Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Aujas Cybersecurity-NuSummit company Team. If you also belong to the team, you can get access from here

Aujas Cybersecurity-NuSummit company Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Aujas Cybersecurity-NuSummit company Interview Questions and Answers

Updated 25 Jul 2025
Popular Designations

31 Interview questions

A Cyber Security Analyst was asked 2w ago
Q. How do you configure a Nessus Scan?
Ans. 

Configuring a Nessus scan involves setting up targets, selecting scan types, and scheduling scans for vulnerability assessment.

  • 1. Log in to the Nessus interface and navigate to the 'Scans' tab.

  • 2. Click on 'New Scan' to create a new scan configuration.

  • 3. Choose a scan template, such as 'Basic Network Scan' or 'Advanced Scan'.

  • 4. Enter the target IP addresses or hostnames in the 'Targets' section.

  • 5. Configure scan se...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. What is CVE?
Ans. 

CVE stands for Common Vulnerabilities and Exposures, a system for identifying and cataloging security vulnerabilities.

  • CVE provides a reference-method for publicly known information-security vulnerabilities and exposures.

  • Each CVE entry includes a unique identifier, a description, and references to related vulnerability reports.

  • For example, CVE-2021-34527 refers to a critical vulnerability in Microsoft Windows Print...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. What is a Configuration Audit?
Ans. 

Configuration audit is the process of reviewing and verifying system configurations for compliance and security standards.

  • Ensures systems are configured according to security policies.

  • Identifies unauthorized changes or vulnerabilities in configurations.

  • Examples include checking firewall rules, user permissions, and software settings.

  • Can be automated using tools like Nessus or OpenVAS for efficiency.

  • Regular audits ...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. What is the difference between Vulnerability Assessment and Penetration Testing?
Ans. 

Vulnerability Assessment identifies weaknesses; Penetration Testing exploits them to assess security strength.

  • Vulnerability Assessment is a systematic review of security weaknesses in an information system.

  • Penetration Testing simulates an attack to exploit vulnerabilities and assess the system's defenses.

  • Example of Vulnerability Assessment: Using tools like Nessus to scan for known vulnerabilities.

  • Example of Penet...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. How would you explain a Vulnerability Scan Report to someone with no IT background?
Ans. 

A vulnerability scan report identifies security weaknesses in systems, helping organizations improve their defenses.

  • A vulnerability scan is like a health check for your computer systems, identifying potential issues before they can be exploited.

  • The report lists vulnerabilities, which are weaknesses that could be exploited by attackers, similar to how a doctor identifies health risks.

  • Each vulnerability is categoriz...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. What steps are involved in a Nessus Scan?
Ans. 

Nessus Scan involves several steps to identify vulnerabilities in systems and networks effectively.

  • 1. Define the Scope: Determine which systems or networks to scan, e.g., specific IP ranges or subnets.

  • 2. Configure the Scan: Set up scan parameters, including credentials for authenticated scans to get deeper insights.

  • 3. Select Scan Type: Choose from various scan types like Basic Network Scan, Web Application Tests, ...

View all Cyber Security Analyst interview questions
Be interview-ready. Browse the most asked HR questions.
illustration image
A Cyber Security Analyst was asked 2w ago
Q. What is the difference between an Authenticated Scan and an Unauthenticated Scan?
Ans. 

Authenticated scans use valid credentials to assess security, while unauthenticated scans do not.

  • Authenticated scans provide a deeper insight into vulnerabilities by simulating an insider attack.

  • Unauthenticated scans assess the security posture from an external perspective, identifying exposed services.

  • Example of authenticated scan: Using admin credentials to check for misconfigurations in a web application.

  • Exampl...

View all Cyber Security Analyst interview questions
Are these interview questions helpful?
A Cyber Security Analyst was asked 2w ago
Q. What are the reasons for the failure of a scan?
Ans. 

Scan failures can occur due to various technical and operational issues affecting the scanning process.

  • Network connectivity issues can prevent the scanner from accessing target systems.

  • Insufficient permissions may lead to incomplete scans; for example, a lack of admin rights on a server.

  • Outdated scanning tools may not recognize new vulnerabilities or systems.

  • Firewall or security settings might block the scanning t...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. What is Risk Assessment?
Ans. 

Risk assessment is the process of identifying, evaluating, and prioritizing risks to minimize their impact on an organization.

  • Identify assets: Determine what needs protection, such as sensitive data or critical systems.

  • Evaluate threats: Analyze potential threats like cyber attacks, natural disasters, or insider threats.

  • Assess vulnerabilities: Identify weaknesses in systems or processes that could be exploited.

  • Dete...

View all Cyber Security Analyst interview questions
A Cyber Security Analyst was asked 2w ago
Q. What are the differences between CVSS2 and CVSS3?
Ans. 

CVSS2 and CVSS3 are frameworks for assessing the severity of security vulnerabilities, with CVSS3 offering more granularity.

  • CVSS2 has a base score range of 0-10, while CVSS3 expands this to include more metrics, allowing for a more nuanced score.

  • CVSS3 introduces new metrics like 'Exploit Code Maturity' and 'Remediation Level', which help in understanding the exploitability of vulnerabilities.

  • CVSS3 separates 'User ...

View all Cyber Security Analyst interview questions

Aujas Cybersecurity-NuSummit company Interview Experiences

25 interviews found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Sep 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

Just basic knowledge of your profile

Round 3 - Technical 

(4 Questions)

  • Q1. Little more detailed but still only the basics.
  • Q2. HTTP cookie attributes
  • Q3. Security Headers
  • Q4. Owasp Top 10 for web, api and mobile
  • Ans. 

    OWASP Top 10 is a list of the top 10 most critical security risks for web, API, and mobile applications.

    • Injection: SQL injection, NoSQL injection, Command injection

    • Broken Authentication: Weak passwords, Session management issues

    • Sensitive Data Exposure: Insecure data storage, Lack of encryption

    • XML External Entities (XXE): Parsing XML input from untrusted sources

    • Broken Access Control: Unauthorized access to resources

    • Secu...

  • Answered by AI
Round 4 - HR 

(1 Question)

  • Q1. Salary negotiations

Interview Preparation Tips

Interview preparation tips for other job seekers - Just be confident and stay promising in your answers.

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I appeared for an interview in Jun 2025, where I was asked the following questions.

  • Q1. Default Port for Nessus Login, Linux Remote Login, Windows Remote Login.
  • Ans. 

    Default ports for Nessus, Linux, and Windows remote logins are essential for network security and management.

    • Nessus Login: Default port is 8834, used for web-based interface access.

    • Linux Remote Login: Default port is 22, used for SSH (Secure Shell) connections.

    • Windows Remote Login: Default port is 3389, used for Remote Desktop Protocol (RDP).

  • Answered by AI
  • Q2. What is Rule Based Scan?
  • Ans. 

    A Rule Based Scan uses predefined rules to identify vulnerabilities or threats in systems and networks.

    • Utilizes a set of rules or signatures to detect known threats.

    • Commonly used in antivirus software to identify malware.

    • Example: A rule may specify that files with certain extensions are suspicious.

    • Can be applied in network security to monitor traffic patterns.

    • Example: Rules can flag unusual login attempts based on IP a...

  • Answered by AI
  • Q3. Difference Between CVSS2 and CVSS3?
  • Ans. 

    CVSS2 and CVSS3 are frameworks for assessing the severity of security vulnerabilities, with CVSS3 offering more granularity.

    • CVSS2 has a base score range of 0-10, while CVSS3 expands this to include more metrics, allowing for a more nuanced score.

    • CVSS3 introduces new metrics like 'Exploit Code Maturity' and 'Remediation Level', which help in understanding the exploitability of vulnerabilities.

    • CVSS3 separates 'User Inter...

  • Answered by AI
  • Q4. What is Risk Assessment?
  • Ans. 

    Risk assessment is the process of identifying, evaluating, and prioritizing risks to minimize their impact on an organization.

    • Identify assets: Determine what needs protection, such as sensitive data or critical systems.

    • Evaluate threats: Analyze potential threats like cyber attacks, natural disasters, or insider threats.

    • Assess vulnerabilities: Identify weaknesses in systems or processes that could be exploited.

    • Determine...

  • Answered by AI
  • Q5. What are reasons for the failure of scan?
  • Ans. 

    Scan failures can occur due to various technical and operational issues affecting the scanning process.

    • Network connectivity issues can prevent the scanner from accessing target systems.

    • Insufficient permissions may lead to incomplete scans; for example, a lack of admin rights on a server.

    • Outdated scanning tools may not recognize new vulnerabilities or systems.

    • Firewall or security settings might block the scanning traffi...

  • Answered by AI
  • Q6. Difference between Authenticated Scan and Unauthenticated Scan.
  • Ans. 

    Authenticated scans use valid credentials to assess security, while unauthenticated scans do not.

    • Authenticated scans provide a deeper insight into vulnerabilities by simulating an insider attack.

    • Unauthenticated scans assess the security posture from an external perspective, identifying exposed services.

    • Example of authenticated scan: Using admin credentials to check for misconfigurations in a web application.

    • Example of ...

  • Answered by AI
  • Q7. Difference Between Vulnerability Assessment and Penetration Testing.
  • Ans. 

    Vulnerability Assessment identifies weaknesses; Penetration Testing exploits them to assess security strength.

    • Vulnerability Assessment is a systematic review of security weaknesses in an information system.

    • Penetration Testing simulates an attack to exploit vulnerabilities and assess the system's defenses.

    • Example of Vulnerability Assessment: Using tools like Nessus to scan for known vulnerabilities.

    • Example of Penetratio...

  • Answered by AI
  • Q8. What is Configuration Audit?
  • Ans. 

    Configuration audit is the process of reviewing and verifying system configurations for compliance and security standards.

    • Ensures systems are configured according to security policies.

    • Identifies unauthorized changes or vulnerabilities in configurations.

    • Examples include checking firewall rules, user permissions, and software settings.

    • Can be automated using tools like Nessus or OpenVAS for efficiency.

    • Regular audits help ...

  • Answered by AI
  • Q9. What is CVE?
  • Ans. 

    CVE stands for Common Vulnerabilities and Exposures, a system for identifying and cataloging security vulnerabilities.

    • CVE provides a reference-method for publicly known information-security vulnerabilities and exposures.

    • Each CVE entry includes a unique identifier, a description, and references to related vulnerability reports.

    • For example, CVE-2021-34527 refers to a critical vulnerability in Microsoft Windows Print Spoo...

  • Answered by AI
  • Q10. How to configure a Nessus Scan?
  • Ans. 

    Configuring a Nessus scan involves setting up targets, selecting scan types, and scheduling scans for vulnerability assessment.

    • 1. Log in to the Nessus interface and navigate to the 'Scans' tab.

    • 2. Click on 'New Scan' to create a new scan configuration.

    • 3. Choose a scan template, such as 'Basic Network Scan' or 'Advanced Scan'.

    • 4. Enter the target IP addresses or hostnames in the 'Targets' section.

    • 5. Configure scan setting...

  • Answered by AI
  • Q11. Which steps are involved in Nessus Scan?
  • Ans. 

    Nessus Scan involves several steps to identify vulnerabilities in systems and networks effectively.

    • 1. Define the Scope: Determine which systems or networks to scan, e.g., specific IP ranges or subnets.

    • 2. Configure the Scan: Set up scan parameters, including credentials for authenticated scans to get deeper insights.

    • 3. Select Scan Type: Choose from various scan types like Basic Network Scan, Web Application Tests, etc.

    • 4...

  • Answered by AI
  • Q12. How do you explain to a non IT guy about the Vulnerability Scan Report?
  • Ans. 

    A vulnerability scan report identifies security weaknesses in systems, helping organizations improve their defenses.

    • A vulnerability scan is like a health check for your computer systems, identifying potential issues before they can be exploited.

    • The report lists vulnerabilities, which are weaknesses that could be exploited by attackers, similar to how a doctor identifies health risks.

    • Each vulnerability is categorized by...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare Fundamentals of Cyber Security.
Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I appeared for an interview in Jun 2025, where I was asked the following questions.

  • Q1. Topics on java and security related
  • Q2. Behavioral and communication based
Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Where we can perform Insecure Deserialization?
  • Ans. 

    Insecure deserialization can occur in various places such as web applications, APIs, and network services.

    • Web applications that accept user input and deserialize it without proper validation

    • APIs that deserialize data from external sources without proper security measures

    • Network services that deserialize data from untrusted sources

  • Answered by AI
  • Q2. If you got a bufferoverflow atack how you will validate it?
  • Ans. 

    To validate a buffer overflow attack, I would analyze the program's memory usage, check for abnormal behavior, and use debugging tools.

    • Analyze the program's memory usage to identify any unexpected changes or overflows

    • Check for abnormal behavior such as crashes, unexpected output, or system instability

    • Use debugging tools like gdb or Valgrind to trace the program's execution and identify the source of the buffer overflow

    • ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - For Experienced employees they are asking in-dept concepts of network pentest and mostly in web pentesting. So please be prepared for that.
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I appeared for an interview in Dec 2024, where I was asked the following questions.

  • Q1. What are the possible security threats?
  • Ans. 

    Cybersecurity threats include malware, phishing, insider threats, and more, posing risks to data integrity and privacy.

    • Malware: Software designed to harm or exploit systems, e.g., ransomware encrypting files for ransom.

    • Phishing: Deceptive emails or messages tricking users into revealing sensitive information, e.g., fake bank alerts.

    • Insider Threats: Employees or contractors misusing access to compromise data, e.g., stea...

  • Answered by AI
  • Q2. Scenario based remediation for few checks in CIS benchmarks
  • Q3. Which configuration files are important for configuration audit
  • Ans. 

    Key configuration files for audits include system, application, and network settings to ensure compliance and security.

    • System configuration files (e.g., /etc/sysctl.conf on Linux) for kernel parameters.

    • Application configuration files (e.g., web server configs like httpd.conf) for security settings.

    • Network configuration files (e.g., /etc/network/interfaces) for network interface settings.

    • Database configuration files (e....

  • Answered by AI
  • Q4. What is the need for vulnerability management
  • Ans. 

    Vulnerability management is essential for identifying, assessing, and mitigating security weaknesses in systems and networks.

    • Proactive identification of vulnerabilities helps prevent potential breaches, such as the Equifax data breach in 2017.

    • Regular scanning and assessment ensure compliance with industry standards like PCI-DSS and HIPAA.

    • Prioritizing vulnerabilities based on risk helps allocate resources effectively, f...

  • Answered by AI
  • Q5. How can we decide the criticality of open points
  • Ans. 

    Assessing open points' criticality involves evaluating risk, impact, and likelihood of exploitation.

    • Identify the asset affected: Critical systems like databases or servers should be prioritized.

    • Evaluate the potential impact: Consider data loss, financial cost, or reputational damage.

    • Assess likelihood of exploitation: Analyze existing threats and vulnerabilities in the environment.

    • Consider regulatory requirements: Compl...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare for your role and study about client before interview.
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview in Oct 2024, where I was asked the following questions.

  • Q1. TCP and UDP FIREWALL
  • Q2. ALL KNOWN PORT NUMBER
  • Ans. 

    Known port numbers are standardized network ports used for specific protocols and services in computer networking.

    • Port 80: HTTP (Hypertext Transfer Protocol) for web traffic.

    • Port 443: HTTPS (HTTP Secure) for secure web traffic.

    • Port 21: FTP (File Transfer Protocol) for file transfers.

    • Port 22: SSH (Secure Shell) for secure remote login.

    • Port 25: SMTP (Simple Mail Transfer Protocol) for email sending.

  • Answered by AI
  • Q3. DOS AND DDOS
  • Q4. SOCIAL ENGINEERING
  • Q5. MALWARE, 3WAY HANDSHAKING
  • Q6. CASE STUDY of any events

Associate Director Delivery Interview Questions & Answers

user image Shailendra Singh Rathore

posted on 26 Jul 2024

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Previous and current Experience
  • Q2. Interest to work from Mumbai Location
  • Ans. 

    I am interested in working from the Mumbai location due to the vibrant work culture and opportunities for growth.

    • Exciting work culture in Mumbai

    • Opportunities for growth and development

    • Proximity to key clients and projects

    • Networking opportunities in a major business hub

  • Answered by AI
Round 2 - Case Study 

Many scenario based questions, and how to handle team, customers and peers

Interview Preparation Tips

Interview preparation tips for other job seekers - Be u what u are, dont be someonelese.

Cyber Security Consultant Interview Questions & Answers

user image Er.Abhishek Patil

posted on 12 Dec 2023

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. About VAPT and day to day process
  • Ans. 

    VAPT involves identifying vulnerabilities in systems through testing and assessment to enhance security measures.

    • VAPT stands for Vulnerability Assessment and Penetration Testing.

    • Vulnerability Assessment identifies weaknesses in systems, while Penetration Testing simulates attacks.

    • Daily tasks may include scanning networks for vulnerabilities using tools like Nessus or OpenVAS.

    • Conducting manual testing to exploit vulnera...

  • Answered by AI
Round 3 - Technical 

(1 Question)

  • Q1. Deep about VA tools and management and CIS benchmark
Round 4 - Technical 

(1 Question)

  • Q1. Client round about VA
Round 5 - HR 

(1 Question)

  • Q1. Final round HR process strength weakness. About compny previous organizations why left organization.

Trainee Interview Questions & Answers

user image Anonymous

posted on 12 Jun 2024

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Campus Placement and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - Aptitude Test 

It was an online mcq test with coding question as well

Round 2 - Technical 

(2 Questions)

  • Q1. Write an sql query. It was very basic
  • Ans. 

    An SQL query is a command used to interact with databases, allowing data retrieval, insertion, updating, and deletion.

    • SELECT statement retrieves data from a database. Example: SELECT * FROM employees;

    • WHERE clause filters records. Example: SELECT * FROM employees WHERE age > 30;

    • INSERT INTO adds new records. Example: INSERT INTO employees (name, age) VALUES ('John', 28);

    • UPDATE modifies existing records. Example: UPDAT...

  • Answered by AI
  • Q2. About project, what was the project?
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(5 Questions)

  • Q1. What is the privilege of nessus security tool
  • Ans. 

    Nessus security tool provides vulnerability scanning and assessment capabilities for network security.

    • Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.

    • It can identify misconfigurations, missing patches, and potential security threats.

    • Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.

  • Answered by AI
  • Q2. What is privilege of windows and linux
  • Ans. 

    Privilege in Windows and Linux refers to the level of access and control a user or process has over system resources.

    • Privilege levels in Windows are typically categorized as Administrator, Standard User, and Guest.

    • In Linux, privilege levels are determined by user accounts and groups, with root being the highest level of privilege.

    • Windows uses User Account Control (UAC) to manage privileges and prevent unauthorized chan...

  • Answered by AI
  • Q3. What is use of 443 port
  • Ans. 

    Port 443 is used for secure HTTP (HTTPS) communication over the internet.

    • Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.

    • It is commonly used for secure communication between web browsers and servers.

    • HTTPS ensures that data transmitted over the internet is encrypted and secure.

    • Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive informa...

  • Answered by AI
  • Q4. Tco,udp,ftp https,http port number?
  • Ans. 

    Common network protocols and their associated port numbers for TCP, UDP, FTP, HTTPS, and HTTP.

    • TCP (Transmission Control Protocol) is used for reliable communication, typically on port 80 for HTTP.

    • UDP (User Datagram Protocol) is used for faster, connectionless communication, often on port 53 for DNS.

    • FTP (File Transfer Protocol) operates on TCP port 21 for control and port 20 for data transfer.

    • HTTPS (Hypertext Transfer P...

  • Answered by AI
  • Q5. What is the firewall
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Can be hardware-based or software-based

    • Filters traffic based on IP addresses, ports, protocols, and other criteria

    • Examples include Cisco ASA, Palo Alto Networks, and pfSense

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - cyber security is big concept use a single partial job in security like penetration testing ,hardware firewall like palo alto , Cisco asa

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Selected Selected

I appeared for an interview before Jun 2024, where I was asked the following questions.

  • Q1. Latest trends in the security posture
  • Ans. 

    Organizations are enhancing their security posture through advanced technologies, threat intelligence, and proactive measures.

    • Increased adoption of Zero Trust architecture, ensuring strict identity verification for every user and device.

    • Growing use of AI and machine learning for threat detection and response, such as automated anomaly detection.

    • Emphasis on security awareness training for employees to mitigate human err...

  • Answered by AI
  • Q2. Discussed on ransomware and endpoint security

Top trending discussions

View All
Interview Hub
4d (edited)
anshitanegi
·
ex -
Planet Spark
When HR’s Chinese English made me drop the interview!
So, I talked to the HR yesterday about the interview. I asked Please send me the location But their English… bro I was shocked! It was like talking to someone jisne english nahi kuch ar hi seekh liya ho, if the HR’s English is this I can only imagine the rest of the company I decided to drop the interview with this chinese english😶‍🌫️
FeedCard Image
Got a question about Aujas Cybersecurity-NuSummit company?
Ask anonymously on communities.

Aujas Cybersecurity-NuSummit company Interview FAQs

How many rounds are there in Aujas Cybersecurity-NuSummit company interview?
Aujas Cybersecurity-NuSummit company interview process usually has 2-3 rounds. The most common rounds in the Aujas Cybersecurity-NuSummit company interview process are Technical, Resume Shortlist and HR.
How to prepare for Aujas Cybersecurity-NuSummit company interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Aujas Cybersecurity-NuSummit company. The most common topics and skills that interviewers at Aujas Cybersecurity-NuSummit company expect are Information Security, Linux, Python, Java and Perl.
What are the top questions asked in Aujas Cybersecurity-NuSummit company interview?

Some of the top questions asked at the Aujas Cybersecurity-NuSummit company interview -

  1. If you got a bufferoverflow atack how you will validate ...read more
  2. How do you explain to a non IT guy about the Vulnerability Scan Repo...read more
  3. what is the privilege of nessus security t...read more
What are the most common questions asked in Aujas Cybersecurity-NuSummit company HR round?

The most common HR questions asked in Aujas Cybersecurity-NuSummit company interview are -

  1. What is your family backgrou...read more
  2. What are your salary expectatio...read more
  3. Tell me about yourse...read more
How long is the Aujas Cybersecurity-NuSummit company interview process?

The duration of Aujas Cybersecurity-NuSummit company interview process can vary, but typically it takes about less than 2 weeks to complete.

Tell us how to improve this page.

Overall Interview Experience Rating

4.4/5

based on 28 interview experiences

Difficulty level

Easy 5%
Moderate 80%
Hard 15%

Duration

Less than 2 weeks 68%
2-4 weeks 26%
4-6 weeks 5%
View more

Interview Questions from Similar Companies

ITC Infotech Interview Questions
3.7
 • 383 Interviews
3i Infotech Interview Questions
3.4
 • 151 Interviews
Microland Interview Questions
3.5
 • 140 Interviews
Sify Technologies Interview Questions
3.8
 • 134 Interviews
Sonata Software Interview Questions
3.4
 • 125 Interviews
Clover Infotech Interview Questions
3.5
 • 121 Interviews
Prodapt Interview Questions
3.5
 • 106 Interviews
View all

Aujas Cybersecurity-NuSummit company Reviews and Ratings

based on 293 reviews

3.7/5

Rating in categories

3.6

Skill development

3.6

Work-life balance

3.5

Salary

3.7

Job security

3.5

Company culture

3.2

Promotions

3.4

Work satisfaction

Explore 293 Reviews and Ratings
Consultant
396 salaries
unlock blur

₹8.4 L/yr - ₹14.9 L/yr

Senior Consultant
281 salaries
unlock blur

₹12 L/yr - ₹20.1 L/yr

Associate Consultant
237 salaries
unlock blur

₹3.9 L/yr - ₹9 L/yr

Security Consultant
128 salaries
unlock blur

₹6 L/yr - ₹14 L/yr

Lead Consultant
92 salaries
unlock blur

₹20 L/yr - ₹36 L/yr

Explore more salaries
Compare Aujas Cybersecurity-NuSummit company with

ITC Infotech

3.7
Compare

3i Infotech

3.4
Compare

Sify Technologies

3.8
Compare

Microland

3.5
Compare
write
Share an Interview