Filter interviews by
Top trending discussions
I applied via Referral and was interviewed before Jul 2021. There were 3 interview rounds.
Aptitude test about sales planning.
I applied via Naukri.com and was interviewed before Jun 2020. There were 3 interview rounds.
I am an experienced Sales Executive with a strong track record in achieving sales targets and building relationships with clients.
I have successfully exceeded sales targets by 20% in my previous role.
I have a proven ability to identify and capitalize on market opportunities.
I have developed and maintained strong relationships with key clients, resulting in repeat business and referrals.
I am skilled in market research a...
I appeared for an interview before Apr 2021.
Last company about
I applied via Naukri.com and was interviewed in Nov 2021. There was 1 interview round.
I applied via Company Website and was interviewed in Aug 2022. There were 4 interview rounds.
Aptitude is the best part of salesman.
Group discussion is improve of sales of company.
Yes, I am aware of the current sales trends in the market.
I keep myself updated with the latest market trends and sales figures.
I regularly attend industry conferences and seminars to stay informed.
I have experience in analyzing sales data and identifying areas for improvement.
For example, in my previous role, I noticed a decline in sales for a particular product and implemented a targeted marketing campaign to boost s...
I applied via Approached by Company and was interviewed in Nov 2022. There were 3 interview rounds.
Be confident inquiry about your past experience
Your confidence .your look your knowledge about concern area , with business turnover
I appeared for an interview before Mar 2024, where I was asked the following questions.
ROI (Return on Investment) measures the profitability of an investment relative to its cost.
ROI = (Net Profit / Cost of Investment) x 100%
Example: If you invest $1,000 and earn $1,200, ROI = (($1,200 - $1,000) / $1,000) x 100% = 20%.
A higher ROI indicates a more profitable investment.
ROI can be used to compare the profitability of different investments.
The work culture at my last company was collaborative, innovative, and focused on employee growth and satisfaction.
Team Collaboration: We often held brainstorming sessions to encourage input from all team members.
Open Communication: Regular feedback loops were established, allowing for transparent discussions between management and staff.
Employee Development: The company invested in training programs, providing opportu...
Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers.
Blockchain is a chain of blocks containing transaction data.
Each block is linked to the previous one using cryptographic hashes.
Transactions are verified by network participants through consensus mechanisms like Proof of Work or Proof of Stake.
Once added to the blockchain, data is immutable and cann...
A man in the middle attack is when a hacker intercepts communication between two parties without their knowledge.
Occurs when a hacker secretly intercepts and possibly alters the communication between two parties
Commonly seen in public Wi-Fi networks where the hacker positions themselves between the user and the network
Can lead to sensitive information being stolen or manipulated
RSA is a public-key encryption algorithm used for secure communication over the internet.
RSA stands for Rivest-Shamir-Adleman, named after its inventors.
It uses a pair of keys - a public key for encryption and a private key for decryption.
RSA is widely used in secure communication protocols like HTTPS for secure browsing.
It is based on the difficulty of factoring large prime numbers.
RSA keys are typically 1024 or 2048
Security attacks are malicious activities aimed at compromising the confidentiality, integrity, or availability of information.
Types of security attacks include malware, phishing, ransomware, DDoS attacks, and man-in-the-middle attacks.
Attackers may exploit vulnerabilities in software or systems to gain unauthorized access or steal sensitive data.
Common goals of security attacks are financial gain, data theft, disrupti...
Active attacks involve the attacker directly interacting with the target system, while passive attacks involve monitoring and eavesdropping.
Active attacks involve modifying data, injecting malware, or disrupting services.
Passive attacks involve listening in on communications, capturing data, or analyzing traffic.
Examples of active attacks include denial of service (DoS) attacks and man-in-the-middle attacks.
Examples of...
based on 2 interviews
Interview experience
based on 18 reviews
Rating in categories
Sales Team Leader
512
salaries
| ₹5 L/yr - ₹15.1 L/yr |
Team Lead
343
salaries
| ₹5.2 L/yr - ₹15.9 L/yr |
Sales Executive
341
salaries
| ₹1 L/yr - ₹9 L/yr |
Executive Production
224
salaries
| ₹2 L/yr - ₹8.7 L/yr |
Market Growth Representative
178
salaries
| ₹1.1 L/yr - ₹4.8 L/yr |
Varun Beverages
Parle Agro
AB InBev India
Bisleri