Deloitte
40+ Hotel Grand Kailash Interview Questions and Answers
Q1. Explain how you test a change management control when the application doesn't store the updates log.
Testing change management control without update log
Create a test environment to simulate the change
Document the change and expected outcome
Perform the change and observe the system behavior
Compare the system behavior with the expected outcome
Repeat the process with different scenarios
Use version control to track changes
Q2. How will you deal with bulk data that needs to be reconciled
I will break down the data into smaller chunks and prioritize based on urgency.
Create a plan of action and prioritize based on urgency
Break down the data into smaller chunks to make it more manageable
Use software tools to assist with the reconciliation process
Ensure accuracy by double-checking and verifying data
Communicate progress and any issues to relevant parties
Q3. If I give you a web application for testing, what the prerequisites you ask for before proceeding to testing.
The prerequisites for testing a web application include understanding the application's requirements, having access to the application's documentation, and setting up a suitable testing environment.
Understanding the application's requirements and functionality
Access to the application's documentation, including user manuals and technical specifications
Setting up a suitable testing environment, including necessary hardware, software, and network configurations
Identifying any d...read more
Q4. what ae the stages of MSMP workflow?
MSMP workflow stages include request creation, request approval, request execution, and request completion.
Request creation: User creates a request for a specific action.
Request approval: Request is reviewed and approved by designated approvers.
Request execution: Approved request is executed by the system.
Request completion: System updates the request status and notifies the user.
Q5. What is the most critical vulnerability you have identified till now.
The most critical vulnerability I have identified is a security flaw in our company's online payment system.
The vulnerability allowed unauthorized access to customer payment information.
I discovered this vulnerability during a routine security audit.
It could have resulted in significant financial loss and damage to our company's reputation.
I immediately reported the vulnerability to the IT department and worked with them to implement necessary security patches.
Regular securit...read more
Q6. Are flexible with relocation
Yes, I am flexible with relocation.
I am open to exploring new opportunities in different locations.
I understand that relocation may be necessary for career growth.
I am willing to consider all options and make a decision based on what is best for the company and my career.
I have relocated in the past for work and am familiar with the process.
I am excited about the possibility of experiencing new places and cultures.
Q7. What are disclosure requirement under schedule 3 for MSME creditors ?
Disclosure requirements under schedule 3 for MSME creditors include providing details of outstanding dues, reasons for delay in payment, and steps taken to address delays.
MSME creditors must disclose details of outstanding dues to MSME suppliers.
Reasons for delay in payment must be disclosed by MSME creditors.
Steps taken to address delays in payment should be disclosed by MSME creditors.
Disclosure requirements aim to promote transparency and timely payments in the MSME sector...read more
Q8. What are the skillset you have in information security
I have a strong skillset in information security, including knowledge of network security, encryption, and vulnerability assessment.
Knowledge of network security protocols and best practices
Experience with encryption algorithms and techniques
Proficiency in conducting vulnerability assessments and penetration testing
Familiarity with security frameworks and compliance standards (e.g., ISO 27001, NIST)
Ability to analyze and respond to security incidents
Understanding of secure co...read more
Q9. What is difference between Financial and non financial assets ?
Financial assets are tangible assets like cash, stocks, bonds, etc. Non-financial assets are intangible assets like goodwill, patents, trademarks, etc.
Financial assets have a monetary value and can be easily converted into cash, such as stocks, bonds, and cash.
Non-financial assets do not have a monetary value and are not easily converted into cash, such as goodwill, patents, and trademarks.
Financial assets are typically listed on a company's balance sheet, while non-financial...read more
Q10. Indas vs As, IFCR, Indas 109, CARO2020 vs 16, revenue audit process
The question covers various accounting standards and audit processes.
IndAS and AS are two sets of accounting standards used in India.
IFCR is a global accounting standard for financial instruments.
IndAS 109 is an accounting standard for financial instruments.
CARO 2020 and 2016 are two versions of the Companies Auditor's Report Order.
Revenue audit process is a review of a company's revenue recognition policies and practices.
Q11. Difference between Saml and OIDC
SAML and OIDC are both authentication protocols, but SAML is XML-based while OIDC is JSON-based.
SAML is older and more widely used in enterprise environments
OIDC is newer and more commonly used in web and mobile applications
SAML uses XML for messages while OIDC uses JSON
SAML is more complex and requires more configuration than OIDC
OIDC supports more modern authentication features like single sign-on and multi-factor authentication
Q12. 2. What are the type of firefighting
There are four types of firefighting: structural, wildland, industrial, and municipal.
Structural firefighting involves extinguishing fires in buildings and other structures.
Wildland firefighting involves extinguishing fires in forests, grasslands, and other outdoor areas.
Industrial firefighting involves extinguishing fires in industrial settings such as factories and warehouses.
Municipal firefighting involves providing fire protection and emergency services to a specific city...read more
Q13. 1. Vov4 2.16 steps 3. Why do we use different doc pricing procedure 4.third party
Different doc pricing procedures are used for various reasons such as cost differentiation, customer segmentation, and legal compliance.
Cost differentiation - Different pricing procedures may be used to reflect the varying costs associated with different types of documents or services.
Customer segmentation - Pricing procedures can be tailored to different customer segments based on their willingness to pay or value perception.
Legal compliance - Certain industries or regions m...read more
Q14. What are the countermeasures for SQL injection
Countermeasures for SQL injection include input validation, parameterized queries, and stored procedures.
Implement input validation to ensure that user input is within expected parameters
Use parameterized queries to separate SQL code from user input
Utilize stored procedures to encapsulate SQL logic and prevent direct access to the database
Regularly update and patch the database management system to address any vulnerabilities
Implement a web application firewall (WAF) to detec...read more
Q15. Explain how you test GITCs and ITACs.
GITCs and ITACs are tested through a combination of manual and automated testing methods.
Manual testing involves reviewing the code and verifying that it meets the required standards.
Automated testing involves using tools like Selenium and JUnit to test the functionality of the code.
GITCs are tested by ensuring that they are properly integrated into the system and that they function as expected.
ITACs are tested by verifying that they meet the required security and compliance ...read more
Q16. Draft 5 observation along with risk and implications
Observations, risks, and implications for an Assistant Manager role
Observation 1: Lack of clear communication among team members
Risk 1: Misunderstandings leading to errors in tasks
Implication 1: Decreased productivity and potential conflicts within the team
Observation 2: High employee turnover rate
Risk 2: Difficulty in maintaining a stable and experienced team
Implication 2: Increased recruitment and training costs, impact on team morale
Observation 3: Inconsistent adherence to...read more
Q17. How to create empty dataframe in python
Use pandas library to create an empty dataframe in Python.
Import the pandas library: import pandas as pd
Create an empty dataframe: df = pd.DataFrame()
Q18. What are UATs in change management
UATs in change management refer to User Acceptance Tests, which are conducted to ensure that changes made to a system meet user requirements.
UATs are performed by end users or stakeholders to validate that the system meets their needs and functions correctly.
UATs are typically the final phase of testing before implementing changes in a production environment.
UATs help to identify any issues or discrepancies between the expected and actual outcomes of the changes.
Examples of U...read more
Q19. Tell me about different type of risks
Different types of risks include financial risk, operational risk, strategic risk, compliance risk, and reputational risk.
Financial risk: Risk related to financial markets, such as market risk, credit risk, and liquidity risk.
Operational risk: Risk of loss resulting from inadequate or failed internal processes, people, and systems.
Strategic risk: Risk related to the organization's long-term goals and objectives, such as competition and market changes.
Compliance risk: Risk of ...read more
Q20. CI/CD implementation and importance
CI/CD implementation is crucial for automating software delivery processes, ensuring faster and more reliable deployments.
CI/CD stands for Continuous Integration/Continuous Delivery
Automates the process of integrating code changes, testing, and deploying to production
Reduces manual errors, speeds up development cycles, and improves overall software quality
Examples: Jenkins, GitLab CI/CD, CircleCI
Q21. What is your area of interest?
My area of interest is in strategic planning and project management.
I have a strong passion for developing and implementing strategic plans to achieve organizational goals.
I excel in project management, ensuring tasks are completed on time and within budget.
I enjoy analyzing data and making informed decisions to drive business success.
Q22. What is the process of audit ?
Audit process involves examining financial records, transactions, and operations to ensure accuracy and compliance with regulations.
Planning the audit by understanding the business and identifying key risks
Gathering evidence through testing transactions and balances
Evaluating the evidence to determine if financial statements are accurate and comply with regulations
Communicating findings and recommendations to management
Following up on any corrective actions taken by managemen...read more
Q23. diff in Captive industry and BPO company.
Captive industry refers to companies that are owned and operated by the parent company, while BPO companies provide services to other companies.
Captive industry companies are usually set up to handle specific functions for the parent company, while BPO companies offer services to multiple clients.
Captive industry companies have a more direct relationship with the parent company, while BPO companies have a more independent client-provider relationship.
Examples of captive indus...read more
Q24. 1. Troubleshooting of BI authorisations
Troubleshooting BI authorisations
Identify the specific issue with the BI authorisation
Check if the user has the necessary permissions
Verify if the data source is correctly configured
Review the security settings and roles assigned to the user
Test the authorisation by logging in as the user
Document the troubleshooting steps and resolution
Q25. Relay State definition and significance
Relay state is a parameter used in SAML authentication to maintain state information.
Relay state is used to maintain state information during SAML authentication.
It is a parameter that is sent along with the SAML request and response messages.
The value of the relay state parameter is opaque to the SAML protocol and is used by the service provider to maintain state information.
For example, if a user is redirected to a login page during SAML authentication, the relay state para...read more
Q26. Revenue recognition as per Ind AS 115
Ind AS 115 outlines the principles for recognizing revenue from contracts with customers.
Revenue is recognized when control of goods or services is transferred to the customer
Revenue is recognized at an amount that reflects the consideration the entity expects to receive in exchange for those goods or services
Revenue recognition may be over time or at a point in time, depending on the terms of the contract
Ind AS 115 requires entities to disclose information about their contra...read more
Q27. Doc pricing procedure used
We use a tiered pricing procedure based on customer type and quantity purchased.
Tiered pricing based on customer type (retail, wholesale, etc.)
Discounts applied for larger quantities purchased
Regularly review and adjust pricing based on market trends
Utilize pricing software to streamline the process
Q28. How do you desgin UI screen
Designing UI screens involves understanding user needs, creating wireframes, choosing color schemes, and ensuring a user-friendly layout.
Understand user needs and requirements
Create wireframes to visualize layout and functionality
Choose appropriate color schemes and fonts for readability
Ensure a user-friendly layout with intuitive navigation
Test the UI design with users for feedback and improvements
Q29. What is access control testing
Access control testing is a process of evaluating the security measures in place to ensure only authorized users have access to resources.
Access control testing involves assessing the effectiveness of access control mechanisms such as passwords, biometrics, and encryption.
It includes testing for vulnerabilities such as weak passwords, unauthorized access, and privilege escalation.
Examples of access control testing tools include Nessus, OpenVAS, and Burp Suite.
Q30. How the act is enacted
The act is enacted through a series of steps and procedures to ensure compliance and implementation.
The act is typically passed by a legislative body, such as a parliament or congress.
It may involve the creation of regulations and guidelines to clarify the intent of the act.
Enforcement mechanisms are put in place to ensure compliance with the act.
Monitoring and evaluation processes are often established to assess the effectiveness of the act.
Amendments or revisions may be mad...read more
Q31. Assertions of financial statements
Assertions of financial statements ensure accuracy and reliability of financial information.
Assertions include completeness, accuracy, valuation, rights and obligations, and presentation and disclosure.
Completeness ensures all transactions and balances are recorded.
Accuracy ensures transactions are recorded at the correct amounts.
Valuation ensures assets and liabilities are recorded at their appropriate values.
Rights and obligations ensure the entity has legal rights to asset...read more
Q32. Audit procedure of payroll expenses
Audit procedure of payroll expenses involves reviewing payroll records, verifying accuracy, checking for compliance with laws and regulations.
Review payroll records for accuracy and completeness
Verify payroll expenses against approved budgets and contracts
Check for compliance with labor laws and regulations
Confirm that payroll taxes are calculated correctly
Compare payroll expenses to previous periods for consistency
Perform random audits of payroll transactions for accuracy
Q33. How good is your sql
I have strong SQL skills with experience in writing complex queries and optimizing database performance.
Proficient in writing complex SQL queries
Experience in optimizing database performance
Familiar with database management systems like MySQL, SQL Server, and Oracle
Q34. Interpretation of Direct tax law
Interpretation of direct tax law involves understanding and applying tax regulations to determine tax liabilities.
Understanding tax laws and regulations
Applying tax laws to determine tax liabilities
Interpreting tax codes and guidelines
Analyzing tax implications of financial transactions
Ensuring compliance with tax laws
Q35. Different Okta APIs
Okta provides various APIs for different purposes.
Okta Management API for managing users, groups, and applications
Okta Authentication API for authentication and authorization
Okta Factors API for managing multi-factor authentication
Okta Events API for retrieving audit logs and events
Okta Authorization Servers API for managing OAuth 2.0 authorization servers
Q36. Difference between accrual and prepaid
Accrual is revenue or expense recorded before cash is exchanged, while prepaid is cash paid before receiving goods or services.
Accrual involves recognizing revenue or expenses when they are incurred, regardless of when cash is exchanged.
Prepaid involves paying for goods or services before actually receiving them.
Accrual is used to match revenue and expenses to the time period in which they are incurred, while prepaid is used to recognize expenses when the cash is paid.
Example...read more
Q37. Gst latest provisions
GST latest provisions include changes in return filing, input tax credit, and e-invoicing.
The due date for filing GSTR-3B has been extended to the 20th of the following month.
Input tax credit can now be claimed only up to 5% of the eligible credit available in GSTR-2B.
E-invoicing is now mandatory for businesses with an annual turnover of over Rs. 50 crore.
The GST council has also introduced a new QR code system for B2C invoices to facilitate digital payments.
The late fee for ...read more
Q38. CARO 2016 vs CARO 2020
CARO 2016 focused on reporting requirements for auditors, while CARO 2020 expanded the scope to include additional reporting requirements for companies.
CARO 2016 primarily focused on reporting requirements for auditors to report on financial statements and internal controls.
CARO 2020 expanded the scope to include reporting requirements related to fraud, default in repayment of loans, utilization of funds, etc.
CARO 2020 also introduced new reporting requirements for related pa...read more
Q39. Audit procedure of revenue
Audit procedure of revenue involves verifying the accuracy and completeness of revenue transactions.
Reviewing sales contracts and agreements
Testing the accuracy of revenue recognition
Confirming revenue with customers
Analyzing revenue trends and anomalies
Checking for proper documentation and authorization
Performing cutoff tests to ensure revenue is recorded in the correct period
Q40. 16 steps of pp
16 steps of the production planning process
1. Forecasting demand for products
2. Developing a production plan based on demand
3. Determining the resources needed for production
4. Scheduling production activities
5. Procuring raw materials and components
6. Setting up production facilities
7. Training staff on production processes
8. Monitoring production progress
9. Quality control of products
10. Packaging finished products
11. Storing finished products
12. Distributing products to cu...read more
Q41. Explain Ind AS 115
Ind AS 115 is a revenue recognition standard that establishes principles for recognizing revenue from contracts with customers.
Ind AS 115 replaces the existing revenue recognition guidance in Ind AS 18 and Ind AS 11.
It introduces a five-step model for revenue recognition: identify the contract, identify the performance obligations, determine the transaction price, allocate the transaction price to the performance obligations, and recognize revenue as the performance obligatio...read more
More about working at Deloitte
Top HR Questions asked in Hotel Grand Kailash
Interview Process at Hotel Grand Kailash
Top Assistant Manager Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month