Barclays Shared Services
20+ Genpact Interview Questions and Answers
Q1. Tell something about SOX(Sarbanes Oxley Act)
The Sarbanes-Oxley Act (SOX) is a US federal law enacted in 2002 to protect investors by improving the accuracy and reliability of corporate disclosures.
SOX was introduced in response to accounting scandals such as Enron and WorldCom.
It requires public companies to establish and maintain internal controls to ensure accurate financial reporting.
SOX mandates independent audits of financial statements by external auditors.
It holds CEOs and CFOs personally responsible for the acc...read more
Q2. What is Return on Tangible Equity (RoTE), and how do planning and budgeting work?
RoTE is a financial metric used to evaluate the profitability of a company's tangible equity.
RoTE is calculated by dividing net income by average tangible equity.
It measures how efficiently a company is using its tangible assets to generate profit.
Planning and budgeting involve setting financial goals, allocating resources, and monitoring performance to achieve desired RoTE.
For example, a company may set a target RoTE of 15% and adjust its budget and strategies accordingly to...read more
Q3. What is risk and why is it necessary to have a risk function for an organisation
Q4. What are the core values of Barclays?
The core values of Barclays are integrity, respect, excellence, and stewardship.
Integrity: Barclays values honesty, transparency, and ethical behavior in all aspects of its operations.
Respect: Barclays promotes a culture of diversity, inclusion, and treating everyone with fairness and respect.
Excellence: Barclays strives for excellence in delivering innovative solutions, exceptional service, and superior performance.
Stewardship: Barclays is committed to being a responsible an...read more
Q5. Can you say about any recent macro economic event that has impact on bank and the economy
Q6. What is a Banking Profit and Loss (P&L) statement?
A Banking Profit and Loss (P&L) statement is a financial document that shows the revenues, expenses, and profits of a bank over a specific period of time.
It includes details of interest income, fees and commissions, operating expenses, provisions for loan losses, and net income.
The statement helps in analyzing the financial performance and profitability of the bank.
It is an essential tool for stakeholders, investors, and regulators to assess the financial health of the bank.
E...read more
Q7. What is the role of Risk weighted assets for a bank
Q8. what is mean By cybersecurity
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves safeguarding information systems from cyber threats like malware and phishing.
Includes measures such as firewalls, encryption, and intrusion detection systems.
Examples of cyber threats: ransomware attacks, data breaches, and denial-of-service attacks.
Focuses on both hardware and software security, as well as user education and awareness.
Q9. How to improve efficiency of models
Improving model efficiency involves feature selection, hyperparameter tuning, and ensemble methods.
Perform feature selection to reduce dimensionality and focus on relevant features
Optimize hyperparameters using techniques like grid search or random search
Utilize ensemble methods like bagging or boosting to improve model performance
Consider using more advanced algorithms like deep learning for complex data patterns
Q10. How would you support irritated clients ?
I would listen to their concerns, empathize with them, and offer solutions to resolve their issues.
Listen actively to their complaints and concerns
Empathize with their situation and show understanding
Offer solutions to resolve their issues
Follow up with them to ensure their satisfaction
Q11. What is regression , classification
Regression is a statistical method to predict continuous outcomes, while classification is used to predict categorical outcomes.
Regression is used when the target variable is continuous, such as predicting house prices based on features like size and location.
Classification is used when the target variable is categorical, like predicting whether an email is spam or not based on its content.
Regression models include linear regression, polynomial regression, and logistic regres...read more
Q12. What do you know about customer service
Customer service involves providing assistance and support to customers to ensure their satisfaction and resolve any issues they may have.
Customer service is about understanding and meeting the needs of customers
It involves effective communication and active listening to understand customer concerns
Customer service aims to provide prompt and accurate information or solutions
It requires empathy and patience to handle difficult or upset customers
Customer service can be provided...read more
Q13. what is mean hashing
Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.
Hash functions take an input (or 'message') and return a fixed-size string of bytes.
Common hashing algorithms include MD5, SHA-1, and SHA-256.
Hashing is used in password storage to securely store user credentials.
A hash is deterministic; the same input will always produce the same output.
Hash functions are designed to be fast and irreversible, maki...read more
Q14. what is encoding
Encoding is the process of converting data into a specific format for efficient transmission or storage.
Encoding transforms data into a different format, such as converting text to binary.
Common encoding schemes include Base64, URL encoding, and ASCII.
Base64 is often used to encode binary data for transmission over text-based protocols.
URL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal digits.
ASCII encoding represents text in computers using ...read more
Q15. what is mean by Nmap
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
Q16. What is main purpose of Aml
AML's main purpose is to prevent and detect money laundering and terrorist financing.
Preventing and detecting money laundering
Preventing and detecting terrorist financing
Identifying and reporting suspicious activity
Complying with regulatory requirements
Protecting the reputation of the institution
Conducting due diligence on customers and transactions
Q17. Detect and held to prevent illegal activity
As an AML Analyst, I would detect and prevent illegal activity by analyzing transactions, conducting investigations, and reporting suspicious activity to authorities.
Analyze transactions for any suspicious activity
Conduct investigations to gather evidence
Report any suspicious activity to authorities
Stay up-to-date with AML regulations and best practices
Collaborate with other departments to prevent illegal activity
Implement and monitor AML policies and procedures
Use technology...read more
Q18. Hyper parameters for classification algorithms
Hyper parameters are settings that are set before the learning process begins and affect the learning process itself.
Hyper parameters are not learned during the training process, but are set before training begins.
They control the learning process and impact the performance of the model.
Examples include learning rate, number of hidden layers, and batch size in neural networks.
Q19. priniciples of CIA
CIA principles ensure data security through Confidentiality, Integrity, and Availability.
Confidentiality: Protecting sensitive information from unauthorized access (e.g., encryption).
Integrity: Ensuring data accuracy and consistency (e.g., checksums to verify data integrity).
Availability: Ensuring that information is accessible when needed (e.g., redundant systems to prevent downtime).
Q20. What is CIR ratio
CIR ratio stands for Cash Interest Coverage ratio, which measures a company's ability to pay interest expenses with its operating cash flow.
CIR ratio is calculated by dividing operating cash flow by total interest expenses.
A higher CIR ratio indicates that a company is more capable of covering its interest expenses with its cash flow.
A lower CIR ratio may indicate financial distress or an inability to generate enough cash flow to cover interest payments.
Q21. Explain Hadoop architecture?
Hadoop architecture is a distributed computing framework for processing large data sets across clusters of computers.
Hadoop consists of HDFS (Hadoop Distributed File System) for storage and MapReduce for processing.
HDFS divides data into blocks and stores them across multiple nodes in a cluster.
MapReduce is a programming model for processing large data sets in parallel across a distributed cluster.
Hadoop also includes YARN (Yet Another Resource Negotiator) for resource manage...read more
Q22. Unix commands for permissions
Unix commands for permissions
chmod - change file mode bits
chown - change file owner and group
ls - list directory contents with permissions
umask - set default file permissions
Q23. Hadoop vs spark difference
Hadoop is a distributed storage system while Spark is a distributed processing engine.
Hadoop is primarily used for storing and processing large volumes of data in a distributed environment.
Spark is designed for fast data processing and can perform in-memory computations, making it faster than Hadoop for certain tasks.
Hadoop uses MapReduce for processing data, while Spark uses Resilient Distributed Datasets (RDDs) for faster processing.
Spark is more suitable for real-time proc...read more
Q24. What is credit risk
Credit risk is the risk of loss due to a borrower's failure to repay a loan or meet contractual obligations.
Credit risk is the risk that a borrower will default on a loan or debt obligation.
It is the potential loss that a lender may suffer if a borrower fails to make payments.
Factors that contribute to credit risk include the borrower's credit history, financial stability, and economic conditions.
Lenders use credit scores and credit reports to assess credit risk before lendin...read more
Top HR Questions asked in Genpact
Interview Process at Genpact
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month