
AB InBev India


10+ AB InBev India Interview Questions and Answers for Freshers
Q1. Underlying process of boosting and Decision tree
Boosting is an ensemble learning technique that combines multiple weak learners to create a strong learner, often using decision trees.
Boosting is an iterative process where each weak learner is trained to correct the errors of the previous ones.
Decision trees are commonly used as the base learner in boosting algorithms like AdaBoost and Gradient Boosting.
Boosting algorithms like XGBoost and LightGBM are popular in machine learning for their high predictive accuracy.
Q2. mean median mode on distribution curve
Mean, median, and mode are measures of central tendency on a distribution curve.
Mean is the average of all the values in the distribution.
Median is the middle value when the data is arranged in ascending order.
Mode is the value that appears most frequently in the distribution.
For example, in a distribution of [2, 3, 3, 4, 5], the mean is 3.4, the median is 3, and the mode is 3.
Q3. what is difference active attack and passive attack
Active attacks involve the attacker directly interacting with the target system, while passive attacks involve monitoring and eavesdropping.
Active attacks involve modifying data, injecting malware, or disrupting services.
Passive attacks involve listening in on communications, capturing data, or analyzing traffic.
Examples of active attacks include denial of service (DoS) attacks and man-in-the-middle attacks.
Examples of passive attacks include sniffing attacks and reconnaissan...read more
Q4. What are your daily tasks, Why do you want to change, What is forecasting, What is budgeting, walk me through your resume
My daily tasks include financial analysis, forecasting, budgeting, and reporting. I want to change for career growth opportunities.
Daily tasks involve analyzing financial data, creating forecasts, developing budgets, and preparing reports
I want to change for opportunities to further develop my skills and advance my career
Forecasting is the process of predicting future financial outcomes based on historical data and trends
Budgeting involves setting financial goals and allocati...read more
Q5. explain man in the middle attack
A man in the middle attack is when a hacker intercepts communication between two parties without their knowledge.
Occurs when a hacker secretly intercepts and possibly alters the communication between two parties
Commonly seen in public Wi-Fi networks where the hacker positions themselves between the user and the network
Can lead to sensitive information being stolen or manipulated
Q6. explain RSA and it is use
RSA is a public-key encryption algorithm used for secure communication over the internet.
RSA stands for Rivest-Shamir-Adleman, named after its inventors.
It uses a pair of keys - a public key for encryption and a private key for decryption.
RSA is widely used in secure communication protocols like HTTPS for secure browsing.
It is based on the difficulty of factoring large prime numbers.
RSA keys are typically 1024 or 2048 bits in length for security.
Q7. explain security attacks
Security attacks are malicious activities aimed at compromising the confidentiality, integrity, or availability of information.
Types of security attacks include malware, phishing, ransomware, DDoS attacks, and man-in-the-middle attacks.
Attackers may exploit vulnerabilities in software or systems to gain unauthorized access or steal sensitive data.
Common goals of security attacks are financial gain, data theft, disruption of services, or espionage.
Countermeasures to prevent se...read more
Q8. How the cyber hub security fabric maintained
The cyber hub security fabric is maintained through a combination of technology, policies, procedures, and monitoring.
Regular security audits and assessments are conducted to identify vulnerabilities and risks.
Firewalls, intrusion detection systems, and encryption technologies are implemented to protect data and systems.
Access controls and authentication mechanisms are used to ensure only authorized users have access to sensitive information.
Security policies and procedures a...read more
Q9. Explain block chain
Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers.
Blockchain is a chain of blocks containing transaction data.
Each block is linked to the previous one using cryptographic hashes.
Transactions are verified by network participants through consensus mechanisms like Proof of Work or Proof of Stake.
Once added to the blockchain, data is immutable and cannot be altered.
Examples of blockchain technology include Bi...read more
Q10. What is urs weakness
I tend to take on too many tasks at once, leading to occasional overwhelm.
Strive to delegate tasks effectively to avoid becoming overwhelmed
Practice prioritizing tasks based on importance and deadlines
Seek support or guidance from colleagues or supervisors when feeling overwhelmed
Top HR Questions asked in AB InBev India for Freshers
Interview Process at AB InBev India for Freshers

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

