Filter interviews by
ALM stands for Asset Liability Management, which involves managing the risks arising from mismatches between assets and liabilities.
ALM involves managing the risks associated with the assets and liabilities of a financial institution.
It aims to ensure that the institution has enough assets to cover its liabilities and meet its obligations.
ALM involves monitoring interest rate risk, liquidity risk, and credit risk.
...
Banks make profit primarily through interest earned on loans, fees charged for services, and investments.
Interest earned on loans: Banks charge interest on loans provided to customers, generating revenue.
Fees charged for services: Banks charge fees for services such as account maintenance, overdrafts, and wire transfers.
Investments: Banks invest in various financial instruments to generate returns, such as stocks,...
Understanding the INDEX MATCH formula for data retrieval in Excel.
INDEX returns the value of a cell in a table based on row and column numbers.
MATCH finds the position of a value in a range, returning its relative position.
Example: =INDEX(A1:A10, MATCH('Value', B1:B10, 0)) retrieves 'Value' from column A based on its position in column B.
INDEX MATCH is more flexible than VLOOKUP, allowing for left-side lookups.
A procedure does not return a value, while a function returns a value.
Procedure is used to perform an action, while function is used to compute and return a value.
Procedures can have OUT parameters to return values, while functions always return a single value.
Functions can be used in SQL queries, while procedures cannot be used in SQL queries.
What people are saying about Deutsche Bank
Cursors in PL/SQL are used to retrieve and manipulate data row by row from a result set.
Cursors can be explicit or implicit. Explicit cursors are defined by the programmer.
Example of an explicit cursor: DECLARE cursor_name CURSOR FOR SELECT * FROM table_name;
Cursors allow for row-by-row processing, which is useful for complex business logic.
Use OPEN, FETCH, and CLOSE statements to manage cursors.
Example: OPEN curs...
AML stands for Anti-Money Laundering. It is a process designed to prevent criminals from disguising illegally obtained funds as legitimate income.
AML involves implementing policies and procedures to detect and prevent money laundering activities.
The process includes customer due diligence, monitoring transactions, and reporting suspicious activities to regulatory authorities.
Examples of AML measures include verify...
Handle change requests by evaluating impact, discussing with stakeholders, adjusting priorities, and communicating effectively.
Evaluate the impact of the change request on current sprint goals and timeline.
Discuss the change request with stakeholders to understand the rationale and urgency.
Adjust priorities within the sprint backlog if necessary to accommodate the change.
Communicate effectively with the team about...
Find two indices in an array whose sum is closest to 0.
Sort the array to simplify the process.
Use two pointers approach starting from both ends towards the middle.
Keep track of the closest sum found so far.
Pod is the smallest deployable unit in Kubernetes, while deployment manages a set of identical pods.
Pod is a single instance of a running container in Kubernetes
Deployment manages a set of identical pods, ensuring they are always running and available
Pods can be created directly, but deployments are typically used for managing pods in production environments
Find the first non-repeating character in a string using Java 8.
Use Java 8 streams to convert the string to a character array.
Use Collectors.groupingBy to group the characters by count.
Filter out characters with count > 1 and find the first character with count 1.
My priority in my career is continuous learning and growth, followed by making a positive impact in the organization.
Continuous learning through training, certifications, and staying updated with industry trends
Seeking opportunities for growth and advancement within the organization
Contributing positively to the organization's goals and objectives
Balancing personal and professional development to achieve long-term succ...
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
HashMap is not thread-safe, ConcurrentHashMap allows concurrent access, synchronized HashMap uses explicit synchronization.
HashMap is not thread-safe and can lead to ConcurrentModificationException if accessed by multiple threads simultaneously.
ConcurrentHashMap allows concurrent access by multiple threads without the need for external synchronization.
Synchronized HashMap uses explicit synchronization to make it thread...
A lambda expression is a concise way to represent an anonymous function, often used with functional interfaces in Java.
Lambda expressions provide a way to pass functionality as an argument to a method.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Example: (x, y) -> x + y is a lambda expression that takes two parameters and returns their sum.
I appeared for an interview in Apr 2025, where I was asked the following questions.
I appeared for an interview in Aug 2024.
MATLAB is a high-level programming language and interactive environment for numerical computation, visualization, and programming.
MATLAB stands for Matrix Laboratory.
It is widely used in engineering, science, and economics for data analysis, simulation, and modeling.
MATLAB allows for easy matrix manipulation and plotting of functions and data.
It supports various toolboxes for specialized tasks like signal processing, i...
GUI can be used to interact with software applications through graphical elements like buttons, menus, and icons.
GUI stands for Graphical User Interface
Users can interact with software applications by clicking on buttons, selecting from menus, and dragging icons
GUIs make it easier for users to navigate and interact with software compared to text-based interfaces
Examples of GUIs include Windows operating system, web bro...
I view criticism as an opportunity for growth and improvement.
I listen carefully to the feedback and try to understand the perspective of the person giving it.
I reflect on the criticism to see if there are valid points that I can learn from.
I use criticism as a motivation to work harder and improve my skills.
I seek constructive criticism to help me grow professionally.
I remain open-minded and avoid taking criticism per...
I applied via Approached by Company and was interviewed in Jul 2024. There was 1 interview round.
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
A palindrome is a word, phrase, or sequence that reads the same backward as forward, like 'madam' or 'racecar'.
A simple palindrome check can be done by reversing the string and comparing it to the original.
Example: 'level' is a palindrome because reversing it gives 'level'.
For phrases, ignore spaces and punctuation: 'A man, a plan, a canal, Panama!' is a palindrome.
In Java, you can use StringBuilder to reverse a string...
I applied via Approached by Company and was interviewed in Feb 2024. There were 5 interview rounds.
A Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image.
Use the FROM instruction to specify the base image
Use the RUN instruction to execute commands in the container
Use the COPY instruction to copy files from the host to the container
Use the CMD instruction to specify the command to run when the container starts
Write a yaml file for deployment kind
Use 'kind: Deployment' to specify the type of deployment
Include metadata like name and labels
Define spec with containers, image, ports, etc.
Use a shell script to extract alphabets from an alphanumeric word.
Use the tr command to delete all non-alphabetic characters from the word.
Store the result in an array of strings for multiple words.
Example: word='abc123'; result=$(echo $word | tr -d '0-9'); echo $result
Networking in Kubernetes cluster involves communication between pods and services.
Kubernetes uses a flat networking model where each pod gets its own IP address.
Pods can communicate with each other using their IP addresses.
Services act as a stable endpoint for pods, allowing them to communicate with each other.
Kubernetes networking plugins like Calico, Flannel, and Cilium help manage networking within the cluster.
Security in Kubernetes cluster involves implementing RBAC, network policies, pod security policies, and regular security audits.
Implement Role-Based Access Control (RBAC) to control access to resources within the cluster
Use network policies to restrict traffic between pods and namespaces
Enforce Pod Security Policies to define security settings for pods
Regularly conduct security audits and vulnerability assessments to i...
DB offers a challenging work environment, opportunities for growth, and a strong reputation in the industry.
DB offers a challenging work environment that will allow me to further develop my skills and knowledge.
DB provides opportunities for growth and advancement within the company, which is important for my career development.
DB has a strong reputation in the industry for its innovative solutions and commitment to exc...
Some of the top questions asked at the Deutsche Bank interview for experienced candidates -
The duration of Deutsche Bank interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 97 interview experiences
Difficulty level
Duration
based on 3.9k reviews
Rating in categories
Associate
5.3k
salaries
| ₹8 L/yr - ₹33.5 L/yr |
Senior Analyst
4k
salaries
| ₹4 L/yr - ₹17.1 L/yr |
Assistant Vice President
3.9k
salaries
| ₹16.6 L/yr - ₹48.4 L/yr |
Analyst
2.3k
salaries
| ₹3 L/yr - ₹13 L/yr |
Vice President
941
salaries
| ₹31.6 L/yr - ₹94 L/yr |
Barclays
JPMorgan Chase & Co.
Kotak Mahindra Bank
AU Small Finance Bank