Filter interviews by
Active Directory is a Microsoft service that manages network resources and user accounts. Troubleshooting involves identifying and resolving issues with the service.
Active Directory is used to authenticate and authorize users and computers in a network
Troubleshooting involves checking network connectivity, DNS resolution, and permissions
ITMS (IT Management Suite) is a software solution for managing IT assets and softwa
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
To ensure a server is secure, one must implement various security measures such as firewalls, encryption, regular updates, access control, and monitoring.
Implement firewalls to control incoming and outgoing traffic
Use encryption to protect data in transit and at rest
Regularly update software and patches to fix vulnerabilities
Implement access control measures to restrict unauthorized access
Monitor server activity for an
To prevent identity theft, one can take steps such as monitoring financial accounts regularly, using strong passwords, being cautious with personal information, and shredding sensitive documents.
Monitor financial accounts regularly for any suspicious activity
Use strong, unique passwords for online accounts
Be cautious when sharing personal information online or over the phone
Shred sensitive documents before disposing of
Social phishing is a type of cyber attack that involves manipulating individuals into divulging confidential information.
Social phishing involves attackers using social engineering tactics to trick individuals into revealing sensitive information such as passwords or financial details.
Common methods of social phishing include impersonating trusted entities like banks or government agencies, creating fake social media p...
Spyware attacks are malicious software that secretly gathers information about a person or organization.
Spyware can be installed on a device without the user's knowledge through malicious links, emails, or software downloads.
To prevent spyware attacks, users should regularly update their operating systems and security software.
Avoid clicking on suspicious links or downloading attachments from unknown sources.
Use a repu...
Common types of cyberattacks include phishing, malware, ransomware, DDoS attacks, and social engineering.
Phishing: fraudulent emails or messages to trick individuals into revealing sensitive information
Malware: malicious software designed to damage or gain unauthorized access to a computer system
Ransomware: encrypts files on a victim's system and demands payment for decryption
DDoS attacks: overwhelm a system with traff...
I applied via Naukri.com and was interviewed in Jun 2023. There were 5 interview rounds.
Arithmetic, code decode questions..etc
Online aptitude test have been coundected
I applied via Naukri.com and was interviewed in Mar 2023. There were 3 interview rounds.
I applied via campus placement at SRM Institute of Science & Technology, Chennai and was interviewed in Jul 2022. There were 5 interview rounds.
There were 48 questions to be done in 60 minutes.
the platform used was below average.
about 1400 gave the test
The Next round was a GD.
about 250 were shortlisted.
it was held in groups of 10 - 13.
there were 2 Panelists observing the body language, the fluency and time you speak for.
It is very important that you either start or conclude the GD.
leaves a good impression.
Data analysis is the process of inspecting, cleaning, transforming, and modeling data to discover useful information.
It involves collecting and organizing data
It includes statistical analysis and visualization
It helps in making informed decisions
Examples include market research, financial analysis, and scientific research
SQL Queries using Joins and sub-queries
Joins are used to combine rows from different tables based on a related column
Sub-queries are queries nested within another query
Joins and sub-queries can be used together to retrieve specific data from multiple tables
I applied via Referral and was interviewed before Dec 2023. There was 1 interview round.
I am a data analyst with a background in statistics and programming, passionate about turning data into actionable insights.
Background in statistics and programming
Experience in data analysis and visualization tools like Python, R, and Tableau
Strong problem-solving skills and attention to detail
Ability to communicate complex data findings to non-technical stakeholders
I rate myself as proficient in SQL with experience in writing complex queries and optimizing database performance.
Proficient in writing complex SQL queries
Experience in optimizing database performance
Familiar with database management systems like MySQL, PostgreSQL, etc.
posted on 18 Jun 2022
I applied via Naukri.com
To find root cause of invoice rejection for client
Analyze the invoice submission process
Check for errors in the invoice
Review client's invoice acceptance criteria
Investigate communication breakdowns between client and vendor
Identify any system or process issues causing rejection
Collaborate with relevant stakeholders to resolve issues
Principal Consultant
63
salaries
| ₹14.4 L/yr - ₹30 L/yr |
Senior Consultant
60
salaries
| ₹7.1 L/yr - ₹22 L/yr |
Associate Consultant
39
salaries
| ₹2.1 L/yr - ₹6.7 L/yr |
Staff Consultant
35
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Senior Principal Consultant
27
salaries
| ₹18 L/yr - ₹32.5 L/yr |
Infosys
Wipro
TCS
HCLTech