i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 4 interview rounds.
DNS protocol is used to translate domain names into IP addresses.
DNS stands for Domain Name System
It is responsible for resolving domain names to IP addresses
DNS uses a hierarchical system of servers to perform this translation
DNS queries can be cached to improve performance
Examples of DNS servers include Google DNS and OpenDNS
ICMP does not have a port number.
ICMP is a protocol that operates at the network layer of the OSI model.
It is used for error reporting, network congestion control, and other purposes.
Unlike TCP and UDP, ICMP does not have a port number.
Instead, it uses message types and codes to communicate information.
Parameterized queries can prevent SQL injection attacks.
Parameterized queries use placeholders for user input, preventing malicious SQL code injection.
They are more secure than concatenating user input into SQL statements.
Example: SELECT * FROM users WHERE username = ? AND password = ?
The question marks are replaced with user input, preventing SQL injection.
LFI, RFI, and Path Traversal are all types of web application vulnerabilities.
LFI (Local File Inclusion) is a vulnerability that allows an attacker to include files on a server through the web application.
RFI (Remote File Inclusion) is a vulnerability that allows an attacker to include files from a remote server through the web application.
Path Traversal is a vulnerability that allows an attacker to access files outsid...
Exploiting a JBoss based application
Exploit known vulnerabilities in JBoss and its components
Use brute force attacks to guess weak passwords
Perform SQL injection attacks to gain access to the database
Use cross-site scripting (XSS) attacks to inject malicious code
Exploit misconfigured security settings
Use social engineering to trick users into revealing sensitive information
Perform man-in-the-middle attacks to intercept...
Aptitude Test with 25 question in 30 Minutes
Experienced Solution Advisor with a background in IT consulting and project management.
Over 5 years of experience in IT consulting and project management
Strong background in analyzing client needs and providing tailored solutions
Proficient in leading cross-functional teams to successful project completion
I faced challenges while implementing a new software system at my previous job.
The software system had compatibility issues with existing systems
There were resistance from some team members to adapt to the new system
I had to troubleshoot and find solutions to ensure smooth implementation
I applied via Referral and was interviewed in May 2024. There was 1 interview round.
Assumptions of linear regression include linearity, independence, homoscedasticity, and normality.
Linearity: The relationship between the independent and dependent variables is linear.
Independence: The residuals are independent of each other.
Homoscedasticity: The variance of the residuals is constant across all levels of the independent variables.
Normality: The residuals are normally distributed.
Outliers and influentia
You can refer to other measures like ROC-AUC, precision-recall curve, F1 score, etc.
ROC-AUC: Receiver Operating Characteristic - Area Under the Curve
Precision-recall curve: Trade-off between precision and recall
F1 score: Harmonic mean of precision and recall
What people are saying about Deloitte
Deloitte interview questions for designations
I applied via Naukri.com
SQL related questions
Get interview-ready with Top Deloitte Interview Questions
I applied via Naukri.com and was interviewed before Aug 2023. There was 1 interview round.
Successfully implemented a new CRM system resulting in a 20% increase in sales productivity.
Led the project team in the implementation of the new CRM system
Provided training and support to staff on how to use the new system effectively
Analyzed data and metrics to track the impact of the CRM system on sales productivity
I applied via LinkedIn and was interviewed before Feb 2023. There were 2 interview rounds.
OWASP Top 10 attacks are common web application vulnerabilities.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
XXE Attack is an XML External Entity attack that exploits the vulnerability of parsing XML input.
XXE Attack is a type of attack that targets applications that parse XML input.
It allows an attacker to read files on the server, execute remote code, or perform denial of service attacks.
The attack occurs when an application processes XML input that contains a reference to an external entity.
By manipulating the external ent...
PKI Infrastructure is a system of digital certificates, public key encryption, and trusted authorities used to secure communication and verify identities.
PKI stands for Public Key Infrastructure.
It is a framework that enables secure communication over an insecure network.
PKI uses digital certificates to verify the authenticity of entities and establish trust.
It involves the use of public and private key pairs for encry...
I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in May 2022. There was 1 interview round.
SPAC process is a method of taking a private company public through a merger with a special purpose acquisition company.
SPAC is formed as a shell company with no commercial operations
SPAC raises funds through an IPO to acquire a private company
Private company merges with SPAC and becomes publicly traded
SPAC process has a life cycle of 18-24 months
Examples of successful SPAC mergers include DraftKings and Virgin Galacti
Pipe financing is a common method of raising capital in SPAC transactions.
Pipe financing involves selling shares to institutional investors at a discounted price.
This allows the SPAC to raise additional capital to fund the merger or acquisition.
Pipe investors typically receive warrants or other incentives to participate.
Pipe financing can be a faster and more efficient way to raise capital than traditional IPOs.
However...
I applied via Referral and was interviewed before Sep 2022. There were 3 interview rounds.
I was interviewed before Mar 2023.
Some of the top questions asked at the Deloitte Solution Advisor interview -
The duration of Deloitte Solution Advisor interview process can vary, but typically it takes about less than 2 weeks to complete.
1 Interview rounds
based on 140 reviews
Rating in categories
Consultant
32.6k
salaries
| ₹6.2 L/yr - ₹23 L/yr |
Senior Consultant
20.8k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
13.8k
salaries
| ₹3.8 L/yr - ₹12.6 L/yr |
Assistant Manager
9.9k
salaries
| ₹7.5 L/yr - ₹24 L/yr |
Manager
6.9k
salaries
| ₹15.5 L/yr - ₹53 L/yr |
Accenture
PwC
Ernst & Young
Cognizant