Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by XenonStack Team. If you also belong to the team, you can get access from here

XenonStack Verified Tick

Compare button icon Compare button icon Compare
3.3

based on 190 Reviews

Filter interviews by

XenonStack Associate Security Engineer Interview Questions and Answers

Updated 29 Oct 2021

XenonStack Associate Security Engineer Interview Experiences

1 interview found

I applied via Company Website and was interviewed in Sep 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Related to the security field basics , projects , experience and work.

Interview Preparation Tips

Interview preparation tips for other job seekers - Add more projects to your profile . Be confident while interview.

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is CryptoGraphy
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties.

    • It involves techniques for secure communication and data protection

    • Uses mathematical algorithms to encrypt and decrypt data

    • Examples include AES, RSA, and SHA

    • Cryptography is used in various fields such as finance, military, and healthcare

  • Answered by AI
  • Q2. Difference between hashing and encryption
  • Ans. 

    Hashing is a one-way process of converting data into a fixed-length value while encryption is a two-way process of converting data into a coded message.

    • Hashing is used for data integrity checks and password storage while encryption is used for secure transmission of data.

    • Hashing is irreversible while encryption is reversible.

    • Hashing algorithms include MD5, SHA-1, SHA-256 while encryption algorithms include AES, RSA, DE...

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-

I was interviewed in Dec 2022.

Round 1 - Technical 

(2 Questions)

  • Q1. Examples for False Positive identified in SIEM
  • Ans. 

    False positives in SIEM

    • Misconfigured rules triggering alerts

    • Legitimate traffic being flagged as malicious

    • Inaccurate threat intelligence data

    • Inadequate correlation rules

    • Outdated signatures or patterns

  • Answered by AI
  • Q2. Explain cyber kill chain
  • Ans. 

    Cyber kill chain is a framework that describes the stages of a cyber attack.

    • It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

    • The goal is to identify and disrupt the attack at an early stage.

    • For example, if an attacker is in the reconnaissance stage, organizations can implement measures to detect and prevent the attacker from...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be prepared with the contents in your resume, cyber security concepts
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before May 2023. There were 3 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Confidential not to say
Round 2 - Technical 

(1 Question)

  • Q1. Confidential not to say
Round 3 - HR 

(1 Question)

  • Q1. Confidential not to say

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be throughout with the basics and what you know tell that don't be apart from that!

Tell us how to improve this page.

People are getting interviews through

based on 1 XenonStack interview
Company Website
100%
Low Confidence
?
Low Confidence means the data is based on a small number of responses received from the candidates.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.3k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
LTIMindtree Interview Questions
3.8
 • 2.9k Interviews
Mphasis Interview Questions
3.4
 • 790 Interviews
Miko Interview Questions
3.1
 • 10 Interviews
View all
Associate Software Engineer
89 salaries
unlock blur

₹4 L/yr - ₹9 L/yr

Devops Engineer
25 salaries
unlock blur

₹4 L/yr - ₹11 L/yr

Business Analyst
17 salaries
unlock blur

₹3 L/yr - ₹13.4 L/yr

Data Engineer
13 salaries
unlock blur

₹6 L/yr - ₹10 L/yr

Software Engineer
11 salaries
unlock blur

₹4 L/yr - ₹7 L/yr

Explore more salaries
Compare XenonStack with

TCS

3.7
Compare

Infosys

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview