Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Zensar Technologies Team. If you also belong to the team, you can get access from here

Zensar Technologies Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 2.4k Reviews

Filter interviews by

Zensar Technologies Security Engineer Interview Questions and Answers

Updated 4 Jul 2024

Zensar Technologies Security Engineer Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
No response

I applied via Recruitment Consulltant and was interviewed in Jun 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Regarding security tools. Like compliance parameters.
Round 2 - Technical 

(1 Question)

  • Q1. Some technical plus managerial skills

Security Engineer Jobs at Zensar Technologies

View all

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed before Jun 2023. There was 1 interview round.

Round 1 - Aptitude Test 

Technical network concept

Interview Questionnaire 

3 Questions

  • Q1. IPSec vpn
  • Q2. SSL handshake
  • Q3. Phase 1 msgs in ipsec
  • Ans. 

    Phase 1 messages in IPsec establish a secure channel for further communication.

    • Phase 1 negotiates the security parameters for the IPsec tunnel.

    • It establishes a secure channel using the Internet Key Exchange (IKE) protocol.

    • Phase 1 messages include SA proposal, key exchange, and authentication.

    • The negotiation process involves exchanging messages between the two endpoints.

    • Once Phase 1 is complete, Phase 2 can begin for ac

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. ISE and Aci related questions
  • Q2. Firewall and network related questions
Round 2 - Technical 

(2 Questions)

  • Q1. ACI related questions
  • Q2. Firewall & Network related questions
Round 3 - HR 

(2 Questions)

  • Q1. Company policy discussion
  • Q2. Salary discussion
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What do you know about Voyix?
  • Q2. Why want to working Voyix?
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.

    • Experienced in conducting security assessments and identifying vulnerabilities

    • Skilled in implementing security measures to protect against cyber threats

    • Proficient in analyzing security incidents and responding effectively

    • Certified in relevant security certifications such as CISSP or CISM

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Different types of malware
  • Ans. 

    Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

    • Viruses: self-replicating programs that infect other files on a computer

    • Worms: standalone malware that spreads across networks

    • Trojans: disguised as legitimate software to trick users into installing them

    • Ransomware: encrypts files and demands payment for decryption

    • Spyware: secretly gathers information about...

  • Answered by AI
  • Q2. What would you first do if a machine is infected
  • Ans. 

    The first step would be to isolate the infected machine from the network to prevent further spread of the infection.

    • Isolate the infected machine from the network to prevent further spread of the infection

    • Identify the type of malware or virus that has infected the machine

    • Run a full system scan using antivirus software to detect and remove the malware

    • Update the operating system and all software to patch any vulnerabiliti...

  • Answered by AI

I applied via Referral and was interviewed in Oct 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Packet flow fortigate
  • Q2. IPsec VPN troubleshooting
Round 3 - Technical 

(2 Questions)

  • Q1. Fortigate proxy and flow mode
  • Q2. How to design HA in active passive environment
  • Ans. 

    Designing HA in active passive environment involves ensuring redundancy and failover mechanisms.

    • Identify critical components and services that require high availability

    • Implement redundancy by setting up a secondary system that can take over in case of failure

    • Ensure automatic failover mechanisms are in place to minimize downtime

    • Regularly test the failover mechanisms to ensure they work as expected

    • Consider load balancing...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Please prepares strong for networking fundamentals

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I was interviewed in Mar 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain DHCP and DORA process
  • Ans. 

    DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, and Acknowledge stages.

    • DHCP Discover: Client broadcasts a request for IP address

    • DHCP Offer: Server responds with an available IP address

    • DHCP Request: Client requests the offered IP address

    • DHCP Acknowledge: Server confirms the IP address assignment

  • Answered by AI
  • Q2. How a personal computer communicate with a web application. Process (Scenario base)
  • Ans. 

    A personal computer communicates with a web application through a series of steps involving network protocols.

    • The computer sends a request to the web application's server using the HTTP protocol.

    • The server processes the request and sends back a response containing the requested information.

    • The communication is facilitated by the TCP/IP protocol stack.

    • Data is transmitted over the internet using IP addresses and domain n...

  • Answered by AI
Round 2 - Technical 

(2 Questions)

  • Q1. How SSL handshake works
  • Ans. 

    SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

    • Client sends a hello message to server with supported encryption algorithms

    • Server responds with its own hello message, including its certificate

    • Client verifies server's certificate and generates a pre-master secret

    • Both client and server use the pre-master secret to generate a unique ...

  • Answered by AI
  • Q2. Arp and it's types
  • Ans. 

    ARP (Address Resolution Protocol) is a protocol used for mapping an IP address to a MAC address.

    • ARP is used to resolve IP addresses to MAC addresses on a local network.

    • There are two main types of ARP: ARP Request and ARP Reply.

    • ARP Request is sent by a device to find the MAC address of another device with a known IP address.

    • ARP Reply is sent in response to an ARP Request, providing the MAC address of the requested IP ad

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What are the information in TCP IP Header?
  • Ans. 

    TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

    • Source IP address

    • Destination IP address

    • Source port number

    • Destination port number

    • Sequence number

    • Acknowledgment number

    • Header length

    • Checksum

  • Answered by AI
  • Q2. What is App ID in Palo Alto Firewalls?
  • Ans. 

    App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

    • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

    • It allows administrators to create policies based on specific applications rather than just ports or protocols.

    • App ID helps in enhancing security by allowing granular ...

  • Answered by AI
  • Q3. What is the SP3 Architecture of Palo Alto Firewalls?
  • Ans. 

    SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.

    • SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)

    • Security Processing Plane (SP) handles security functions like threat prevention and decryption

    • Control Plane (C) manages routing and firewall policies

    • Data Plane (D) processes and forwards traffic based on firewall pol...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Very Technical questions, starting from packet parsing and analysis.

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. I was hired for Palo Alto and Cisco ASA firewall. but later i got the project in DXC related to Palo alto, checkpoint and Fortinet firewalls. questions were related to Palo alto only related to code upgrad...

Interview Preparation Tips

Interview preparation tips for other job seekers - basic palo alto FW questions

Zensar Technologies Interview FAQs

How many rounds are there in Zensar Technologies Security Engineer interview?
Zensar Technologies interview process usually has 2 rounds. The most common rounds in the Zensar Technologies interview process are Technical.
What are the top questions asked in Zensar Technologies Security Engineer interview?

Some of the top questions asked at the Zensar Technologies Security Engineer interview -

  1. Regarding security tools. Like compliance paramete...read more
  2. Some technical plus managerial ski...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.2k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
LTIMindtree Interview Questions
3.9
 • 2.9k Interviews
DXC Technology Interview Questions
3.7
 • 801 Interviews
Mphasis Interview Questions
3.4
 • 784 Interviews
Nagarro Interview Questions
4.0
 • 757 Interviews
View all
Zensar Technologies Security Engineer Salary
based on 4 salaries
₹6.2 L/yr - ₹8 L/yr
21% less than the average Security Engineer Salary in India
View more details
Security Engineer

Kolkata,

Mumbai

+5

5-8 Yrs

Not Disclosed

Explore more jobs
Software Engineer
3.9k salaries
unlock blur

₹2.4 L/yr - ₹10 L/yr

Senior Software Engineer
3.8k salaries
unlock blur

₹6 L/yr - ₹23 L/yr

Technical Specialist
1.5k salaries
unlock blur

₹9.3 L/yr - ₹34 L/yr

Softwaretest Engineer
836 salaries
unlock blur

₹2.6 L/yr - ₹9.5 L/yr

Senior Technical Specialist
700 salaries
unlock blur

₹11.5 L/yr - ₹40.2 L/yr

Explore more salaries
Compare Zensar Technologies with

TCS

3.7
Compare

Infosys

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview