Add office photos
Employer?
Claim Account for FREE

BT Global Services

4.1
based on 1.3k Reviews
Filter interviews by

30+ Interview Questions and Answers

Updated 23 Jul 2024

Q1. How to forecast revenue of a new product?

Ans.

Forecasting revenue of a new product requires market research, analysis of competition, and estimation of demand.

  • Conduct market research to identify potential customers and their needs

  • Analyze competition to understand their pricing, marketing, and sales strategies

  • Estimate demand based on market size, target audience, and pricing

  • Consider external factors such as economic conditions and industry trends

  • Use financial models such as discounted cash flow analysis or revenue forecas...read more

Add your answer

Q2. - SQL injection , what is splunk and it's architecture ?

Ans.

SQL injection is a type of cyber attack. Splunk is a software platform used for searching, analyzing and visualizing machine-generated data.

  • SQL injection is a technique where malicious SQL statements are inserted into an entry field to execute unauthorized actions.

  • Splunk architecture consists of forwarders, indexers, and search heads.

  • Forwarders collect data from various sources and send it to indexers.

  • Indexers store and index the data for faster search and analysis.

  • Search hea...read more

Add your answer

Q3. Difference between deferred revenue and unearned income

Ans.

Deferred revenue and unearned income are terms used interchangeably to describe the same concept.

  • Deferred revenue and unearned income refer to revenue received in advance for goods or services that have not yet been delivered or provided.

  • Both terms represent a liability on the company's balance sheet until the revenue is recognized.

  • Deferred revenue is commonly used in the software industry, where customers pay upfront for a subscription or license that spans multiple periods....read more

View 2 more answers

Q4. What is the diff between zone protection dos and dos attack rule

Ans.

Zone protection DoS is a feature that protects against DoS attacks by limiting traffic to specific zones, while DoS attack rule is a specific rule that detects and blocks DoS attacks.

  • Zone protection DoS limits traffic to specific zones to prevent DoS attacks

  • DoS attack rule detects and blocks DoS attacks based on specific rules

  • Zone protection DoS is a proactive measure while DoS attack rule is a reactive measure

  • Zone protection DoS can be configured to limit traffic based on so...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. -type of attacks and difference between dos and ddos ?

Ans.

DoS and DDoS are types of cyber attacks. DoS targets a single system, while DDoS targets multiple systems simultaneously.

  • DoS stands for Denial of Service, where an attacker overwhelms a target system with a flood of traffic or requests.

  • DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack.

  • DoS attacks can be carried out by a single attacker using a single device or network.

  • DDoS attacks involve multiple attackers using multiple devi...read more

View 1 answer

Q6. What you know about black and white hat Hacker ?

Ans.

Black hat hackers are cyber criminals who exploit vulnerabilities for personal gain, while white hat hackers use their skills for ethical purposes.

  • Black hat hackers use their skills to steal data, spread malware, and commit other cyber crimes.

  • White hat hackers are hired by organizations to test their security systems and identify vulnerabilities.

  • Grey hat hackers fall somewhere in between, using their skills for both ethical and unethical purposes.

  • Examples of black hat hackers...read more

Add your answer
Are these interview questions helpful?

Q7. what is incremental load and how it works?

Ans.

Incremental load is a process of updating a data warehouse or database by adding only the new or modified data.

  • Incremental load is used to minimize the amount of data that needs to be processed and loaded.

  • It involves identifying the changes in the source data and applying those changes to the target system.

  • Common techniques for incremental load include using timestamps, change data capture, or comparing checksums.

  • For example, in an e-commerce website, only the new orders sinc...read more

View 1 answer

Q8. What is a lease(IFRS 16)

Ans.

A lease is a contract between a lessor and a lessee, where the lessee pays the lessor for the use of an asset.

  • IFRS 16 is a new accounting standard that requires companies to recognize most leases on their balance sheets

  • Leases can be classified as finance leases or operating leases

  • Finance leases are treated like asset purchases and the lessee records the leased asset as an asset and the lease obligation as a liability

  • Operating leases are treated like rental agreements and the ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Difference between provision and accrual

Ans.

Provision is an estimated liability while accrual is a recognized expense.

  • Provision is an estimated liability that is recognized when there is uncertainty about the amount or timing of a future expense.

  • Accrual is a recognized expense that is recorded when it is incurred, regardless of when the payment is made.

  • Provisions are made for potential future expenses, such as legal claims or warranty obligations.

  • Accruals are made for expenses that have been incurred but not yet paid, ...read more

View 1 answer

Q10. - what you know about cyber security?

Ans.

Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

  • Cyber security involves various technologies, processes, and practices to safeguard digital assets.

  • It includes measures such as firewalls, antivirus software, encryption, and access controls.

  • Cyber security threats can come from various sources, including hackers, malware, phishing attacks, and insider threats.

  • Cyber security profe...read more

Add your answer

Q11. What is the diff between dos zone protection and dos attack rule

Ans.

DoS zone protection and DoS attack rule are two different methods to prevent DoS attacks.

  • DoS zone protection is a feature that blocks traffic from a specific IP address or subnet if it exceeds a certain threshold.

  • DoS attack rule is a security policy that identifies and blocks traffic patterns that are indicative of a DoS attack.

  • DoS zone protection is a proactive measure that prevents traffic from reaching the target, while DoS attack rule is a reactive measure that blocks tra...read more

Add your answer

Q12. what is the differences between keep and join ?

Ans.

Keep and join are both used in programming, but they have different meanings and purposes.

  • Keep is a method used to filter elements from a collection based on a condition.

  • Join is used to combine elements from two or more collections based on a common attribute.

  • Keep returns a new collection with only the elements that satisfy the condition.

  • Join combines elements from multiple collections into a single collection.

  • Keep is often used with functions like filter or where in programm...read more

View 1 answer

Q13. what is synthetic Key and how to remove them ?

Ans.

A synthetic key is a composite key created when two or more tables have multiple common fields.

  • Synthetic keys occur when there is a many-to-many relationship between tables.

  • They can be removed by resolving the underlying data model issues.

  • One way to remove synthetic keys is by creating a bridge table to represent the many-to-many relationship.

  • Another approach is to concatenate the common fields to create a unique key.

  • Synthetic keys can also be eliminated by renaming or removi...read more

View 1 answer

Q14. Which tunnel create between Anchor and foreign WLC?

Ans.

The tunnel created between Anchor and foreign WLC is called the Mobility Tunnel.

  • The Mobility Tunnel is used for communication between the Anchor WLC and the foreign WLC.

  • It is used to exchange client information and maintain client sessions.

  • The Mobility Tunnel is established using the CAPWAP protocol.

  • The tunnel is encrypted for security purposes.

  • The Mobility Tunnel is also used for roaming clients between different APs.

  • Examples of Anchor WLCs include Cisco 5500 Series and 8500...read more

Add your answer

Q15. What are the products of BT. How Global Business Service in BT is different from Operational work.

Ans.

BT offers a wide range of products and services including broadband, TV, mobile, and IT solutions.

  • BT's products include broadband internet, TV services, mobile phone plans, and IT solutions for businesses.

  • Global Business Services in BT focuses on providing strategic support and solutions to help businesses operate more efficiently and effectively.

  • Operational work in BT involves day-to-day tasks and activities to ensure the smooth running of services and customer support.

  • Globa...read more

Add your answer

Q16. What does "inclusiveness" mean to you?

Ans.

Inclusiveness means creating an environment where everyone feels valued and respected.

  • Inclusiveness involves actively seeking out and including diverse perspectives and backgrounds.

  • It means ensuring that everyone has equal opportunities to participate and contribute.

  • Inclusiveness requires open communication, empathy, and a willingness to learn from others.

  • Examples of inclusiveness in project management include involving team members from different departments or locations, ac...read more

Add your answer

Q17. What are different types of PMO

Ans.

There are three types of PMO: Supportive, Controlling, and Directive.

  • Supportive PMO provides support and guidance to project managers.

  • Controlling PMO monitors and controls project management processes.

  • Directive PMO takes control of the projects and manages them directly.

  • PMOs can also be categorized as enterprise, departmental, or project-specific.

  • Enterprise PMO manages organization-wide projects and programs.

  • Departmental PMO focuses on a specific department or business unit.

  • P...read more

Add your answer

Q18. Give past examples or risk and issue management

Ans.

I have experience in identifying and managing risks and issues in various projects.

  • Conducted risk assessments and created mitigation plans for a software development project

  • Identified a potential issue with a vendor's delivery timeline and proactively communicated with stakeholders to find a solution

  • Managed a team to address a critical issue with a product launch and successfully resolved the issue within the deadline

  • Implemented a risk management plan for a construction proje...read more

Add your answer

Q19. What is red hat ?

Ans.

Red Hat is a leading provider of open source software solutions, including the popular Red Hat Enterprise Linux operating system.

  • Red Hat is a software company that specializes in open source solutions.

  • They are known for their flagship product, Red Hat Enterprise Linux (RHEL).

  • Red Hat offers a range of software products and services for businesses.

  • Their solutions focus on security, reliability, and scalability.

  • Red Hat also provides support and training for their products.

View 1 answer

Q20. How you can manipulate the path in BGP?

Ans.

BGP path manipulation can be done using various attributes like AS path prepending, MED, local preference, etc.

  • AS path prepending involves adding the same AS number multiple times to make the path less attractive

  • MED (Multi-Exit Discriminator) is used to influence the path selection for multiple exit points from the same AS

  • Local preference is used to set the preference for a particular path within the same AS

  • Community attribute can be used to tag routes and manipulate path sel...read more

Add your answer

Q21. What is Routing protocol,explain IGP,EIGRP,OSPF and OSI model

Ans.

Routing protocol is a set of rules used by routers to determine the best path for data transmission. IGP, EIGRP, OSPF are types of routing protocols. OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • IGP stands for Interior Gateway Protocol and is used within an autonomous system. Examples include EIGRP and OSPF.

  • EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing proto...read more

Add your answer

Q22. What is HSRP , where we configure this?

Ans.

HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary protocol used to provide redundancy for IP networks.

  • HSRP allows multiple routers to participate in a virtual router group to present the appearance of a single virtual router IP address to the hosts on a LAN.

  • It provides redundancy and failover capabilities for IP networks.

  • HSRP is configured on Cisco routers using the 'standby' command.

  • It is commonly used in enterprise networks to ensure high availability a...read more

Add your answer

Q23. What is multiplexer and why it is used

Add your answer

Q24. What is sp3 architecture

Ans.

SP3 architecture is a security architecture designed to protect against malware attacks.

  • SP3 stands for Security Platform 3

  • It is a hardware-based security architecture

  • It is designed to protect against malware attacks by isolating critical system components

  • It is used in some Intel processors, such as the Intel Core i7

  • It provides a secure execution environment for sensitive applications

Add your answer

Q25. How to handle Incident Management

Add your answer

Q26. Network deployment strategies and risks

Ans.

Network deployment strategies involve planning, designing, and implementing a network infrastructure. Risks include security breaches, downtime, and compatibility issues.

  • Network deployment strategies involve assessing business needs and designing a network infrastructure that meets those needs.

  • Risks include security breaches, which can compromise sensitive data and damage the organization's reputation.

  • Downtime can result in lost productivity and revenue, and compatibility iss...read more

Add your answer

Q27. How to work bt global business company

Ans.

To work at BT Global Business Company, one must possess strong security skills and knowledge of company policies and procedures.

  • Familiarize yourself with BT Global Business Company's security protocols and procedures

  • Stay updated on security trends and technologies

  • Maintain a professional and vigilant attitude at all times

  • Communicate effectively with colleagues and superiors

  • Participate in regular training and development programs

Add your answer

Q28. Why tracking area update?

Ans.

Tracking area update is necessary to ensure seamless handover of mobile devices between different tracking areas in a cellular network.

  • Ensures continuous connectivity during movement of mobile devices

  • Optimizes network resources by updating location information

  • Prevents call drops during handover between tracking areas

Add your answer

Q29. What is Fttp, fttc difference

Add your answer

Q30. Tell me about deferred revenue

Ans.

Deferred revenue is revenue received in advance for goods or services that have not yet been provided.

  • Deferred revenue is a liability on the balance sheet until the goods or services are delivered.

  • It is recognized as revenue on the income statement as the goods or services are provided.

  • Common examples include magazine subscriptions, software licenses, and prepaid insurance.

  • Deferred revenue is also known as unearned revenue.

Add your answer

Q31. What is TCP IP model

Add your answer

Q32. Reason for low Bandwidth

Add your answer

Q33. Layers of OSI model

Add your answer

Q34. Experience in tools

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 19 interviews in the last 1 year
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.6
 • 1.6k Interview Questions
4.1
 • 519 Interview Questions
3.9
 • 202 Interview Questions
4.7
 • 143 Interview Questions
3.6
 • 143 Interview Questions
3.9
 • 132 Interview Questions
View all
Top BT Global Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter