i
Chubb
Filter interviews by
Clear (1)
Kafka flow can be implemented using Kafka Connect and Kafka Streams for data ingestion and processing.
Use Kafka Connect to ingest data from various sources into Kafka topics
Use Kafka Streams for real-time data processing and analytics
Implement producers and consumers to interact with Kafka topics
Configure Kafka brokers, topics, and partitions for optimal performance
I applied via LinkedIn and was interviewed in Sep 2021. There were 4 interview rounds.
Top trending discussions
posted on 8 Aug 2022
5 people including in gd
posted on 18 Sep 2022
I applied via Campus Placement and was interviewed before Sep 2021. There was 1 interview round.
I applied via Referral and was interviewed before Jul 2021. There was 1 interview round.
I am a highly qualified professional with several years of experience in the field.
I have a Bachelor's degree in Business Administration.
I have 5 years of experience working in the finance industry.
I am skilled in financial analysis, budgeting, and forecasting.
I have successfully managed large-scale projects and teams.
I am proficient in various financial software and tools.
I have a proven track record of achieving targ
I applied via Walk-in and was interviewed before Sep 2020. There were 3 interview rounds.
The core principles of Information Security are confidentiality, integrity, and availability.
Confidentiality: ensuring that information is only accessible to authorized individuals
Integrity: maintaining the accuracy and completeness of information
Availability: ensuring that information is accessible to authorized individuals when needed
Examples: encryption, access controls, backups, disaster recovery plans
Virus and malware are malicious software designed to harm computer systems and steal data.
Virus is a self-replicating program that attaches itself to clean files and spreads throughout the system.
Malware is a broader term that includes viruses, spyware, adware, and other malicious software.
Malware can be used to steal sensitive information, damage files, or take control of a computer.
Examples of malware include Trojan ...
I will immediately disconnect from the internet and run a virus scan to remove the virus.
Disconnect from the internet to prevent further spread of the virus
Run a virus scan using an updated antivirus software
If the virus cannot be removed, seek help from IT support
Regularly backup important files to prevent data loss
I applied via Naukri.com and was interviewed in Jun 2022. There was 1 interview round.
I am a highly motivated and detail-oriented individual with a strong background in finance and accounting.
I have a Bachelor's degree in Finance from XYZ University.
I have worked as an intern at ABC Company, where I gained experience in financial analysis and reporting.
I am proficient in using financial software such as Excel and QuickBooks.
I have excellent analytical and problem-solving skills.
I am a team player and ha
posted on 5 Dec 2024
There was a pair programming session with the team developers.
based on 1 interview
Interview experience
based on 26 reviews
Rating in categories
Senior Software Engineer
249
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
206
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
127
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Scientist
40
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate
39
salaries
| ₹0 L/yr - ₹0 L/yr |
AIG
Allianz
AXA
Zurich Insurance