect are PSM and CPM.
What are the top questions asked in TCS Cyberark Administrator interview?

Some of the top questions asked at the TCS Cyberark Administrator interview -

  1. CyberArk Components , License capacity and how you manage 2 issues at time and ...read more
  2. CyberArk Components Vault , PVWA, CMP, PSM PSM-SSP, PTA , SIEM Tools , Issue Tr...read more
  3. Questions Related your current CyberArk Environm...read more

Tell us how to improve this page.

People are getting interviews through

based on 1 TCS interview
Job Portal
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.

Interview Questions from Similar Companies

Accenture Interview Questions
3.9
 • 7.9k Interviews
Infosys Interview Questions
3.7
 • 7.4k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.7k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.7k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
LTIMindtree Interview Questions
3.9
 • 2.8k Interviews
IBM Interview Questions
4.1
 • 2.3k Interviews
View all
TCS Cyberark Administrator Salary
based on 62 salaries
₹3.2 L/yr - ₹7 L/yr
23% less than the average Cyberark Administrator Salary in India
View more details

TCS Cyberark Administrator Reviews and Ratings

based on 3 reviews

3.9/5

Rating in categories

4.2

Skill development

2.6

Work-Life balance

1.8

Salary & Benefits

4.2

Job Security

1.8

Company culture

1.8

Promotions/Appraisal

1.8

Work Satisfaction

Explore 3 Reviews and Ratings
System Engineer
1.1L salaries
unlock blur

₹1 L/yr - ₹9 L/yr

IT Analyst
68.2k salaries
unlock blur

₹5.1 L/yr - ₹16 L/yr

AST Consultant
51k salaries
unlock blur

₹8 L/yr - ₹25 L/yr

Assistant System Engineer
29.9k salaries
unlock blur

₹2.2 L/yr - ₹5.6 L/yr

Associate Consultant
28.6k salaries
unlock blur

₹8.9 L/yr - ₹32 L/yr

Explore more salaries
Compare TCS with

Amazon

4.1
Compare

Wipro

3.7
Compare

Infosys

3.7
Compare

Accenture

3.9
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview