Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Jul 2022. There were 3 interview rounds.
Top trending discussions
I applied via Job Fair and was interviewed in Oct 2024. There was 1 interview round.
BRD, RACI MATRIX, FRD, SDLC, and AGILE are common terms used in business analysis and project management.
BRD stands for Business Requirements Document, which outlines the business solution for a project.
RACI MATRIX is a tool used to define roles and responsibilities for project tasks.
FRD stands for Functional Requirements Document, which details the functional specifications of a project.
SDLC stands for Software Develo...
Create user stories out of a use-case and design workflow for it.
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Campus Placement
Online aptitude test have been coundected
posted on 18 Jun 2022
I applied via Naukri.com
To find root cause of invoice rejection for client
Analyze the invoice submission process
Check for errors in the invoice
Review client's invoice acceptance criteria
Investigate communication breakdowns between client and vendor
Identify any system or process issues causing rejection
Collaborate with relevant stakeholders to resolve issues
I applied via LinkedIn and was interviewed in Oct 2021. There were 3 interview rounds.
I am a highly skilled and experienced Business Analyst with a strong background in data analysis and problem-solving.
Over 5 years of experience as a Business Analyst in various industries
Proficient in gathering and analyzing business requirements
Expertise in data modeling and visualization tools such as Tableau and Power BI
Strong communication and presentation skills
Proven track record of successfully implementing proc...
SRS and FRS are types of documentation used in software development.
SRS stands for Software Requirements Specification and outlines the functional and non-functional requirements of a software system.
FRS stands for Functional Requirements Specification and details the specific features and functionalities of a software system.
Other types of documentation include user manuals, technical specifications, and design docume...
Interview experience
based on 1 review
Rating in categories
Software Engineer
313
salaries
| ₹2.6 L/yr - ₹10 L/yr |
Information Technology Recruiter
293
salaries
| ₹1 L/yr - ₹3.2 L/yr |
Senior Software Engineer
226
salaries
| ₹15.4 L/yr - ₹29.6 L/yr |
Software Developer
217
salaries
| ₹3 L/yr - ₹10 L/yr |
Softwaretest Engineer
131
salaries
| ₹4 L/yr - ₹8 L/yr |
Infosys
TCS
Wipro
HCLTech