Filter interviews by
I applied via campus placement at Banaras Hindu University (BHU), Varanasi and was interviewed before Jul 2023. There was 1 interview round.
I am a dedicated and experienced consultant with a strong background in problem-solving and client management.
Over 5 years of experience in consulting roles
Skilled in analyzing data and providing strategic recommendations
Proven track record of successfully managing client relationships
Strong communication and presentation skills
Certified in relevant consulting methodologies
The OSI (Open Systems Interconnection) model consists of 7 layers that define the functions of a network.
Physical layer - deals with physical connections and signals (e.g. Ethernet cables)
Data link layer - responsible for node-to-node communication (e.g. MAC addresses)
Network layer - handles routing and forwarding of data packets (e.g. IP addresses)
Transport layer - ensures end-to-end communication (e.g. TCP/UDP)
Sessio...
Private IP address ranges are reserved for use within private networks and are not routable on the public internet.
Private IP address ranges include 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255
These addresses are commonly used in home, office, and corporate networks to allow devices to communicate with each other within the same network
Private IP addresses are not unique ...
RFC 1918 refers to a set of IP address ranges reserved for private networks.
RFC 1918 defines three blocks of IP addresses that are reserved for private networks: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255
These private IP addresses are not routable on the public internet and are commonly used within organizations for internal networks
Using RFC 1918 addresses helps prevent c...
OSPF is a link-state routing protocol while EIGRP is a distance-vector routing protocol.
OSPF uses Dijkstra algorithm to calculate the shortest path while EIGRP uses Diffusing Update Algorithm (DUAL)
OSPF supports VLSM and CIDR while EIGRP does not
OSPF is an open standard protocol while EIGRP is Cisco proprietary
OSPF has a lower administrative distance (110) compared to EIGRP (90)
The types of BGP protocol include eBGP and iBGP.
eBGP (External BGP) is used between different AS (Autonomous Systems)
iBGP (Internal BGP) is used within the same AS
eBGP is typically used for connecting to external networks, while iBGP is used for internal routing within the same network
IPsec is a protocol suite for securing Internet Protocol (IP) communications. IKE is a key management protocol used with IPsec.
IPsec stands for Internet Protocol Security and is used to secure IP communications.
It provides authentication, encryption, and key management for network traffic.
IKE (Internet Key Exchange) is a key management protocol used with IPsec to establish security associations and negotiate cryptograp...
Main mode and aggressive mode are two different negotiation strategies used in business and consulting.
Main mode is a collaborative negotiation approach where parties work together to find mutually beneficial solutions.
Aggressive mode is a competitive negotiation approach where one party seeks to maximize their own gains at the expense of the other party.
Main mode focuses on building relationships and trust, while aggr...
IPSec Parameters are settings used to configure and control the IPSec protocol for secure communication over a network.
IPSec parameters include encryption algorithms such as AES, DES, and 3DES.
Authentication methods like HMAC-SHA1, HMAC-MD5, and digital certificates are also part of IPSec parameters.
Key exchange protocols such as IKEv1 and IKEv2 are used to establish secure communication channels.
IPSec parameters also ...
Next Generation Firewall (NGFW) is a network security system that integrates intrusion prevention, application awareness, and other advanced features.
NGFW combines traditional firewall capabilities with advanced security features like application control, intrusion prevention, and SSL inspection.
It provides deeper visibility into network traffic and more granular control over applications and users.
NGFWs can identify a...
NAT stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
NAT allows multiple devices on a local network to share a single public IP address.
There are different types of NAT such as Static NAT, Dynamic NAT, and PAT (Port Address Translation).
NAT helps improve security by hiding internal IP addresses from external networks.
Example: A home router u...
CompletableFuture is an enhanced version of Future in Java that provides more flexibility and functionality.
CompletableFuture is part of the Java 8 concurrency framework.
It allows chaining of multiple asynchronous operations.
CompletableFuture can be explicitly completed or cancelled.
It supports callbacks and combinators for handling completion.
Future is a basic interface for representing the result of an asynchronous c...
Composition is a design principle where objects are composed of other objects, while inheritance is a mechanism where objects inherit properties and behaviors from a parent object.
Composition promotes code reusability and flexibility by allowing objects to be composed of other objects.
Inheritance allows objects to inherit properties and behaviors from a parent object, promoting code reuse.
Composition is more flexible t...
I applied via Recruitment Consulltant and was interviewed in Dec 2023. There were 2 interview rounds.
I applied via campus placement at Indian Institute of Management (IIM), Lucknow
Three sections (minimum two to be completed)-Aptitude, Case Solving and Machine Learning.
What do you know about Amex?
First case - you have data about the users of IRCTC app - login time, usage time, clicks, services, demographics etc.
IRCTC wants to launch air tickets booking service on the app and for this they will first show a pop up advertisement to inform their existing users about this service. Tell the parameters or criteria's to clean the data to come up with the target group to whom they will show this ad and are guaranteed to use this new service.
You have mentioned photography as your hobby. I know there is already a photography club in the campus but suppose you want to come up with a new but niche club only for select users who have high experience.
Suppose you have a genie, who can get you any database from any source which could be of help to you. With those data points overlapping over one another, you will eventually come up with a new data of users who are most likely to join your club. Tell me from what sort and type of data you will ask him to fetch and why? What information are you exactly searching for through those?
To determine if supply of autorickshaws matches demand, we need to conduct market research and analyze data. Approach for a different product would depend on the nature of the product.
Conduct market research to determine the demand for autorickshaws
Analyze data to compare demand with supply
If demand is higher than supply, increase production or import more autorickshaws
If demand is lower than supply, decrease productio...
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
Yes, I am able to travel long distances for work.
I have experience traveling for work in the past
I am willing to travel for this opportunity
I have no restrictions that would prevent me from traveling
I applied via Referral and was interviewed before Jun 2020. There was 1 interview round.
To debug Out of Memory Error, analyze memory usage and garbage collection algorithm of JVM.
Analyze heap dump to identify memory leaks
Check if JVM is running out of heap space
Analyze garbage collection logs to identify any issues
Tune JVM parameters to optimize memory usage
Consider using a profiler to identify memory-intensive code
Check for any large objects or arrays that may be causing the issue
Automated parking lot design with efficient space utilization and user-friendly interface.
Use sensors to detect available parking spots
Implement a central computer system to manage parking allocation
Incorporate user-friendly interface for easy navigation and payment
Maximize space utilization with multi-level parking and compact car storage
Ensure safety measures are in place for pedestrians and vehicles
Design an auto-suggestion feature for a search engine.
Implement a search algorithm that suggests relevant keywords based on user input.
Use machine learning to improve the accuracy of suggestions over time.
Allow users to easily select and add suggested keywords to their search query.
BI Developer
5
salaries
| ₹1.2 L/yr - ₹7.3 L/yr |
Consultant
4
salaries
| ₹5 L/yr - ₹7.3 L/yr |
MIS Executive
3
salaries
| ₹2.2 L/yr - ₹2.5 L/yr |
JPMorgan Chase & Co.
Wells Fargo
HSBC Group
UBS