Upload Button Icon Add office photos

Filter interviews by

Unistring Tech Solutions Cyber Security Intern Interview Questions and Answers

Updated 30 Aug 2024

Unistring Tech Solutions Cyber Security Intern Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
No response

I applied via Walk-in and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It was in google forms

Round 2 - Coding Test 

It was medium hard and interesting

Round 3 - HR 

(2 Questions)

  • Q1. Intro about yourself
  • Ans. 

    I am a motivated and detail-oriented Cyber Security student with hands-on experience in network security and ethical hacking.

    • Currently pursuing a degree in Cyber Security

    • Hands-on experience in network security and ethical hacking

    • Strong understanding of common cyber threats and security measures

    • Certifications in CompTIA Security+ and CEH

    • Participated in Capture The Flag competitions

  • Answered by AI
  • Q2. Your projects, experiences etc
  • Ans. 

    I have completed various projects related to network security, cryptography, and malware analysis during my studies.

    • Developed a network intrusion detection system using Snort and Wireshark

    • Researched and implemented AES encryption algorithm for secure data transmission

    • Analyzed and reverse engineered malware samples to understand their behavior

  • Answered by AI

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

It was an MCQ test with questions from Quantitative Ability, Logical reasoning, Verbal Abililty

Round 2 - Technical 

(4 Questions)

  • Q1. Introduce yourself
  • Q2. Describe your internship experience and what was your contribution.
  • Q3. Why do you want to pivot to Cyber Security from your Electrical engineering degree?
  • Q4. Are you willing to learn?
Round 3 - HR 

(4 Questions)

  • Q1. Where are you from? What do you like about this city?
  • Q2. What do you think Consultants do?
  • Ans. 

    Consultants provide expert advice and guidance to clients in a specific field or industry.

    • Consultants analyze client needs and provide tailored solutions

    • They offer recommendations based on industry best practices

    • Consultants may also assist with implementation and training

    • They often work on a project basis or provide ongoing support

    • Examples: Cyber Security Consultants help organizations improve their security posture, I

  • Answered by AI
  • Q3. Would you like travelling for work?
  • Q4. Are you willing to relocate?

Interview Preparation Tips

Interview preparation tips for other job seekers - For a fresh college graduate, prepare your resume well and mention only those skills/experience you are able to defend well. Don't bluff on your resume. Revise the answers to common interview questions. And please know what Consulting is what consultants do.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.

Round 1 - Coding Test 

2 coding questions about arrays and strings.

Round 2 - Technical 

(1 Question)

  • Q1. Complete interview from your resume
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Pipes and cistern
  • Q2. Time and work
Round 2 - Aptitude Test 

Time and work, distance speed and time,pipes and cistern, blood relation

Interview Preparation Tips

Interview preparation tips for other job seekers - Time management is the key
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Lots of questions asked, difficulty level easy to difficult. You can find easy questions Just typing cyber security analyst interview questions on Google. About difficult if you have good understanding the...
Round 2 - Technical 

(1 Question)

  • Q1. Managerial technical round, some technical questions, mostly generally discussion, senior manager is assessing you , so keep yourself calm and decent.

Interview Preparation Tips

Interview preparation tips for other job seekers - Give your ans very precisely, referring to some case study or real time vulnerability.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

Aptittude test consist of basic quantitative and logical questions

Round 2 - One-on-one 

(2 Questions)

  • Q1. About project and project details
  • Q2. Why choose this field
Round 3 - HR 

(2 Questions)

  • Q1. Why choose this company
  • Q2. Is there any other question
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I was interviewed in Aug 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. Ransomware scenario based
  • Q2. Networking concepts
Round 2 - Technical 

(2 Questions)

  • Q1. APT questions like recent cyber attacks
  • Q2. Networking concepts

Interview Preparation Tips

Interview preparation tips for other job seekers - NA
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - One-on-one 

(2 Questions)

  • Q1. What is kerberos protocol?
  • Ans. 

    Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.

    • Developed by MIT in the 1980s

    • Uses symmetric key cryptography

    • Involves a Key Distribution Center (KDC)

    • Prevents eavesdropping and replay attacks

  • Answered by AI
  • Q2. Explain three way hand-shake
  • Ans. 

    Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.

    • Client sends a SYN (synchronize) packet to the server to initiate a connection

    • Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request

    • Client sends an ACK (acknowledgment) packet back to the server to confirm the connection

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. How TLS work ?
  • Ans. 

    TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.

    • TLS encrypts data to ensure confidentiality during transmission.

    • It uses cryptographic algorithms to authenticate the parties involved in the communication.

    • TLS also provides mechanisms for data integrity to prevent tampering.

    • Handshake process involves negotiation of encryption algorithms and exchange o...

  • Answered by AI
  • Q2. TLS algorithms ?

Interview Preparation Tips

Interview preparation tips for other job seekers - both round question was co-related with eachother

Skills evaluated in this interview

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. It depends on the technology on what you work
  • Q2. It depends on the technology on What you work.

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident on what you know. Learn basic things on the technology what you work.

Unistring Tech Solutions Interview FAQs

How many rounds are there in Unistring Tech Solutions Cyber Security Intern interview?
Unistring Tech Solutions interview process usually has 3 rounds. The most common rounds in the Unistring Tech Solutions interview process are Aptitude Test, Coding Test and HR.

Tell us how to improve this page.

Unistring Tech Solutions Cyber Security Intern Interview Process

based on 1 interview

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
LTIMindtree Interview Questions
3.8
 • 3k Interviews
Deloitte Interview Questions
3.8
 • 2.9k Interviews
BYJU'S Interview Questions
3.1
 • 2.2k Interviews
Teleperformance Interview Questions
3.9
 • 1.8k Interviews
View all
Applications Engineer
30 salaries
unlock blur

₹1.8 L/yr - ₹10 L/yr

RTL Design Engineer
10 salaries
unlock blur

₹3 L/yr - ₹9 L/yr

HR Executive
7 salaries
unlock blur

₹2.4 L/yr - ₹4.1 L/yr

Junior Application Engineer
6 salaries
unlock blur

₹3.8 L/yr - ₹6 L/yr

Project Coordinator
6 salaries
unlock blur

₹2.2 L/yr - ₹3 L/yr

Explore more salaries
Compare Unistring Tech Solutions with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview