Upload Button Icon Add office photos

Filter interviews by

Vision Infosys Cyber Security Analyst Interview Questions and Answers

Updated 28 Nov 2022

Vision Infosys Cyber Security Analyst Interview Experiences

1 interview found

I applied via Naukri.com and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(7 Questions)

  • Q1. Vapt/Cyber Security Analyst/PT
  • Q2. How Will take POC? And Report?
  • Ans. 

    POC will be taken by conducting tests and experiments to validate the security vulnerability. A report will be prepared with findings and recommendations.

    • Conduct tests and experiments to validate the security vulnerability

    • Document all findings and observations

    • Prepare a report with recommendations to address the vulnerabilities

    • Present the report to stakeholders and management

  • Answered by AI
  • Q3. How Manually Test A Network?
  • Ans. 

    Manually testing a network involves using various tools and techniques to identify vulnerabilities and potential security threats.

    • Performing port scans to identify open ports and services

    • Conducting penetration testing to simulate attacks and identify weaknesses

    • Reviewing firewall and router configurations

    • Analyzing network traffic for anomalies

    • Testing user authentication and access controls

    • Checking for outdated software ...

  • Answered by AI
  • Q4. What is the reason to switch our Company?
  • Q5. Why should we hire you?
  • Q6. How you prove that you are fit for this Job?
  • Q7. Steps to find Web PT/Network PT/ Mob PT?
  • Ans. 

    To find Web PT/Network PT/Mob PT, perform network scanning, use port scanners, and analyze network traffic.

    • Perform network scanning to identify devices on the network

    • Use port scanners to identify open ports on the devices

    • Analyze network traffic to identify patterns and anomalies

    • Look for specific protocols or services associated with Web PT/Network PT/Mob PT

    • Use specialized tools like Wireshark or Nmap for deeper analysi

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Read all those important quotionare to get your Aptitude, Carrier focus, Interview, and self motivation.

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
Selected Selected
Round 1 - Technical 

(2 Questions)

  • Q1. IAM Basics, What is SSO/Implementation process,RBAC process.
  • Q2. Scenario biased interview questions about IAM.
Round 2 - Technical 

(1 Question)

  • Q1. More topics on IAM/Sailpont RSA Governance and Okta.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Discuss about latest threat that i encountered
  • Q2. Difference between kill cahin and mitre framework
  • Ans. 

    Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.

    • Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.

    • MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.

    • Kill Chain helps organizations understand and defend against cyber attacks, whil...

  • Answered by AI
Round 2 - HR 

(1 Question)

  • Q1. Salary compensation
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about the nature of work
  • Ans. 

    Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.

    • Monitor computer networks for security breaches

    • Investigate security incidents and provide incident response

    • Implement security measures to protect against cyber attacks

    • Conduct security assessments and audits to identify vulnerabilities

    • Stay up-to-date on the latest cyber threats

  • Answered by AI
  • Q2. Web application security related and owasp top 10
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
-
Result
Selected Selected
Round 1 - Technical 

(2 Questions)

  • Q1. What is Cyber seurity
  • Q2. All

Interview Preparation Tips

Interview preparation tips for other job seekers - cyber security soc networkings
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(5 Questions)

  • Q1. Basic cyber security cum devops questions
  • Q2. What is cloud? and types
  • Ans. 

    Cloud is a virtual space that allows users to store, manage, and access data and applications remotely.

    • Cloud is a virtualized infrastructure that provides on-demand access to computing resources.

    • It allows users to store and access data and applications remotely over the internet.

    • Cloud services are typically categorized into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a...

  • Answered by AI
  • Q3. What is devops?
  • Ans. 

    DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.

    • DevOps is a cultural shift that promotes collaboration and communication between software developers and IT operations.

    • It aims to automate and streamline the software delivery process, from development to deployment and maintenance.

    • DevOps emphasizes continuous integration, continuous delivery...

  • Answered by AI
  • Q4. What is ci/cd in devops
  • Ans. 

    CI/CD stands for Continuous Integration/Continuous Deployment. It is a DevOps practice that involves automating the process of building, testing, and deploying software.

    • CI/CD is a software development approach that aims to deliver code changes more frequently and reliably.

    • Continuous Integration involves merging code changes into a shared repository and running automated tests to detect integration issues early.

    • Continuo...

  • Answered by AI
  • Q5. Implementing security in cloud
  • Ans. 

    Implementing security in the cloud involves various measures to protect data and systems from cyber threats.

    • Use strong authentication and access controls to prevent unauthorized access

    • Encrypt data both in transit and at rest to ensure confidentiality

    • Implement network security measures like firewalls and intrusion detection systems

    • Regularly update and patch software to address vulnerabilities

    • Monitor and log activities t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Group Discussion 

About a rat that can exfoliate the system and also mirte attack

Round 2 - Coding Test 

Assembly language with little python

Interview Preparation Tips

Interview preparation tips for other job seekers - Best of luck for interview
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via campus placement at Dr. B.R. Ambedkar National Institute of Technology (NIT), Jalandhar and was interviewed in Dec 2023. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. He ask me questions related to cyber security, He give me codes of network security in python and ask me to find the errors in the code
  • Q2. Only 2 rounds of interviews was there, both the interviews were of 45 min duration, first round was easy as compared to the second round

Vision Infosys Interview FAQs

How many rounds are there in Vision Infosys Cyber Security Analyst interview?
Vision Infosys interview process usually has 2 rounds. The most common rounds in the Vision Infosys interview process are Resume Shortlist and Technical.
What are the top questions asked in Vision Infosys Cyber Security Analyst interview?

Some of the top questions asked at the Vision Infosys Cyber Security Analyst interview -

  1. How Will take POC? And Repo...read more
  2. Steps to find Web PT/Network PT/ Mob ...read more
  3. How Manually Test A Netwo...read more

Tell us how to improve this page.

Vision Infosys Cyber Security Analyst Salary
based on 5 salaries
₹1.8 L/yr - ₹3.5 L/yr
56% less than the average Cyber Security Analyst Salary in India
View more details
Cyber Security Analyst
5 salaries
unlock blur

₹1.8 L/yr - ₹3.5 L/yr

Project Engineer
4 salaries
unlock blur

₹2 L/yr - ₹3.5 L/yr

Explore more salaries
Compare Vision Infosys with

TCS

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare

Cognizant

3.8
Compare
Did you find this page helpful?
Yes No
write
Share an Interview