Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Oct 2021. There were 5 interview rounds.
Amcat assessment was there with basic science and stuff.
I applied via Referral
I applied via Recruitment Consulltant and was interviewed before Jun 2021. There were 3 interview rounds.
I have experience in identifying and managing risks and issues in various projects.
Conducted risk assessments and created mitigation plans for a software development project
Identified a potential issue with a vendor's delivery timeline and proactively communicated with stakeholders to find a solution
Managed a team to address a critical issue with a product launch and successfully resolved the issue within the deadline
I...
There are three types of PMO: Supportive, Controlling, and Directive.
Supportive PMO provides support and guidance to project managers.
Controlling PMO monitors and controls project management processes.
Directive PMO takes control of the projects and manages them directly.
PMOs can also be categorized as enterprise, departmental, or project-specific.
Enterprise PMO manages organization-wide projects and programs.
Department...
Handled tough situations by actively listening, empathizing, and finding creative solutions.
Actively listened to the customer's concerns and frustrations
Empathized with the customer's emotions and validated their feelings
Identified the root cause of the problem and proposed creative solutions
Collaborated with the team to implement the solutions effectively
Followed up with the customer to ensure their satisfaction
Network deployment strategies involve planning, designing, and implementing a network infrastructure. Risks include security breaches, downtime, and compatibility issues.
Network deployment strategies involve assessing business needs and designing a network infrastructure that meets those needs.
Risks include security breaches, which can compromise sensitive data and damage the organization's reputation.
Downtime can resu...
Yes
Yes, I am willing to relocate for the right opportunity.
I am also open to working UK shifts as required.
I left my last job due to limited growth opportunities and a desire for new challenges.
Inclusiveness means creating an environment where everyone feels valued and respected.
Inclusiveness involves actively seeking out and including diverse perspectives and backgrounds.
It means ensuring that everyone has equal opportunities to participate and contribute.
Inclusiveness requires open communication, empathy, and a willingness to learn from others.
Examples of inclusiveness in project management include involvin...
BT Business interview questions for popular designations
I applied via Naukri.com and was interviewed before Dec 2020. There were 4 interview rounds.
Get interview-ready with Top BT Business Interview Questions
I applied via Job Portal and was interviewed before Sep 2021. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Jan 2021. There were 3 interview rounds.
I was interviewed before Jul 2021.
1 hour- Not applicable for every applicants
Zone protection DoS is a feature that protects against DoS attacks by limiting traffic to specific zones, while DoS attack rule is a specific rule that detects and blocks DoS attacks.
Zone protection DoS limits traffic to specific zones to prevent DoS attacks
DoS attack rule detects and blocks DoS attacks based on specific rules
Zone protection DoS is a proactive measure while DoS attack rule is a reactive measure
Zone pro...
DoS zone protection and DoS attack rule are two different methods to prevent DoS attacks.
DoS zone protection is a feature that blocks traffic from a specific IP address or subnet if it exceeds a certain threshold.
DoS attack rule is a security policy that identifies and blocks traffic patterns that are indicative of a DoS attack.
DoS zone protection is a proactive measure that prevents traffic from reaching the target, w...
SP3 architecture is a security architecture designed to protect against malware attacks.
SP3 stands for Security Platform 3
It is a hardware-based security architecture
It is designed to protect against malware attacks by isolating critical system components
It is used in some Intel processors, such as the Intel Core i7
It provides a secure execution environment for sensitive applications
Top trending discussions
The duration of BT Business interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 57 interviews
Interview experience
based on 1.4k reviews
Rating in categories
7-8 Yrs
Not Disclosed
4-7 Yrs
₹ 3.55-7.25 LPA
10-15 Yrs
Not Disclosed
Associate
283
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Engineer
281
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
263
salaries
| ₹0 L/yr - ₹0 L/yr |
Service Reliability Engineer
206
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
201
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Infosys
Tech Mahindra