Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Wipro Team. If you also belong to the team, you can get access from here

Wipro Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 51k Reviews

Filter interviews by

Wipro Cyber Security Interview Questions and Answers

Updated 3 Jan 2017

Wipro Cyber Security Interview Experiences

1 interview found

I was interviewed before Jan 2016.

Interview Questionnaire 

9 Questions

  • Q1. A brief about yourself
  • Ans. 

    I am a cyber security professional with expertise in network security and threat analysis.

    • I have experience in implementing and managing firewalls, intrusion detection systems, and other security measures.

    • I am skilled in conducting vulnerability assessments and penetration testing to identify potential security risks.

    • I stay up-to-date with the latest security trends and technologies to ensure the highest level of prote...

  • Answered by AI
  • Q2. Would you be okay if you are relocated?
  • Q3. Questions about my projects and the kind of team I worked with
  • Q4. Give a brief introduction.
  • Q5. Why do you want to join cyber security profile?
  • Q6. What are the domains you think you can work on if you are hired?
  • Ans. 

    I can work on domains such as network security, application security, cloud security, and incident response.

    • Network security - securing network infrastructure, firewalls, VPNs, etc.

    • Application security - securing web and mobile applications, code review, etc.

    • Cloud security - securing cloud infrastructure, data protection, etc.

    • Incident response - responding to security incidents, investigating and mitigating threats, et

  • Answered by AI
  • Q7. What all authentication measures did you take in your projects?
  • Ans. 

    I implemented multiple authentication measures in my projects to ensure secure access.

    • Implemented password-based authentication with strong password policies

    • Utilized two-factor authentication for an added layer of security

    • Implemented biometric authentication using fingerprint or facial recognition

    • Used multi-factor authentication to combine multiple authentication methods

    • Implemented single sign-on (SSO) for seamless and...

  • Answered by AI
  • Q8. What are firewalls and application gateways and the difference between them?
  • Ans. 

    Firewalls and application gateways are both security measures used to protect networks, but they differ in their approach.

    • Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

    • Application gateways, also known as application-level gateways or application layer firewalls, operate at the application layer of the OSI model and can inspect...

  • Answered by AI
  • Q9. What is HTTPS?
  • Ans. 

    HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP that encrypts data sent between a website and a user's browser.

    • HTTPS uses SSL/TLS encryption to protect data

    • It ensures that the website being accessed is authentic

    • It prevents eavesdropping and tampering of data

    • It is indicated by a padlock icon in the browser's address bar

    • Examples of websites that use HTTPS include banking sites, e-comme

  • Answered by AI

Interview Preparation Tips

Round: Test
Experience: Section 1 had 20 english and aptitude questions.
Section 2 had 20 questions based on maths aptitude.
Section 3 were core branch questions from C/C++ , networking , operating systems , database management and algorithm complexities.

Tips: Practicing basic aptitude questions online and referring basic concepts of the topics mentioned above would be enough.
Duration: 1 hour 30 minutes
Total Questions: 70

Skills: C++ , Communication Networks, Mysqli, authentication protocols
College Name: Thapar University, Patiala

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Discuss about latest threat that i encountered
  • Q2. Difference between kill cahin and mitre framework
  • Ans. 

    Kill Chain is a cybersecurity attack model while MITRE Framework is a knowledge base for cyber threats.

    • Kill Chain is a step-by-step model that outlines the stages of a cyber attack, from initial reconnaissance to data exfiltration.

    • MITRE Framework is a comprehensive list of known tactics, techniques, and procedures used by cyber adversaries.

    • Kill Chain helps organizations understand and defend against cyber attacks, whil...

  • Answered by AI
Round 2 - HR 

(1 Question)

  • Q1. Salary compensation
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Tell me about the nature of work
  • Ans. 

    Cyber Security Analysts protect computer systems and networks from cyber threats by monitoring, detecting, and responding to security incidents.

    • Monitor computer networks for security breaches

    • Investigate security incidents and provide incident response

    • Implement security measures to protect against cyber attacks

    • Conduct security assessments and audits to identify vulnerabilities

    • Stay up-to-date on the latest cyber threats

  • Answered by AI
  • Q2. Web application security related and owasp top 10
Interview experience
3
Average
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Coding Test 

C,C#,C++,Dart,Go,Type script

Round 2 - Technical 

(2 Questions)

  • Q1. How can you create a virus to correct a crashed server? Answer : a. Read all data console. B. using any server detector . C. Use advance knowledge on cybersecurity difference system to quick recreate. Answ...
  • Q2. Answer my Q1 and try to contact me

Interview Preparation Tips

Interview preparation tips for other job seekers - Find me the answer for my question
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Cyber kill chain
  • Q2. Mitre Attack technique
  • Ans. 

    Mitre Attack technique is a framework for categorizing cyber threats based on tactics, techniques, and procedures used by attackers.

    • Mitre Attack technique provides a standardized way to categorize and analyze cyber threats.

    • It helps organizations understand and defend against common attack patterns.

    • Examples of Mitre Attack techniques include spear phishing, credential dumping, and command and control.

  • Answered by AI
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(5 Questions)

  • Q1. Basic cyber security cum devops questions
  • Q2. What is cloud? and types
  • Ans. 

    Cloud is a virtual space that allows users to store, manage, and access data and applications remotely.

    • Cloud is a virtualized infrastructure that provides on-demand access to computing resources.

    • It allows users to store and access data and applications remotely over the internet.

    • Cloud services are typically categorized into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a...

  • Answered by AI
  • Q3. What is devops?
  • Ans. 

    DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.

    • DevOps is a cultural shift that promotes collaboration and communication between software developers and IT operations.

    • It aims to automate and streamline the software delivery process, from development to deployment and maintenance.

    • DevOps emphasizes continuous integration, continuous delivery...

  • Answered by AI
  • Q4. What is ci/cd in devops
  • Ans. 

    CI/CD stands for Continuous Integration/Continuous Deployment. It is a DevOps practice that involves automating the process of building, testing, and deploying software.

    • CI/CD is a software development approach that aims to deliver code changes more frequently and reliably.

    • Continuous Integration involves merging code changes into a shared repository and running automated tests to detect integration issues early.

    • Continuo...

  • Answered by AI
  • Q5. Implementing security in cloud
  • Ans. 

    Implementing security in the cloud involves various measures to protect data and systems from cyber threats.

    • Use strong authentication and access controls to prevent unauthorized access

    • Encrypt data both in transit and at rest to ensure confidentiality

    • Implement network security measures like firewalls and intrusion detection systems

    • Regularly update and patch software to address vulnerabilities

    • Monitor and log activities t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Behavioral 

(5 Questions)

  • Q1. IP related work email blocking related
  • Q2. IP blocked login devices and check malicious IP in devices option.
  • Ans. 

    IP blocking is a common security measure to prevent unauthorized access to devices and networks.

    • Implement IP blocking on login devices to prevent unauthorized access from specific IPs.

    • Regularly check for malicious IPs in devices and block them to prevent security breaches.

    • Utilize tools like firewalls and intrusion detection systems to monitor and block malicious IPs.

    • Consider implementing automated scripts or tools to s...

  • Answered by AI
  • Q3. Email Gateway block the email spam if we received
  • Ans. 

    Yes, email gateways can block email spam if configured properly.

    • Email gateways use various techniques like blacklists, whitelists, content filtering, and sender authentication to block spam.

    • Spam emails are typically identified based on keywords, sender reputation, and other factors.

    • Advanced email gateways may also use machine learning algorithms to detect and block spam.

    • Regular updates and monitoring of email gateway s...

  • Answered by AI
  • Q4. F5device for security for white listing
  • Ans. 

    F5 devices can be used for security white listing to control access to specific applications or services.

    • F5 devices can be used to create white lists of approved IP addresses, URLs, or applications that are allowed to access a network.

    • This helps prevent unauthorized access and reduces the attack surface for potential threats.

    • For example, an organization can use F5 devices to white list specific IP addresses for remote

  • Answered by AI
  • Q5. Cisco devices for email and IP upgrade
  • Ans. 

    When upgrading Cisco devices for email and IP, it is important to plan and execute the upgrade carefully.

    • Ensure compatibility of new devices with existing infrastructure

    • Backup configurations and data before starting the upgrade

    • Test the new devices in a controlled environment before deploying them

    • Consider any security implications of the upgrade

    • Train staff on how to use the new devices effectively

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Jul 2021. There were 3 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Regarding TPRM process
  • Q2. Regarding Cyber Security concepts
  • Q3. Business continuity

Interview Preparation Tips

Interview preparation tips for other job seekers - Read the JD before interview and prepare accordingly

I applied via AmbitionBox and was interviewed before Aug 2021. There was 1 interview round.

Round 1 - Technical 

(1 Question)

  • Q1. Share experience Arcsight & Splunk tool
  • Ans. 

    Arcsight & Splunk are SIEM tools used for log management and security analytics.

    • Arcsight is a legacy SIEM tool used for log management and security analytics.

    • Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.

    • Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.

    • Arcsight has a complex architecture and r...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Explain its your own experience based on knowledge.

Skills evaluated in this interview

Wipro Interview FAQs

How to prepare for Wipro Cyber Security interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Wipro. The most common topics and skills that interviewers at Wipro expect are 3 Mm Module, Customer Management, HR MIS, Identity Management and Incident management.
What are the top questions asked in Wipro Cyber Security interview?

Some of the top questions asked at the Wipro Cyber Security interview -

  1. What are firewalls and application gateways and the difference between th...read more
  2. What all authentication measures did you take in your projec...read more
  3. What is HTT...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.2k Interviews
Accenture Interview Questions
3.9
 • 8k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.7k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
LTIMindtree Interview Questions
3.9
 • 2.9k Interviews
IBM Interview Questions
4.1
 • 2.4k Interviews
View all
Wipro Cyber Security Salary
based on 6 salaries
₹2.8 L/yr - ₹9 L/yr
At par with the average Cyber Security Salary in India
View more details

Wipro Cyber Security Reviews and Ratings

based on 2 reviews

2.4/5

Rating in categories

2.4

Skill development

2.4

Work-life balance

2.4

Salary

2.4

Job security

2.4

Company culture

2.4

Promotions

2.4

Work satisfaction

Explore 2 Reviews and Ratings
Project Engineer
32.6k salaries
unlock blur

₹1.8 L/yr - ₹8.3 L/yr

Senior Software Engineer
23k salaries
unlock blur

₹5.8 L/yr - ₹22.5 L/yr

Senior Associate
21.2k salaries
unlock blur

₹0.8 L/yr - ₹5.5 L/yr

Senior Project Engineer
20.5k salaries
unlock blur

₹5 L/yr - ₹19.4 L/yr

Technical Lead
18.6k salaries
unlock blur

₹8.3 L/yr - ₹36 L/yr

Explore more salaries
Compare Wipro with

TCS

3.7
Compare

Infosys

3.7
Compare

Tesla

4.3
Compare

Amazon

4.1
Compare
Did you find this page helpful?
Yes No
write
Share an Interview