Filter interviews by
I applied via Naukri.com and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
The end to end implementation cycle of ISMS involves planning, implementation, monitoring, review, and improvement.
Planning involves identifying the scope, objectives, and risks of the ISMS.
Implementation involves designing and implementing controls to mitigate identified risks.
Monitoring involves regular checks to ensure the controls are effective.
Review involves assessing the effectiveness of the ISMS and identifying...
Risk assessment involves identifying, analyzing, and evaluating potential risks to determine the likelihood and impact of those risks.
Identify potential risks
Analyze the likelihood and impact of each risk
Evaluate the risks to determine their priority
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Annex A controls are the information security controls listed in ISO 27001 standard.
Annex A contains 114 controls categorized into 14 sections.
These controls are designed to ensure the confidentiality, integrity, and availability of information.
Examples of controls include access control, asset management, cryptography, incident management, and more.
Organizations must select and implement controls based on their risk a...
I applied via Naukri.com and was interviewed in Oct 2022. There were 4 interview rounds.
Budgeting is the process of creating a financial plan for a specific period. Forecasting is predicting future financial outcomes.
Budgeting involves estimating income and expenses for a specific period
Forecasting involves predicting future financial outcomes based on past data and trends
Foreign exchange diff AS 11 refers to the accounting treatment of foreign exchange gains or losses
Preparing a product budget involves e...
Difference between budget and forecasts, preparing a software buying budget, salary expenses increase but head count is same, variance analysis.
Budget is a financial plan for a specific period, while forecast is an estimate of future financial outcomes.
Preparing a software buying budget involves identifying the software needs, researching prices, and allocating funds.
Salary expenses increasing while head count remains ...
I would prefer to work from home (WFH) due to the convenience and flexibility it offers.
WFH allows for a better work-life balance as there is no commuting time.
It provides a comfortable and personalized work environment.
WFH reduces distractions and interruptions from colleagues.
It allows for increased productivity and focus.
WFH promotes better health and well-being by avoiding exposure to office germs.
It saves time and...
I appeared for an interview in Jun 2021.
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
I am proactive and take initiative in various scenarios.
I always anticipate potential issues and take preventive measures.
I actively seek out opportunities to improve processes and suggest innovative solutions.
I am self-motivated and take ownership of my work.
I consistently meet deadlines and deliver high-quality results.
I effectively communicate and collaborate with team members to ensure smooth workflow.
I am adaptabl...
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
I applied via Campus Placement
I am an avid traveler and have visited over 20 countries
I love experiencing new cultures and trying new foods
I have backpacked through Europe and Asia
I have volunteered in orphanages in Cambodia and Nepal
Mobile advertising platform
Adtech
Mobile marketing
App monetization
Maximum sub sequence sum in an array
Use Kadane's algorithm
Initialize max_so_far and max_ending_here to 0
Iterate through the array and update max_ending_here and max_so_far
Return max_so_far
Endianness refers to the byte order of a system. It determines how multi-byte data types are stored in memory.
Little-endian systems store the least significant byte first, while big-endian systems store the most significant byte first.
Endianness can affect the way data is transmitted between systems.
To determine the endianness of a system, you can use the byte order mark (BOM) or write a test program that checks the by...
Sort an array of 0's and 1's only.
Use two pointers, one at the beginning and one at the end of the array.
Swap 0's from the beginning with 1's from the end until the pointers meet.
Alternatively, use a counting sort algorithm to count the number of 0's and 1's and then reconstruct the array.
Heaps are data structures used to efficiently find the maximum or minimum element in a collection.
Max heap: parent nodes are always greater than or equal to child nodes
Min heap: parent nodes are always smaller than or equal to child nodes
Heaps are commonly used in priority queues and sorting algorithms
Heap operations include insert, delete, and extract max/min
Example: An array [3, 8, 2, 5, 1, 4, 6] can be represented a
Find 3 numbers in an array where a+b=c.
Loop through the array and check for all possible combinations of a and b.
Use a hash table to store the values of a and b, and check if c is present in the hash table.
Sort the array and use two pointers to find a and b, and then check if their sum equals c.
based on 12 reviews
Rating in categories
Associate Account Director
126
salaries
| ₹8.7 L/yr - ₹21.1 L/yr |
Executive Accountant
96
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Director - Client Services
43
salaries
| ₹15.6 L/yr - ₹34 L/yr |
Account Director
40
salaries
| ₹11 L/yr - ₹25 L/yr |
Accounts Supervisor
40
salaries
| ₹6.8 L/yr - ₹19.2 L/yr |
R.R. Donnelley
Epsilon
Denave
Smollan Group