Add office photos
Premium Employer

Deloitte

3.8
based on 17.6k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

40+ Hotel Grand Kailash Interview Questions and Answers

Updated 4 Nov 2024
Popular Designations

Q1. Explain how you test a change management control when the application doesn't store the updates log.

Ans.

Testing change management control without update log

  • Create a test environment to simulate the change

  • Document the change and expected outcome

  • Perform the change and observe the system behavior

  • Compare the system behavior with the expected outcome

  • Repeat the process with different scenarios

  • Use version control to track changes

View 1 answer

Q2. How will you deal with bulk data that needs to be reconciled

Ans.

I will break down the data into smaller chunks and prioritize based on urgency.

  • Create a plan of action and prioritize based on urgency

  • Break down the data into smaller chunks to make it more manageable

  • Use software tools to assist with the reconciliation process

  • Ensure accuracy by double-checking and verifying data

  • Communicate progress and any issues to relevant parties

View 1 answer

Q3. If I give you a web application for testing, what the prerequisites you ask for before proceeding to testing.

Ans.

The prerequisites for testing a web application include understanding the application's requirements, having access to the application's documentation, and setting up a suitable testing environment.

  • Understanding the application's requirements and functionality

  • Access to the application's documentation, including user manuals and technical specifications

  • Setting up a suitable testing environment, including necessary hardware, software, and network configurations

  • Identifying any d...read more

Add your answer

Q4. what ae the stages of MSMP workflow?

Ans.

MSMP workflow stages include request creation, request approval, request execution, and request completion.

  • Request creation: User creates a request for a specific action.

  • Request approval: Request is reviewed and approved by designated approvers.

  • Request execution: Approved request is executed by the system.

  • Request completion: System updates the request status and notifies the user.

View 1 answer
Discover Hotel Grand Kailash interview dos and don'ts from real experiences

Q5. What is the most critical vulnerability you have identified till now.

Ans.

The most critical vulnerability I have identified is a security flaw in our company's online payment system.

  • The vulnerability allowed unauthorized access to customer payment information.

  • I discovered this vulnerability during a routine security audit.

  • It could have resulted in significant financial loss and damage to our company's reputation.

  • I immediately reported the vulnerability to the IT department and worked with them to implement necessary security patches.

  • Regular securit...read more

Add your answer

Q6. Are flexible with relocation

Ans.

Yes, I am flexible with relocation.

  • I am open to exploring new opportunities in different locations.

  • I understand that relocation may be necessary for career growth.

  • I am willing to consider all options and make a decision based on what is best for the company and my career.

  • I have relocated in the past for work and am familiar with the process.

  • I am excited about the possibility of experiencing new places and cultures.

View 2 more answers
Are these interview questions helpful?

Q7. What are disclosure requirement under schedule 3 for MSME creditors ?

Ans.

Disclosure requirements under schedule 3 for MSME creditors include providing details of outstanding dues, reasons for delay in payment, and steps taken to address delays.

  • MSME creditors must disclose details of outstanding dues to MSME suppliers.

  • Reasons for delay in payment must be disclosed by MSME creditors.

  • Steps taken to address delays in payment should be disclosed by MSME creditors.

  • Disclosure requirements aim to promote transparency and timely payments in the MSME sector...read more

Add your answer

Q8. What are the skillset you have in information security

Ans.

I have a strong skillset in information security, including knowledge of network security, encryption, and vulnerability assessment.

  • Knowledge of network security protocols and best practices

  • Experience with encryption algorithms and techniques

  • Proficiency in conducting vulnerability assessments and penetration testing

  • Familiarity with security frameworks and compliance standards (e.g., ISO 27001, NIST)

  • Ability to analyze and respond to security incidents

  • Understanding of secure co...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is difference between Financial and non financial assets ?

Ans.

Financial assets are tangible assets like cash, stocks, bonds, etc. Non-financial assets are intangible assets like goodwill, patents, trademarks, etc.

  • Financial assets have a monetary value and can be easily converted into cash, such as stocks, bonds, and cash.

  • Non-financial assets do not have a monetary value and are not easily converted into cash, such as goodwill, patents, and trademarks.

  • Financial assets are typically listed on a company's balance sheet, while non-financial...read more

Add your answer

Q10. Indas vs As, IFCR, Indas 109, CARO2020 vs 16, revenue audit process

Ans.

The question covers various accounting standards and audit processes.

  • IndAS and AS are two sets of accounting standards used in India.

  • IFCR is a global accounting standard for financial instruments.

  • IndAS 109 is an accounting standard for financial instruments.

  • CARO 2020 and 2016 are two versions of the Companies Auditor's Report Order.

  • Revenue audit process is a review of a company's revenue recognition policies and practices.

Add your answer

Q11. Difference between Saml and OIDC

Ans.

SAML and OIDC are both authentication protocols, but SAML is XML-based while OIDC is JSON-based.

  • SAML is older and more widely used in enterprise environments

  • OIDC is newer and more commonly used in web and mobile applications

  • SAML uses XML for messages while OIDC uses JSON

  • SAML is more complex and requires more configuration than OIDC

  • OIDC supports more modern authentication features like single sign-on and multi-factor authentication

View 2 more answers

Q12. 2. What are the type of firefighting

Ans.

There are four types of firefighting: structural, wildland, industrial, and municipal.

  • Structural firefighting involves extinguishing fires in buildings and other structures.

  • Wildland firefighting involves extinguishing fires in forests, grasslands, and other outdoor areas.

  • Industrial firefighting involves extinguishing fires in industrial settings such as factories and warehouses.

  • Municipal firefighting involves providing fire protection and emergency services to a specific city...read more

Add your answer

Q13. 1. Vov4 2.16 steps 3. Why do we use different doc pricing procedure 4.third party

Ans.

Different doc pricing procedures are used for various reasons such as cost differentiation, customer segmentation, and legal compliance.

  • Cost differentiation - Different pricing procedures may be used to reflect the varying costs associated with different types of documents or services.

  • Customer segmentation - Pricing procedures can be tailored to different customer segments based on their willingness to pay or value perception.

  • Legal compliance - Certain industries or regions m...read more

Add your answer

Q14. What are the countermeasures for SQL injection

Ans.

Countermeasures for SQL injection include input validation, parameterized queries, and stored procedures.

  • Implement input validation to ensure that user input is within expected parameters

  • Use parameterized queries to separate SQL code from user input

  • Utilize stored procedures to encapsulate SQL logic and prevent direct access to the database

  • Regularly update and patch the database management system to address any vulnerabilities

  • Implement a web application firewall (WAF) to detec...read more

Add your answer

Q15. Explain how you test GITCs and ITACs.

Ans.

GITCs and ITACs are tested through a combination of manual and automated testing methods.

  • Manual testing involves reviewing the code and verifying that it meets the required standards.

  • Automated testing involves using tools like Selenium and JUnit to test the functionality of the code.

  • GITCs are tested by ensuring that they are properly integrated into the system and that they function as expected.

  • ITACs are tested by verifying that they meet the required security and compliance ...read more

Add your answer

Q16. Draft 5 observation along with risk and implications

Ans.

Observations, risks, and implications for an Assistant Manager role

  • Observation 1: Lack of clear communication among team members

  • Risk 1: Misunderstandings leading to errors in tasks

  • Implication 1: Decreased productivity and potential conflicts within the team

  • Observation 2: High employee turnover rate

  • Risk 2: Difficulty in maintaining a stable and experienced team

  • Implication 2: Increased recruitment and training costs, impact on team morale

  • Observation 3: Inconsistent adherence to...read more

Add your answer

Q17. How to create empty dataframe in python

Ans.

Use pandas library to create an empty dataframe in Python.

  • Import the pandas library: import pandas as pd

  • Create an empty dataframe: df = pd.DataFrame()

Add your answer

Q18. What are UATs in change management

Ans.

UATs in change management refer to User Acceptance Tests, which are conducted to ensure that changes made to a system meet user requirements.

  • UATs are performed by end users or stakeholders to validate that the system meets their needs and functions correctly.

  • UATs are typically the final phase of testing before implementing changes in a production environment.

  • UATs help to identify any issues or discrepancies between the expected and actual outcomes of the changes.

  • Examples of U...read more

Add your answer

Q19. Tell me about different type of risks

Ans.

Different types of risks include financial risk, operational risk, strategic risk, compliance risk, and reputational risk.

  • Financial risk: Risk related to financial markets, such as market risk, credit risk, and liquidity risk.

  • Operational risk: Risk of loss resulting from inadequate or failed internal processes, people, and systems.

  • Strategic risk: Risk related to the organization's long-term goals and objectives, such as competition and market changes.

  • Compliance risk: Risk of ...read more

Add your answer

Q20. CI/CD implementation and importance

Ans.

CI/CD implementation is crucial for automating software delivery processes, ensuring faster and more reliable deployments.

  • CI/CD stands for Continuous Integration/Continuous Delivery

  • Automates the process of integrating code changes, testing, and deploying to production

  • Reduces manual errors, speeds up development cycles, and improves overall software quality

  • Examples: Jenkins, GitLab CI/CD, CircleCI

Add your answer

Q21. What is your area of interest?

Ans.

My area of interest is in strategic planning and project management.

  • I have a strong passion for developing and implementing strategic plans to achieve organizational goals.

  • I excel in project management, ensuring tasks are completed on time and within budget.

  • I enjoy analyzing data and making informed decisions to drive business success.

Add your answer

Q22. What is the process of audit ?

Ans.

Audit process involves examining financial records, transactions, and operations to ensure accuracy and compliance with regulations.

  • Planning the audit by understanding the business and identifying key risks

  • Gathering evidence through testing transactions and balances

  • Evaluating the evidence to determine if financial statements are accurate and comply with regulations

  • Communicating findings and recommendations to management

  • Following up on any corrective actions taken by managemen...read more

Add your answer

Q23. diff in Captive industry and BPO company.

Ans.

Captive industry refers to companies that are owned and operated by the parent company, while BPO companies provide services to other companies.

  • Captive industry companies are usually set up to handle specific functions for the parent company, while BPO companies offer services to multiple clients.

  • Captive industry companies have a more direct relationship with the parent company, while BPO companies have a more independent client-provider relationship.

  • Examples of captive indus...read more

Add your answer

Q24. 1. Troubleshooting of BI authorisations

Ans.

Troubleshooting BI authorisations

  • Identify the specific issue with the BI authorisation

  • Check if the user has the necessary permissions

  • Verify if the data source is correctly configured

  • Review the security settings and roles assigned to the user

  • Test the authorisation by logging in as the user

  • Document the troubleshooting steps and resolution

Add your answer

Q25. Relay State definition and significance

Ans.

Relay state is a parameter used in SAML authentication to maintain state information.

  • Relay state is used to maintain state information during SAML authentication.

  • It is a parameter that is sent along with the SAML request and response messages.

  • The value of the relay state parameter is opaque to the SAML protocol and is used by the service provider to maintain state information.

  • For example, if a user is redirected to a login page during SAML authentication, the relay state para...read more

Add your answer

Q26. Revenue recognition as per Ind AS 115

Ans.

Ind AS 115 outlines the principles for recognizing revenue from contracts with customers.

  • Revenue is recognized when control of goods or services is transferred to the customer

  • Revenue is recognized at an amount that reflects the consideration the entity expects to receive in exchange for those goods or services

  • Revenue recognition may be over time or at a point in time, depending on the terms of the contract

  • Ind AS 115 requires entities to disclose information about their contra...read more

Add your answer

Q27. Doc pricing procedure used

Ans.

We use a tiered pricing procedure based on customer type and quantity purchased.

  • Tiered pricing based on customer type (retail, wholesale, etc.)

  • Discounts applied for larger quantities purchased

  • Regularly review and adjust pricing based on market trends

  • Utilize pricing software to streamline the process

Add your answer

Q28. How do you desgin UI screen

Ans.

Designing UI screens involves understanding user needs, creating wireframes, choosing color schemes, and ensuring a user-friendly layout.

  • Understand user needs and requirements

  • Create wireframes to visualize layout and functionality

  • Choose appropriate color schemes and fonts for readability

  • Ensure a user-friendly layout with intuitive navigation

  • Test the UI design with users for feedback and improvements

Add your answer

Q29. What is access control testing

Ans.

Access control testing is a process of evaluating the security measures in place to ensure only authorized users have access to resources.

  • Access control testing involves assessing the effectiveness of access control mechanisms such as passwords, biometrics, and encryption.

  • It includes testing for vulnerabilities such as weak passwords, unauthorized access, and privilege escalation.

  • Examples of access control testing tools include Nessus, OpenVAS, and Burp Suite.

Add your answer

Q30. How the act is enacted

Ans.

The act is enacted through a series of steps and procedures to ensure compliance and implementation.

  • The act is typically passed by a legislative body, such as a parliament or congress.

  • It may involve the creation of regulations and guidelines to clarify the intent of the act.

  • Enforcement mechanisms are put in place to ensure compliance with the act.

  • Monitoring and evaluation processes are often established to assess the effectiveness of the act.

  • Amendments or revisions may be mad...read more

Add your answer

Q31. Assertions of financial statements

Ans.

Assertions of financial statements ensure accuracy and reliability of financial information.

  • Assertions include completeness, accuracy, valuation, rights and obligations, and presentation and disclosure.

  • Completeness ensures all transactions and balances are recorded.

  • Accuracy ensures transactions are recorded at the correct amounts.

  • Valuation ensures assets and liabilities are recorded at their appropriate values.

  • Rights and obligations ensure the entity has legal rights to asset...read more

Add your answer

Q32. Audit procedure of payroll expenses

Ans.

Audit procedure of payroll expenses involves reviewing payroll records, verifying accuracy, checking for compliance with laws and regulations.

  • Review payroll records for accuracy and completeness

  • Verify payroll expenses against approved budgets and contracts

  • Check for compliance with labor laws and regulations

  • Confirm that payroll taxes are calculated correctly

  • Compare payroll expenses to previous periods for consistency

  • Perform random audits of payroll transactions for accuracy

Add your answer

Q33. How good is your sql

Ans.

I have strong SQL skills with experience in writing complex queries and optimizing database performance.

  • Proficient in writing complex SQL queries

  • Experience in optimizing database performance

  • Familiar with database management systems like MySQL, SQL Server, and Oracle

Add your answer

Q34. Interpretation of Direct tax law

Ans.

Interpretation of direct tax law involves understanding and applying tax regulations to determine tax liabilities.

  • Understanding tax laws and regulations

  • Applying tax laws to determine tax liabilities

  • Interpreting tax codes and guidelines

  • Analyzing tax implications of financial transactions

  • Ensuring compliance with tax laws

Add your answer

Q35. Different Okta APIs

Ans.

Okta provides various APIs for different purposes.

  • Okta Management API for managing users, groups, and applications

  • Okta Authentication API for authentication and authorization

  • Okta Factors API for managing multi-factor authentication

  • Okta Events API for retrieving audit logs and events

  • Okta Authorization Servers API for managing OAuth 2.0 authorization servers

Add your answer

Q36. Difference between accrual and prepaid

Ans.

Accrual is revenue or expense recorded before cash is exchanged, while prepaid is cash paid before receiving goods or services.

  • Accrual involves recognizing revenue or expenses when they are incurred, regardless of when cash is exchanged.

  • Prepaid involves paying for goods or services before actually receiving them.

  • Accrual is used to match revenue and expenses to the time period in which they are incurred, while prepaid is used to recognize expenses when the cash is paid.

  • Example...read more

Add your answer

Q37. Gst latest provisions

Ans.

GST latest provisions include changes in return filing, input tax credit, and e-invoicing.

  • The due date for filing GSTR-3B has been extended to the 20th of the following month.

  • Input tax credit can now be claimed only up to 5% of the eligible credit available in GSTR-2B.

  • E-invoicing is now mandatory for businesses with an annual turnover of over Rs. 50 crore.

  • The GST council has also introduced a new QR code system for B2C invoices to facilitate digital payments.

  • The late fee for ...read more

Add your answer

Q38. CARO 2016 vs CARO 2020

Ans.

CARO 2016 focused on reporting requirements for auditors, while CARO 2020 expanded the scope to include additional reporting requirements for companies.

  • CARO 2016 primarily focused on reporting requirements for auditors to report on financial statements and internal controls.

  • CARO 2020 expanded the scope to include reporting requirements related to fraud, default in repayment of loans, utilization of funds, etc.

  • CARO 2020 also introduced new reporting requirements for related pa...read more

Add your answer

Q39. Audit procedure of revenue

Ans.

Audit procedure of revenue involves verifying the accuracy and completeness of revenue transactions.

  • Reviewing sales contracts and agreements

  • Testing the accuracy of revenue recognition

  • Confirming revenue with customers

  • Analyzing revenue trends and anomalies

  • Checking for proper documentation and authorization

  • Performing cutoff tests to ensure revenue is recorded in the correct period

Add your answer

Q40. 16 steps of pp

Ans.

16 steps of the production planning process

  • 1. Forecasting demand for products

  • 2. Developing a production plan based on demand

  • 3. Determining the resources needed for production

  • 4. Scheduling production activities

  • 5. Procuring raw materials and components

  • 6. Setting up production facilities

  • 7. Training staff on production processes

  • 8. Monitoring production progress

  • 9. Quality control of products

  • 10. Packaging finished products

  • 11. Storing finished products

  • 12. Distributing products to cu...read more

Add your answer

Q41. Explain Ind AS 115

Ans.

Ind AS 115 is a revenue recognition standard that establishes principles for recognizing revenue from contracts with customers.

  • Ind AS 115 replaces the existing revenue recognition guidance in Ind AS 18 and Ind AS 11.

  • It introduces a five-step model for revenue recognition: identify the contract, identify the performance obligations, determine the transaction price, allocate the transaction price to the performance obligations, and recognize revenue as the performance obligatio...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Hotel Grand Kailash

based on 72 interviews
5 Interview rounds
Technical Round - 1
Technical Round - 2
Technical Round - 3
Behavioral Round
Personal Interview1 Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Assistant Manager Interview Questions from Similar Companies

3.9
 • 15 Interview Questions
3.6
 • 13 Interview Questions
4.2
 • 13 Interview Questions
3.7
 • 13 Interview Questions
3.7
 • 12 Interview Questions
4.0
 • 12 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter