Upload Button Icon Add office photos

Filter interviews by

Web Affinity Technology Soc Analyst 1 Interview Questions and Answers

Updated 8 Sep 2024

Interview questions from similar companies

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(3 Questions)

  • Q1. What is event id for successful login
  • Ans. 

    Event ID 4624 is for successful login in Windows Security Event Log.

    • Event ID 4624 is logged in the Windows Security Event Log when a user successfully logs on to a computer.

    • This event is commonly used by security analysts to track user activity and identify potential security incidents.

    • The event includes information such as the account name, account domain, logon type, and logon process.

    • For example, in a Windows enviro...

  • Answered by AI
  • Q2. What is event id for login fail
  • Ans. 

    Event ID 4625 is for login fail

    • Event ID 4625 is generated when a user fails to log in to a system

    • It is commonly seen in Windows Security event logs

    • The event provides information on the account that failed to log in, the reason for the failure, and the source of the login attempt

  • Answered by AI
  • Q3. 4625 for login fail
  • Ans. 

    This question is likely asking about the reason code 4625 for a login failure.

    • 4625 is the event ID for a failed login attempt in Windows systems

    • It could indicate a user entering incorrect credentials or an account being locked out

    • Common reasons for event 4625 include mistyped passwords, expired accounts, or disabled accounts

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Data loss prevention
  • Q2. Scenario based questions
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Explain mitre framework
  • Ans. 

    The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.

    • Developed by MITRE Corporation

    • Provides a comprehensive list of tactics and techniques used by adversaries during cyber attacks

    • Used by cybersecurity professionals to improve threat detection and response

    • Helps organizations understand and defend against common attack patterns

    • Example: Credential Dumping is a

  • Answered by AI
  • Q2. Explain recent breach
  • Ans. 

    Company X experienced a data breach due to a phishing attack on employee email accounts.

    • Phishing attack targeted employee email accounts

    • Sensitive data such as customer information or financial records may have been compromised

    • Company X is working on improving cybersecurity measures to prevent future breaches

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I was interviewed in Apr 2024.

Round 1 - Technical 

(1 Question)

  • Q1. Explain the QRadar SIEM architecture
  • Ans. 

    QRadar SIEM architecture is a distributed system with components like Console, Event Processors, Flow Processors, and Data Nodes.

    • QRadar SIEM architecture is based on a distributed model

    • Components include Console, Event Processors, Flow Processors, and Data Nodes

    • Console provides the user interface for managing and monitoring security events

    • Event Processors collect, normalize, and correlate events from various sources

    • Flo...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
-

I applied via campus placement at Thadomal Shahani Engineering College, Mumbai and was interviewed in Aug 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

In the aptitude round there were various sections such as quants, verbal and technical questions based on networking and cloud platforms and some pseudo codes . No coding questions were asked .

Round 2 - Group Discussion 

It was structured group discussion with one panel member and a case study was provided to us .

Round 3 - Technical 

(5 Questions)

  • Q1. Tell me about yourself .
  • Ans. 

    I am a dedicated and detail-oriented analyst with a strong background in data analysis and problem-solving.

    • I have a Bachelor's degree in Statistics and have completed multiple data analysis projects during my studies.

    • I am proficient in using statistical software such as R and Python to analyze data and generate insights.

    • I have experience working with cross-functional teams to develop and implement data-driven strategie...

  • Answered by AI
  • Q2. Tell me about the projects that you have made .
  • Ans. 

    I have worked on various projects including financial analysis, market research, and data visualization.

    • Developed financial models to analyze company performance

    • Conducted market research to identify growth opportunities

    • Created interactive dashboards for data visualization

    • Collaborated with cross-functional teams to implement project recommendations

  • Answered by AI
  • Q3. Puzzles questions
  • Q4. Coding question
  • Q5. Machine learning question

Interview Preparation Tips

Topics to prepare for Deloitte Analyst interview:
  • Data Structures
  • quants
  • logical aptitude
  • technical aptitude
  • Indiabix for aptitude
  • past year questions
  • past interview experiences
Interview preparation tips for other job seekers - Be patient and speak confidently in the interview . Try to express your opinion and approach to tackle problems and questions confidently.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

GOOD EXPERIENCE - 10 MIN INTERVIEW

Round 2 - Aptitude Test 

EASY EXPERIENCE - 10 MIN INTERVIEW JAVA REALETD

Round 3 - One-on-one 

(2 Questions)

  • Q1. INRODUCE YOURSLEF
  • Q2. FAMILY BACKGROUND
Round 4 - Group Discussion 

Artifical Intelligence

Round 5 - Assignment 

Maths, englkisg, coding

Round 6 - Coding Test 

Abap, python, hard ques

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 3 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Explain in detail Previous job experience
Round 2 - One-on-one 

(2 Questions)

  • Q1. What is content moderation
  • Ans. 

    Content moderation is the process of monitoring and filtering user-generated content on online platforms to ensure it meets community guidelines.

    • Monitoring and reviewing user-generated content

    • Filtering out inappropriate or harmful content

    • Enforcing community guidelines and policies

    • Removing spam, hate speech, and other violations

    • Implementing automated tools and human moderators

    • Examples: Facebook moderating posts, YouTube

  • Answered by AI
  • Q2. Policy related questions
Round 3 - Assignment 

It consists of few questions on logical thinking and aptitude

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
Selected Selected
Round 1 - HR 

(2 Questions)

  • Q1. State all Types of fraud we have
  • Ans. 

    Types of fraud include identity theft, credit card fraud, insurance fraud, and investment fraud.

    • Identity theft

    • Credit card fraud

    • Insurance fraud

    • Investment fraud

  • Answered by AI
  • Q2. Information about check fraud and account takeover
Round 2 - One-on-one 

(2 Questions)

  • Q1. HOW do you prepare SAR
  • Ans. 

    Prepare SAR by collecting relevant data, analyzing information, and documenting findings.

    • Collect all relevant data related to the suspicious activity report (SAR)

    • Analyze the information to identify any patterns or red flags

    • Document your findings in a clear and concise manner

    • Ensure compliance with regulatory requirements and guidelines

    • Submit the SAR to the appropriate authorities or stakeholders

  • Answered by AI
  • Q2. Which tools you use in fraud detection
  • Ans. 

    I use a combination of statistical analysis, machine learning algorithms, and data visualization tools for fraud detection.

    • Statistical analysis tools like SAS or R

    • Machine learning algorithms like logistic regression or random forests

    • Data visualization tools like Tableau or Power BI

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - HR 

(2 Questions)

  • Q1. Tell me about yourself
  • Q2. Why you choose this company and past experience
Round 2 - One-on-one 

(2 Questions)

  • Q1. Day to day activities
  • Q2. How did you manage a conflict arised in team

Web Affinity Technology Interview FAQs

How many rounds are there in Web Affinity Technology Soc Analyst 1 interview?
Web Affinity Technology interview process usually has 1 rounds. The most common rounds in the Web Affinity Technology interview process are HR.
What are the top questions asked in Web Affinity Technology Soc Analyst 1 interview?

Some of the top questions asked at the Web Affinity Technology Soc Analyst 1 interview -

  1. About tools and technolog...read more
  2. About phising al...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

Cognizant Interview Questions
3.8
 • 5.5k Interviews
Deloitte Interview Questions
3.8
 • 2.8k Interviews
BYJU'S Interview Questions
3.1
 • 2.2k Interviews
Teleperformance Interview Questions
3.9
 • 1.7k Interviews
Reliance Retail Interview Questions
3.9
 • 1.5k Interviews
Ernst & Young Interview Questions
3.5
 • 1.1k Interviews
WNS Interview Questions
3.4
 • 956 Interviews
Google Interview Questions
4.4
 • 833 Interviews
Nagarro Interview Questions
4.0
 • 758 Interviews
View all

Web Affinity Technology Soc Analyst 1 Reviews and Ratings

based on 1 review

4.0/5

Rating in categories

4.0

Skill development

4.0

Work-Life balance

3.0

Salary & Benefits

4.0

Job Security

4.0

Company culture

3.0

Promotions/Appraisal

5.0

Work Satisfaction

Explore 1 Review and Rating
Software Engineer
48 salaries
unlock blur

₹3.7 L/yr - ₹11.1 L/yr

Devops Engineer
28 salaries
unlock blur

₹4.5 L/yr - ₹13 L/yr

Software Developer
28 salaries
unlock blur

₹3 L/yr - ₹11 L/yr

Softwaretest Engineer
16 salaries
unlock blur

₹4.2 L/yr - ₹11 L/yr

Data Analyst
15 salaries
unlock blur

₹2.5 L/yr - ₹10.1 L/yr

Explore more salaries
Compare Web Affinity Technology with

Cognizant

3.8
Compare

Teleperformance

3.9
Compare

Reliance Retail

3.9
Compare

iEnergizer

4.7
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview