i
EXL Service
Filter interviews by
THE TEST DURATION IS ABOUT 30 MIN 30 QUESTIONS.QUESTIONS WERE FROM C++,PROBABILITY ETC,,
Primary key uniquely identifies a record in a table, while foreign key establishes a relationship between two tables.
Primary key is unique and cannot have null values
Foreign key references the primary key of another table
Primary key can be only one per table, while foreign key can be multiple
Example: Primary key in 'Students' table could be 'student_id', while foreign key in 'Courses' table could be 'student_id' refere
Top trending discussions
Mitre ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
Provides a comprehensive list of tactics and techniques used by attackers
Helps organizations understand and defend against cyber threats
Used for threat intelligence, red teaming, and blue teaming
Example: Credential Dumping technique under the Credential Access tactic
A type of attack refers to a specific method used by hackers to exploit vulnerabilities in a system or network.
Common types of attacks include phishing, malware, DDoS, and SQL injection
Attackers may use social engineering tactics to trick users into revealing sensitive information
Security measures such as firewalls, antivirus software, and encryption can help prevent attacks
I am open to discussing salary based on the responsibilities and expectations of the role.
I am looking for fair compensation based on my skills and experience
I am open to negotiation and discussing benefits
I am willing to consider other forms of compensation such as stock options or bonuses
I am looking for a salary that is competitive within the industry and region
I worked as a software engineer at XYZ company.
Developed and maintained software applications using Java and Python.
Collaborated with cross-functional teams to deliver high-quality products.
Participated in code reviews and contributed to the improvement of coding standards.
Provided technical support to clients and resolved issues in a timely manner.
Looking for growth opportunities and a new challenge.
Seeking a more challenging role to enhance my skills and knowledge.
Interested in exploring new industries and gaining diverse experience.
Current job lacks growth opportunities and career advancement.
Want to work for a company with a better work-life balance.
Looking for a change in location or commute time.
My strengths include being a quick learner, adaptable, and a good communicator. My weaknesses include being overly critical of myself and sometimes struggling with time management.
Strengths: quick learner, adaptable, good communicator
Weaknesses: overly critical of myself, time management
Example of quick learning: I was able to quickly pick up a new software program and train my team on it within a week
Example of adapta...
I am a highly motivated individual with a passion for learning and a strong work ethic.
I have a Bachelor's degree in Computer Science and have completed several internships in the tech industry.
I am proficient in programming languages such as Java, Python, and C++.
I have excellent communication and teamwork skills, as demonstrated through my involvement in various group projects.
I am also a quick learner and enjoy taki...
I plan to intern with you for at least 6 months.
I am committed to gaining as much experience as possible during my time here
I am open to extending my internship if there is an opportunity to learn more
I am also willing to discuss my plans with my supervisor to ensure we are both on the same page
I was interviewed before May 2016.
I applied via Internshala
Maths & reasoning on line numerical analysis
Mitre ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
Provides a comprehensive list of tactics and techniques used by attackers
Helps organizations understand and defend against cyber threats
Used for threat intelligence, red teaming, and blue teaming
Example: Credential Dumping technique under the Credential Access tactic
A type of attack refers to a specific method used by hackers to exploit vulnerabilities in a system or network.
Common types of attacks include phishing, malware, DDoS, and SQL injection
Attackers may use social engineering tactics to trick users into revealing sensitive information
Security measures such as firewalls, antivirus software, and encryption can help prevent attacks
The questions were related to finance questions and some are from exel related . So read the question carefully and attempt your best.
I applied via Internshala and was interviewed before Jul 2021. There were 2 interview rounds.
Interview experience
based on 6 reviews
Rating in categories
Senior Executive
4.3k
salaries
| ₹0.9 L/yr - ₹7 L/yr |
Assistant Manager
2.9k
salaries
| ₹4.1 L/yr - ₹14.5 L/yr |
Senior Associate
2.4k
salaries
| ₹1.2 L/yr - ₹8 L/yr |
Lead Assistant Manager
1.9k
salaries
| ₹6.4 L/yr - ₹22 L/yr |
Executive
1.7k
salaries
| ₹1 L/yr - ₹5.5 L/yr |
Genpact
WNS
TCS
Infosys