i
Zensar Technologies
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in real-t...
Email campaigns should be handled strategically with personalized content and targeted audience segmentation.
Segment your audience based on demographics, behavior, or preferences to send personalized content.
Use A/B testing to optimize subject lines, content, and timing for better engagement.
Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.
Automate email workflows...
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Top trending discussions
posted on 19 Nov 2024
Lifecycle hooks in Angular are methods that allow you to tap into the lifecycle of a component or directive.
Lifecycle hooks include ngOnInit, ngOnChanges, ngDoCheck, ngOnDestroy, etc.
ngOnInit is used for initialization logic, ngOnChanges is used for reacting to input changes, ngOnDestroy is used for cleanup tasks, etc.
Example: ngOnInit() { console.log('Component initialized'); }
posted on 23 Jan 2025
Use a subquery to find the third highest salary from the employees table in MySQL.
Use a subquery to select distinct salaries from the employees table.
Order the salaries in descending order and use LIMIT to get the third highest salary.
Example: SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 2, 1;
Steps to connect to a database involve specifying the database type, providing credentials, and establishing a connection.
Specify the type of database you want to connect to (e.g. MySQL, PostgreSQL, MongoDB).
Provide the necessary credentials such as username and password.
Establish a connection using a programming language or tool like JDBC, ODBC, or ORM frameworks.
I was interviewed before Jan 2024.
A 60-minute aptitude test.
In this round, you will receive multiple questions tailored to your area of expertise.
posted on 28 Aug 2024
I applied via Referral and was interviewed in Jul 2024. There was 1 interview round.
I am currently responsible for managing client relationships and project timelines in my current company.
Managing client relationships by ensuring clear communication and addressing any concerns or issues promptly
Creating and maintaining project timelines to ensure deliverables are met on time
Collaborating with cross-functional teams to ensure project success
Providing regular updates to clients on project progress and
SAP PP involves business processes related to production planning and control.
Creation of production orders
Material requirement planning
Capacity planning
Shop floor execution
Production scheduling
The org structure of SAP refers to the way in which SAP organizes its internal departments, teams, and reporting relationships.
SAP typically follows a matrix organizational structure, with functional departments (such as sales, marketing, finance) and project teams working together.
The org structure can vary depending on the size and complexity of the organization, as well as the specific industry or market focus.
SAP m...
posted on 7 Sep 2024
A palindrome code is a program that checks if a given string reads the same forwards and backwards.
Create a function that takes a string as input
Reverse the string and compare it to the original string
Return true if they are the same, false otherwise
A cursor is a database object used to retrieve and manipulate data in a database management system.
A cursor allows for sequential processing of query results one row at a time.
It can be used to update or delete specific rows in a result set.
Cursors are commonly used in stored procedures and triggers.
Example: DECLARE cursor_name CURSOR FOR SELECT column1, column2 FROM table_name;
Query using listagg function to concatenate values into a single string
Use the listagg function followed by the column name and delimiter in parentheses
Specify the order by clause if needed
Can be used in SQL queries to display aggregated data
I applied via campus placement at SRM Institute of Science & Technology, Chennai
Artifical Intelligence
Interview experience
Software Engineer
3.9k
salaries
| ₹2.4 L/yr - ₹10 L/yr |
Senior Software Engineer
3.8k
salaries
| ₹6 L/yr - ₹23 L/yr |
Technical Specialist
1.5k
salaries
| ₹9.5 L/yr - ₹34 L/yr |
Softwaretest Engineer
829
salaries
| ₹2.8 L/yr - ₹9 L/yr |
Senior Technical Specialist
711
salaries
| ₹11.5 L/yr - ₹40.2 L/yr |
TCS
Infosys
Wipro
HCLTech