AmbitionBox

AmbitionBox

Search

Interview Questions

  • Reviews
  • Salaries
  • Interview Questions
  • About Company
  • Benefits
  • Jobs
  • Office Photos
  • Community
  • Home
  • Companies
  • Reviews
  • Salaries
  • Jobs
  • Interviews
  • Salary Calculator
  • Awards 2024
  • Campus Placements
  • Practice Test
  • Compare Companies
+ Contribute
notification
notification
Login
  • Home
  • Communities
  • Companies
    • Companies

      Discover best places to work

    • Compare Companies

      Compare & find best workplace

    • Add Office Photos

      Bring your workplace to life

    • Add Company Benefits

      Highlight your company's perks

  • Reviews
    • Company reviews

      Read reviews for 6L+ companies

    • Write a review

      Rate your former or current company

  • Salaries
    • Browse salaries

      Discover salaries for 6L+ companies

    • Salary calculator

      Calculate your take home salary

    • Are you paid fairly?

      Check your market value

    • Share your salary

      Help other jobseekers

    • Gratuity calculator

      Check your gratuity amount

    • HRA calculator

      Check how much of your HRA is tax-free

    • Salary hike calculator

      Check your salary hike

  • Interviews
    • Company interviews

      Read interviews for 40K+ companies

    • Share interview questions

      Contribute your interview questions

  • Jobs
  • Awards
    pink star
    VIEW WINNERS
    • ABECA 2025
      VIEW WINNERS

      AmbitionBox Employee Choice Awards - 4th Edition

    • ABECA 2024

      AmbitionBox Employee Choice Awards - 3rd Edition

    • AmbitionBox Best Places to Work 2022

      2nd Edition

    Participate in ABECA 2026 right icon dark
For Employers
Upload Button Icon Add office photos
logo
Engaged Employer

i

This company page is being actively managed by Aujas Cybersecurity-NuSummit company Team. If you also belong to the team, you can get access from here

Aujas Cybersecurity-NuSummit company Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 286 Reviews

Play video Play video Video summary
  • About
  • Reviews
    286
  • Salaries
    2.1k
  • Interviews
    22
  • Jobs
    94
  • Benefits
    12
  • Photos
    161

Filter interviews by

Aujas Cybersecurity-NuSummit company Interview Questions and Answers

Updated 2 Jun 2025
Popular Designations

12 Interview questions

An IT Security Analyst was asked 10mo ago
Q. Where can insecure deserialization be performed?
Ans. 

Insecure deserialization can occur in various places such as web applications, APIs, and network services.

  • Web applications that accept user input and deserialize it without proper validation

  • APIs that deserialize data from external sources without proper security measures

  • Network services that deserialize data from untrusted sources

View all IT Security Analyst interview questions
An IT Security Analyst was asked 10mo ago
Q. If you encounter a buffer overflow attack, how would you validate it?
Ans. 

To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.

  • Analyze the program's memory usage to identify any unexpected changes or overflows

  • Check for abnormal behavior such as crashes, unexpected output, or system instability

  • Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer ove...

View all IT Security Analyst interview questions
A Trainee was asked 12mo ago
Q. Write a basic SQL query.
Ans. 

An SQL query is a command used to interact with databases, allowing data retrieval, insertion, updating, and deletion.

  • SELECT statement retrieves data from a database. Example: SELECT * FROM employees;

  • WHERE clause filters records. Example: SELECT * FROM employees WHERE age > 30;

  • INSERT INTO adds new records. Example: INSERT INTO employees (name, age) VALUES ('John', 28);

  • UPDATE modifies existing records. Example: ...

View all Trainee interview questions
A Cyber Security Consultant was asked
Q. What is your experience with VAPT, and what does your day-to-day process look like?
Ans. 

VAPT involves identifying vulnerabilities in systems through testing and assessment to enhance security measures.

  • VAPT stands for Vulnerability Assessment and Penetration Testing.

  • Vulnerability Assessment identifies weaknesses in systems, while Penetration Testing simulates attacks.

  • Daily tasks may include scanning networks for vulnerabilities using tools like Nessus or OpenVAS.

  • Conducting manual testing to exploit vu...

View all Cyber Security Consultant interview questions
A Network Security Engineer was asked
Q. What is a firewall?
Ans. 

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Acts as a barrier between a trusted internal network and untrusted external network

  • Can be hardware-based or software-based

  • Filters traffic based on IP addresses, ports, protocols, and other criteria

  • Examples include Cisco ASA, Palo Alto Networks, and pfSense

View all Network Security Engineer interview questions
A Network Security Engineer was asked
Q. What is the use of port 443?
Ans. 

Port 443 is used for secure HTTP (HTTPS) communication over the internet.

  • Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.

  • It is commonly used for secure communication between web browsers and servers.

  • HTTPS ensures that data transmitted over the internet is encrypted and secure.

  • Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive in...

View all Network Security Engineer interview questions
A Network Security Engineer was asked
Q. What privileges does the Nessus security tool have?
Ans. 

Nessus security tool provides vulnerability scanning and assessment capabilities for network security.

  • Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.

  • It can identify misconfigurations, missing patches, and potential security threats.

  • Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.

View all Network Security Engineer interview questions
Are these interview questions helpful?
A Network Security Engineer was asked
Q. What are the port numbers for TCP, UDP, FTP, HTTPS, and HTTP?
Ans. 

Common network protocols and their associated port numbers for TCP, UDP, FTP, HTTPS, and HTTP.

  • TCP (Transmission Control Protocol) is used for reliable communication, typically on port 80 for HTTP.

  • UDP (User Datagram Protocol) is used for faster, connectionless communication, often on port 53 for DNS.

  • FTP (File Transfer Protocol) operates on TCP port 21 for control and port 20 for data transfer.

  • HTTPS (Hypertext Trans...

View all Network Security Engineer interview questions
A Cyber Security Consultant was asked
Q. What is the difference between Privilege Escalation (PE) and Insecure Direct Object Reference (IDOR)?
Ans. 

PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.

  • PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.

  • IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authori...

View all Cyber Security Consultant interview questions
A Cyber Security Consultant was asked
Q. What is Blind SQL Injection?
Ans. 

Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.

  • The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.

  • Blind SQL Injection can be time-based or boolean-based.

  • Time-based Blind SQL Injection involves sending a query that will cause a delay in the applicatio...

View all Cyber Security Consultant interview questions
1 2

Aujas Cybersecurity-NuSummit company Interview Experiences

22 interviews found

IT Security Analyst Interview Questions & Answers

user image Anonymous

posted on 14 Aug 2024

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Where we can perform Insecure Deserialization?
  • Ans. 

    Insecure deserialization can occur in various places such as web applications, APIs, and network services.

    • Web applications that accept user input and deserialize it without proper validation

    • APIs that deserialize data from external sources without proper security measures

    • Network services that deserialize data from untrusted sources

  • Answered by AI
    Add your answer
  • Q2. If you got a bufferoverflow atack how you will validate it?
  • Ans. 

    To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.

    • Analyze the program's memory usage to identify any unexpected changes or overflows

    • Check for abnormal behavior such as crashes, unexpected output, or system instability

    • Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer overflow

    • ...

  • Answered by AI
    Add your answer

Interview Preparation Tips

Interview preparation tips for other job seekers - For Experienced employees they are asking in-dept concepts of network pentest and mostly in web pentesting. So please be prepared for that.

IT Security Analyst Interview Questions asked at other Companies

Q1. Are you familiar with nmap? Please write down the nmap syntax for a full port TCP Scan.
View answer (1)
Anonymous

Security Analyst Interview Questions & Answers

user image Anonymous

posted on 17 Apr 2025

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview in Oct 2024, where I was asked the following questions.

  • Q1. TCP and UDP FIREWALL
  • Add your answer
  • Q2. ALL KNOWN PORT NUMBER
  • Ans. 

    Known port numbers are standardized network ports used for specific protocols and services in computer networking.

    • Port 80: HTTP (Hypertext Transfer Protocol) for web traffic.

    • Port 443: HTTPS (HTTP Secure) for secure web traffic.

    • Port 21: FTP (File Transfer Protocol) for file transfers.

    • Port 22: SSH (Secure Shell) for secure remote login.

    • Port 25: SMTP (Simple Mail Transfer Protocol) for email sending.

  • Answered by AI
    Add your answer
  • Q3. DOS AND DDOS
  • Add your answer
  • Q4. SOCIAL ENGINEERING
  • Add your answer
  • Q5. MALWARE, 3WAY HANDSHAKING
  • Add your answer
  • Q6. CASE STUDY of any events
  • Add your answer

Security Analyst Interview Questions asked at other Companies

Q1. How do you test a web application? What is CSRF and SSRF? What is LDAP injection? How does namp work while port scanning? (Result - open/filtered/closed) How does ssl work? Suppose a proxy server(Burpsuite) is in b/w server and client so wh... read more
View answer (2)
Anonymous

Associate Director Delivery Interview Questions & Answers

user image Shailendra Singh Rathore

posted on 26 Jul 2024

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Previous and current Experience
  • Add your answer
  • Q2. Interest to work from Mumbai Location
  • Ans. 

    I am interested in working from the Mumbai location due to the vibrant work culture and opportunities for growth.

    • Exciting work culture in Mumbai

    • Opportunities for growth and development

    • Proximity to key clients and projects

    • Networking opportunities in a major business hub

  • Answered by AI
    Add your answer
Round 2 - Case Study 

Many scenario based questions, and how to handle team, customers and peers

Interview Preparation Tips

Interview preparation tips for other job seekers - Be u what u are, dont be someonelese.

Associate Director Delivery Interview Questions asked at other Companies

Q1. What ID theories are relevant to adult learning. How do they differ from k12
View answer (1)
Anonymous

Cyber Security Consultant Interview Questions & Answers

user image Er.Abhishek Patil

posted on 12 Dec 2023

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About VAPT and day to day process
  • Ans. 

    VAPT involves identifying vulnerabilities in systems through testing and assessment to enhance security measures.

    • VAPT stands for Vulnerability Assessment and Penetration Testing.

    • Vulnerability Assessment identifies weaknesses in systems, while Penetration Testing simulates attacks.

    • Daily tasks may include scanning networks for vulnerabilities using tools like Nessus or OpenVAS.

    • Conducting manual testing to exploit vulnera...

  • Answered by AI
    Add your answer
Round 3 - Technical 

(1 Question)

  • Q1. Deep about VA tools and management and CIS benchmark
  • Add your answer
Round 4 - Technical 

(1 Question)

  • Q1. Client round about VA
  • Add your answer
Round 5 - HR 

(1 Question)

  • Q1. Final round HR process strength weakness. About compny previous organizations why left organization.
  • Add your answer

Cyber Security Consultant Interview Questions asked at other Companies

Q1. What is the role of a firewall, and how can it be used efficiently to improve security?
View answer (1)
Anonymous

Trainee Interview Questions & Answers

user image Anonymous

posted on 12 Jun 2024

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - Aptitude Test 

It was an online mcq test with coding question as well

Round 2 - Technical 

(2 Questions)

  • Q1. Write an sql query. It was very basic
  • Ans. 

    An SQL query is a command used to interact with databases, allowing data retrieval, insertion, updating, and deletion.

    • SELECT statement retrieves data from a database. Example: SELECT * FROM employees;

    • WHERE clause filters records. Example: SELECT * FROM employees WHERE age > 30;

    • INSERT INTO adds new records. Example: INSERT INTO employees (name, age) VALUES ('John', 28);

    • UPDATE modifies existing records. Example: UPDAT...

  • Answered by AI
    Add your answer
  • Q2. About project, what was the project?
  • Add your answer

Trainee Interview Questions asked at other Companies

Q1. Ques1: There is a big file of words which is dynamically changing. We are continuously adding some words into it. How would you keep track of top 10 trending words at each moment? Ques2:Write a function that returns the length of the longes... read more
View answer (2)
Anonymous

Network Security Engineer Interview Questions & Answers

user image Mukesh Verma

posted on 17 Sep 2023

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(5 Questions)

  • Q1. What is the privilege of nessus security tool
  • Ans. 

    Nessus security tool provides vulnerability scanning and assessment capabilities for network security.

    • Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.

    • It can identify misconfigurations, missing patches, and potential security threats.

    • Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.

  • Answered by AI
    View 1 more answer
  • Q2. What is privilege of windows and linux
  • Ans. 

    Privilege in Windows and Linux refers to the level of access and control a user or process has over system resources.

    • Privilege levels in Windows are typically categorized as Administrator, Standard User, and Guest.

    • In Linux, privilege levels are determined by user accounts and groups, with root being the highest level of privilege.

    • Windows uses User Account Control (UAC) to manage privileges and prevent unauthorized chan...

  • Answered by AI
    View 1 more answer
  • Q3. What is use of 443 port
  • Ans. 

    Port 443 is used for secure HTTP (HTTPS) communication over the internet.

    • Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.

    • It is commonly used for secure communication between web browsers and servers.

    • HTTPS ensures that data transmitted over the internet is encrypted and secure.

    • Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive informa...

  • Answered by AI
    Add your answer
  • Q4. Tco,udp,ftp https,http port number?
  • Ans. 

    Common network protocols and their associated port numbers for TCP, UDP, FTP, HTTPS, and HTTP.

    • TCP (Transmission Control Protocol) is used for reliable communication, typically on port 80 for HTTP.

    • UDP (User Datagram Protocol) is used for faster, connectionless communication, often on port 53 for DNS.

    • FTP (File Transfer Protocol) operates on TCP port 21 for control and port 20 for data transfer.

    • HTTPS (Hypertext Transfer P...

  • Answered by AI
    Add your answer
  • Q5. What is the firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Can be hardware-based or software-based

    • Filters traffic based on IP addresses, ports, protocols, and other criteria

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI
    Add your answer

Interview Preparation Tips

Interview preparation tips for other job seekers - cyber security is big concept use a single partial job in security like penetration testing ,hardware firewall like palo alto , Cisco asa

Skills evaluated in this interview

Network Security Engineer Interview Questions asked at other Companies

Q1. Which protocols are used in the transport layer of the OSI model?
View answer (1)
Anonymous

Security Analyst 2 Interview Questions & Answers

user image Anonymous

posted on 2 Jun 2025

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview before Jun 2024, where I was asked the following questions.

  • Q1. Latest trends in the security posture
  • Ans. 

    Organizations are enhancing their security posture through advanced technologies, threat intelligence, and proactive measures.

    • Increased adoption of Zero Trust architecture, ensuring strict identity verification for every user and device.

    • Growing use of AI and machine learning for threat detection and response, such as automated anomaly detection.

    • Emphasis on security awareness training for employees to mitigate human err...

  • Answered by AI
    Add your answer
  • Q2. Discussed on ransomware and endpoint security
  • Add your answer

Security Analyst 2 Interview Questions asked at other Companies

Q1. How would you handle a brute force attack?
View answer (1)
Anonymous

Analyst Interview Questions & Answers

user image Anonymous

posted on 7 Mar 2023

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Feb 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. Sales process, B2B/B2C, Managed services, cybersecurity
  • Add your answer
Round 3 - Technical 

(1 Question)

  • Q1. Sales cycle, target, knowledge on software sales, cybersecurity
  • Add your answer
Round 4 - HR 

(2 Questions)

  • Q1. About company, Reason of leaving last company, screening questions
  • Add your answer
  • Q2. Salary expectations,
  • Add your answer

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well, go through Job description, learn about company mission and vision

Analyst Interview Questions asked at other Companies

Q1. N-th Fibonacci Number Problem Statement Given an integer ‘N’, your task is to find and return the N’th Fibonacci number using matrix exponentiation. Since the answer can be very large, return the answer modulo 10^9 + 7. Formula: F(n) = F(n-... read more
View answer (1)
Anonymous

Cyber Security Consultant Interview Questions & Answers

user image Anonymous

posted on 13 Apr 2023

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
No response

I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. What is Blind SQL Injection?
  • Ans. 

    Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.

    • The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.

    • Blind SQL Injection can be time-based or boolean-based.

    • Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...

  • Answered by AI
    Add your answer
  • Q2. Difference between PE & IDOR
  • Ans. 

    PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.

    • PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.

    • IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...

  • Answered by AI
    Add your answer
  • Q3. CSRF Remediation
  • Add your answer

Skills evaluated in this interview

Cyber Security Consultant Interview Questions asked at other Companies

Q1. What is the role of a firewall, and how can it be used efficiently to improve security?
View answer (1)
Anonymous

Lead Consultant Interview Questions & Answers

user image sivaramakrishnan s

posted on 22 Aug 2023

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. More questions on the IAM solutions and implementation
  • Add your answer
  • Q2. What are all the tools you worked
  • Add your answer
  • Q3. MFA ,Symantec and Datacollection tools
  • Add your answer
Round 3 - HR 

(1 Question)

  • Q1. Salary discussion and basic about background
  • Add your answer

Interview Preparation Tips

Interview preparation tips for other job seekers - Learn IAM tools

Lead Consultant Interview Questions asked at other Companies

Q1. Pdc emulator and errors how it can be fixed, how to work on VMware disk consolidation error, types for migration which I was involved and issue seen example cross over migration and aws SMS connector, azure sso
View answer (1)
Anonymous

Top trending discussions

View All
Interview Tips & Stories
2w
timepasstiwari
·
A Digital Markter
ChatGPT prepped me HARD for my interview!
Spent like two hours on chatgpt yesterday prepping for an interview. First, the usual, copy-pasted my resume and the job description, telling it to "upload this to your memory 'cause we are going to talk about it later". Then I grilled it with questions about stuff I didn't get in the job spec, and chatgpt helped me figure things out. I asked it to list the four or five key things they are looking for in the role. Then I told chatgpt to quiz me with ten questions, one at a time, to help me think about how I have gained experience in those areas. After the ten questions, it gave me strengths/weaknesses and a summary. Finally, I had chatgpt summarize each of my answers into three bullet points. Now have got a list of stories ready to go for any interview. No matter the question, I can steer the convo toward one of these success stories.
Got a question about Aujas Cybersecurity-NuSummit company?
Ask anonymously on communities.
More about working at Aujas Cybersecurity-NuSummit company
  • HQ - Bangalore/Bengaluru, Karnataka, India
  • IT Services & Consulting
  • 501-1k Employees (India)
  • Emerging Technologies

Aujas Cybersecurity-NuSummit company Interview FAQs

How many rounds are there in Aujas Cybersecurity-NuSummit company interview?
Aujas Cybersecurity-NuSummit company interview process usually has 2-3 rounds. The most common rounds in the Aujas Cybersecurity-NuSummit company interview process are Technical, Resume Shortlist and HR.
How to prepare for Aujas Cybersecurity-NuSummit company interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Aujas Cybersecurity-NuSummit company. The most common topics and skills that interviewers at Aujas Cybersecurity-NuSummit company expect are Information Security, Python, Perl, Java and Penetration Testing.
What are the top questions asked in Aujas Cybersecurity-NuSummit company interview?

Some of the top questions asked at the Aujas Cybersecurity-NuSummit company interview -

  1. If you got a bufferoverflow atack how you will validate ...read more
  2. what is the privilege of nessus security t...read more
  3. Where we can perform Insecure Deserializati...read more
What are the most common questions asked in Aujas Cybersecurity-NuSummit company HR round?

The most common HR questions asked in Aujas Cybersecurity-NuSummit company interview are -

  1. What are your salary expectatio...read more
  2. What is your family backgrou...read more
  3. Tell me about yourse...read more
How long is the Aujas Cybersecurity-NuSummit company interview process?

The duration of Aujas Cybersecurity-NuSummit company interview process can vary, but typically it takes about less than 2 weeks to complete.

Tell us how to improve this page.

Aujas Cybersecurity-NuSummit company Interviews By Designations

  • Aujas Cybersecurity-NuSummit company Senior Consultant Interview Questions
  • Aujas Cybersecurity-NuSummit company Cyber Security Consultant Interview Questions
  • Aujas Cybersecurity-NuSummit company Network Security Engineer Interview Questions
  • Aujas Cybersecurity-NuSummit company Analyst Interview Questions
  • Aujas Cybersecurity-NuSummit company Security Consultant Interview Questions
  • Aujas Cybersecurity-NuSummit company Lead Consultant Interview Questions
  • Aujas Cybersecurity-NuSummit company Consultant Interview Questions
  • Aujas Cybersecurity-NuSummit company Associate Information Technology Consultant Interview Questions
  • Show more
  • Aujas Cybersecurity-NuSummit company Information Security Consultant Interview Questions
  • Aujas Cybersecurity-NuSummit company Trainee Interview Questions

Interview Questions for Popular Designations

  • Senior Consultant Interview Questions
  • Executive Interview Questions
  • Senior Executive Interview Questions
  • Intern Interview Questions
  • Sales Executive Interview Questions
  • Senior Engineer Interview Questions
  • Consultant Interview Questions
  • Associate Software Engineer Interview Questions
  • Show more
  • Java Developer Interview Questions
  • Sales Officer Interview Questions

Overall Interview Experience Rating

4.5/5

based on 25 interview experiences

Difficulty level

Easy 6%
Moderate 76%
Hard 18%

Duration

Less than 2 weeks 69%
2-4 weeks 25%
4-6 weeks 6%
View more

Interview Questions from Similar Companies

ITC Infotech
ITC Infotech Interview Questions
3.7
 • 366 Interviews
Newgen Software Technologies
Newgen Software Technologies Interview Questions
3.8
 • 190 Interviews
3i Infotech
3i Infotech Interview Questions
3.4
 • 149 Interviews
Happiest Minds Technologies
Happiest Minds Technologies Interview Questions
3.6
 • 139 Interviews
Microland
Microland Interview Questions
3.5
 • 137 Interviews
Test Yantra Software Solutions
Test Yantra Software Solutions Interview Questions
3.1
 • 131 Interviews
Sify Technologies
Sify Technologies Interview Questions
3.8
 • 128 Interviews
Mastek
Mastek Interview Questions
3.6
 • 127 Interviews
Maveric Systems
Maveric Systems Interview Questions
3.5
 • 124 Interviews
Sonata Software
Sonata Software Interview Questions
3.4
 • 122 Interviews
View all

Aujas Cybersecurity-NuSummit company Reviews and Ratings

based on 286 reviews

3.7/5

Rating in categories

3.6

Skill development

3.6

Work-life balance

3.5

Salary

3.7

Job security

3.5

Company culture

3.2

Promotions

3.4

Work satisfaction

Explore 286 Reviews and Ratings
Jobs at Aujas Cybersecurity-NuSummit company
Aujas Cybersecurity-NuSummit company
Aujas Cybersecurity - Security Operations Manager (8-10 yrs)

8-10 Yrs

Not Disclosed

Aujas Cybersecurity-NuSummit company
Aujas Cybersecurity - SailPoint Developer - IdentityIQ Solutions (2-12 yrs)

2-12 Yrs

Not Disclosed

Aujas Cybersecurity-NuSummit company
Aujas - Human Resources Business Partner (8-10 yrs)

8-10 Yrs

Not Disclosed

Explore more jobs
Aujas Cybersecurity-NuSummit company Salaries in India
Consultant
386 salaries
unlock blur

₹4.6 L/yr - ₹18.4 L/yr

Senior Consultant
262 salaries
unlock blur

₹7 L/yr - ₹26.9 L/yr

Associate Consultant
227 salaries
unlock blur

₹2.5 L/yr - ₹10 L/yr

Security Consultant
123 salaries
unlock blur

₹5 L/yr - ₹15 L/yr

Lead Consultant
87 salaries
unlock blur

₹13.9 L/yr - ₹36 L/yr

Explore more salaries
Compare Aujas Cybersecurity-NuSummit company with
ITC Infotech

ITC Infotech

3.7
Compare
3i Infotech

3i Infotech

3.4
Compare
Sify Technologies

Sify Technologies

3.8
Compare
Microland

Microland

3.5
Compare
Popular Calculators
Are you paid fairly?
Monthly In-hand Salary Calculator
Gratuity Calculator
HRA Calculator
Salary Hike Calculator
  • Home >
  • Interviews >
  • Aujas Cybersecurity-NuSummit company Interview Questions
write
Share an Interview
Stay ahead in your career. Get AmbitionBox app
Awards Banner

Trusted by over 1.5 Crore job seekers to find their right fit company

80 Lakh+

Reviews

4 Crore+

Salaries

10 Lakh+

Interviews

1.5 Crore+

Users

Contribute
Search

Interview Questions

  • Reviews
  • Salaries
  • Interview Questions
  • About Company
  • Benefits
  • Jobs
  • Office Photos
  • Community
Users/Jobseekers
  • Companies
  • Reviews
  • Salaries
  • Jobs
  • Interviews
  • Salary Calculator
  • Practice Test
  • Compare Companies
Employers
  • Create a new company
  • Update company information
  • Respond to reviews
  • Invite employees to review
  • AmbitionBox Offering for Employers
  • AmbitionBox Employers Brochure
AmbitionBox Awards
  • ABECA 2025 winners awaited tag
  • Participate in ABECA 2026
  • Invite employees to rate
AmbitionBox
  • About Us
  • Our Team
  • Email Us
  • Blog
  • FAQ
  • Credits
  • Give Feedback
Terms & Policies
  • Privacy
  • Grievances
  • Terms of Use
  • Summons/Notices
  • Community Guidelines
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter