Add office photos
AB InBev India logo
Engaged Employer

AB InBev India

Verified
3.4
based on 1.2k Reviews
Video summary
Filter interviews by
Fresher
Experienced
Clear (1)

10+ AB InBev India Interview Questions and Answers for Freshers

Updated 4 Sep 2024

Q1. Underlying process of boosting and Decision tree

Ans.

Boosting is an ensemble learning technique that combines multiple weak learners to create a strong learner, often using decision trees.

  • Boosting is an iterative process where each weak learner is trained to correct the errors of the previous ones.

  • Decision trees are commonly used as the base learner in boosting algorithms like AdaBoost and Gradient Boosting.

  • Boosting algorithms like XGBoost and LightGBM are popular in machine learning for their high predictive accuracy.

Add your answer
right arrow

Q2. mean median mode on distribution curve

Ans.

Mean, median, and mode are measures of central tendency on a distribution curve.

  • Mean is the average of all the values in the distribution.

  • Median is the middle value when the data is arranged in ascending order.

  • Mode is the value that appears most frequently in the distribution.

  • For example, in a distribution of [2, 3, 3, 4, 5], the mean is 3.4, the median is 3, and the mode is 3.

Add your answer
right arrow

Q3. what is difference active attack and passive attack

Ans.

Active attacks involve the attacker directly interacting with the target system, while passive attacks involve monitoring and eavesdropping.

  • Active attacks involve modifying data, injecting malware, or disrupting services.

  • Passive attacks involve listening in on communications, capturing data, or analyzing traffic.

  • Examples of active attacks include denial of service (DoS) attacks and man-in-the-middle attacks.

  • Examples of passive attacks include sniffing attacks and reconnaissan...read more

Add your answer
right arrow

Q4. What are your daily tasks, Why do you want to change, What is forecasting, What is budgeting, walk me through your resume

Ans.

My daily tasks include financial analysis, forecasting, budgeting, and reporting. I want to change for career growth opportunities.

  • Daily tasks involve analyzing financial data, creating forecasts, developing budgets, and preparing reports

  • I want to change for opportunities to further develop my skills and advance my career

  • Forecasting is the process of predicting future financial outcomes based on historical data and trends

  • Budgeting involves setting financial goals and allocati...read more

Add your answer
right arrow
Discover AB InBev India interview dos and don'ts from real experiences

Q5. explain man in the middle attack

Ans.

A man in the middle attack is when a hacker intercepts communication between two parties without their knowledge.

  • Occurs when a hacker secretly intercepts and possibly alters the communication between two parties

  • Commonly seen in public Wi-Fi networks where the hacker positions themselves between the user and the network

  • Can lead to sensitive information being stolen or manipulated

Add your answer
right arrow

Q6. explain RSA and it is use

Ans.

RSA is a public-key encryption algorithm used for secure communication over the internet.

  • RSA stands for Rivest-Shamir-Adleman, named after its inventors.

  • It uses a pair of keys - a public key for encryption and a private key for decryption.

  • RSA is widely used in secure communication protocols like HTTPS for secure browsing.

  • It is based on the difficulty of factoring large prime numbers.

  • RSA keys are typically 1024 or 2048 bits in length for security.

Add your answer
right arrow

Q7. explain security attacks

Ans.

Security attacks are malicious activities aimed at compromising the confidentiality, integrity, or availability of information.

  • Types of security attacks include malware, phishing, ransomware, DDoS attacks, and man-in-the-middle attacks.

  • Attackers may exploit vulnerabilities in software or systems to gain unauthorized access or steal sensitive data.

  • Common goals of security attacks are financial gain, data theft, disruption of services, or espionage.

  • Countermeasures to prevent se...read more

Add your answer
right arrow

Q8. How the cyber hub security fabric maintained

Ans.

The cyber hub security fabric is maintained through a combination of technology, policies, procedures, and monitoring.

  • Regular security audits and assessments are conducted to identify vulnerabilities and risks.

  • Firewalls, intrusion detection systems, and encryption technologies are implemented to protect data and systems.

  • Access controls and authentication mechanisms are used to ensure only authorized users have access to sensitive information.

  • Security policies and procedures a...read more

Add your answer
right arrow

Q9. Explain block chain

Ans.

Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers.

  • Blockchain is a chain of blocks containing transaction data.

  • Each block is linked to the previous one using cryptographic hashes.

  • Transactions are verified by network participants through consensus mechanisms like Proof of Work or Proof of Stake.

  • Once added to the blockchain, data is immutable and cannot be altered.

  • Examples of blockchain technology include Bi...read more

Add your answer
right arrow

Q10. What is urs weakness

Ans.

I tend to take on too many tasks at once, leading to occasional overwhelm.

  • Strive to delegate tasks effectively to avoid becoming overwhelmed

  • Practice prioritizing tasks based on importance and deadlines

  • Seek support or guidance from colleagues or supervisors when feeling overwhelmed

Add your answer
right arrow
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at AB InBev India for Freshers

based on 17 interviews
Interview experience
3.8
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

PwC Logo
3.4
 • 792 Interview Questions
Jio Logo
3.9
 • 753 Interview Questions
Adobe Logo
3.9
 • 366 Interview Questions
Synechron Logo
3.6
 • 255 Interview Questions
Bounteous x Accolite Logo
3.4
 • 177 Interview Questions
Hindalco Industries Logo
4.2
 • 155 Interview Questions
View all
Recently Viewed
LIST OF COMPANIES
Discover companies
Find best workplace
DESIGNATION
INTERVIEWS
Jio Platforms
No Interviews
INTERVIEWS
Jio Platforms
No Interviews
LIST OF COMPANIES
Collabera Technologies
Locations
INTERVIEWS
Jio Platforms
No Interviews
SALARIES
IDBI Intech Limited
INTERVIEWS
Jio Platforms
No Interviews
LIST OF COMPANIES
NeoSOFT
Locations
INTERVIEWS
IDBI Intech Limited
No Interviews
Top AB InBev India Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter