i
Zensar Technologies
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in real-t...
Email campaigns should be handled strategically with personalized content and targeted audience segmentation.
Segment your audience based on demographics, behavior, or preferences to send personalized content.
Use A/B testing to optimize subject lines, content, and timing for better engagement.
Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.
Automate email workflows...
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Top trending discussions
I applied via Walk-in and was interviewed before Sep 2019. There were 5 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2020. There were 5 interview rounds.
I applied via Recruitment Consultant and was interviewed in Mar 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2019. There were 5 interview rounds.
I applied via Company Website and was interviewed in Nov 2020. There were 3 interview rounds.
Answers to questions related to Docker, AWS firewall types, and ELK Stack
To create a Docker file, start with a base image and add necessary dependencies and configurations
AWS has two types of firewalls: Network ACLs and Security Groups
ELK Stack is a combination of Elasticsearch, Logstash, and Kibana used for log management and analysis
I applied via Campus Placement and was interviewed before Jun 2021. There were 3 interview rounds.
Profit and losses, time
C language
I applied via Referral and was interviewed before Mar 2021. There was 1 interview round.
based on 1 interview
Interview experience
Senior Software Engineer
3.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Specialist
1.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Softwaretest Engineer
830
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Specialist
720
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech