Add office photos
Employer?
Claim Account for FREE

KPMG India

3.5
based on 5.2k Reviews
Filter interviews by

30+ Advait Techserve Interview Questions and Answers

Updated 17 Jan 2025
Popular Designations

Q1. what do you know about networking?

Ans.

Networking refers to the practice of connecting devices together to share resources and communicate with each other.

  • Networking involves the use of protocols and standards such as TCP/IP, DNS, and HTTP.

  • Networking can be done through wired or wireless connections.

  • Networking can be used for various purposes such as sharing files, printers, and internet access.

  • Networking can be secured through the use of firewalls, encryption, and authentication.

  • Examples of networking devices inc...read more

Add your answer

Q2. Explain P2P process and also explain how will you audit the same

Ans.

P2P process involves procurement of goods/services from a supplier and payment to the supplier.

  • P2P stands for Procure-to-Pay process

  • It involves identifying the need for goods/services, selecting a supplier, creating a purchase order, receiving the goods/services, and making payment to the supplier

  • The audit of P2P process involves reviewing the controls in place to ensure accuracy and completeness of transactions, verifying the existence of proper documentation, and testing th...read more

Add your answer

Q3. What is correlation and how do you infer relationship using correlation.

Ans.

Correlation is a statistical measure that shows the relationship between two variables.

  • Correlation ranges from -1 to 1, where -1 indicates a negative correlation, 0 indicates no correlation, and 1 indicates a positive correlation.

  • Correlation does not imply causation.

  • Correlation can be calculated using various methods such as Pearson correlation coefficient, Spearman's rank correlation coefficient, and Kendall's tau correlation coefficient.

  • Infer relationship using correlation ...read more

Add your answer

Q4. what do you know about virtualization?

Ans.

Virtualization is the creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.

  • Virtualization allows multiple operating systems to run on a single physical machine

  • It enables better utilization of hardware resources

  • Examples include VMware, Hyper-V, and VirtualBox

  • Virtualization can also be used for cloud computing and disaster recovery

  • It can improve scalability, flexibility, and security

Add your answer
Discover Advait Techserve interview dos and don'ts from real experiences

Q5. What is Cash Flow Statement? How it is prepared?

Ans.

Cash Flow Statement is a financial statement that shows the inflow and outflow of cash in a business over a period of time.

  • It is prepared to provide information about the cash generated and used by a business.

  • It is divided into three sections: operating activities, investing activities, and financing activities.

  • Operating activities include cash inflows and outflows from day-to-day business operations.

  • Investing activities include cash inflows and outflows from buying or sellin...read more

View 1 answer

Q6. What is FastPass? what dose it consists of?

Ans.

FastPass is a Disney World ride reservation system that allows guests to skip long lines.

  • FastPass is a free service available to all Disney World guests.

  • Guests can reserve a FastPass for select attractions up to 30 days in advance.

  • FastPass allows guests to skip the regular line and enter through a shorter, faster line.

  • Guests can only hold one FastPass at a time, but can get additional FastPasses after using their initial one.

  • Examples of popular attractions with FastPass inclu...read more

View 1 answer
Are these interview questions helpful?

Q7. India- Market Entry Strategy for a Greentech company with focus on Solar Energy

Ans.

Developing a market entry strategy for a greentech company focusing on solar energy in India.

  • Conduct thorough market research to understand the demand and competition in the Indian solar energy sector.

  • Identify potential partners or local companies to collaborate with for market entry.

  • Adapt the business model to suit the Indian market, considering factors like affordability, government policies, and infrastructure.

  • Establish strong relationships with government agencies and reg...read more

Add your answer

Q8. What is the internal audit compliance section

Ans.

Internal audit compliance section is responsible for ensuring that the organization is following all the relevant laws and regulations.

  • It is a department within an organization that ensures compliance with laws and regulations

  • It conducts audits to identify areas of non-compliance and recommends corrective actions

  • It also ensures that internal policies and procedures are being followed

  • Examples include compliance with financial regulations, data protection laws, and workplace sa...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is dimension in tableau ?

Ans.

Dimensions are categorical variables in Tableau used to group and slice data.

  • Dimensions are used to create categorical hierarchies and groupings.

  • They are used to slice and filter data in visualizations.

  • Examples of dimensions include product categories, regions, and dates.

  • Dimensions are displayed as discrete fields in Tableau.

  • They can be used in conjunction with measures to create meaningful visualizations.

Add your answer

Q10. What is software licensing?

Ans.

Software licensing refers to the legal agreement between the software owner and the user for the use of the software.

  • It outlines the terms and conditions for the use of the software

  • It specifies the number of users or devices that can access the software

  • It may include restrictions on copying, modifying, or distributing the software

  • Examples include proprietary software licenses, open source licenses, and subscription-based licenses

Add your answer

Q11. What are the fundamental pillars of Cyber Security ?

Ans.

The fundamental pillars of Cyber Security include confidentiality, integrity, availability, and resilience.

  • Confidentiality: Ensuring that data is only accessible to authorized individuals or systems.

  • Integrity: Maintaining the accuracy and trustworthiness of data throughout its lifecycle.

  • Availability: Ensuring that systems and data are accessible when needed by authorized users.

  • Resilience: Ability to withstand and quickly recover from cyber attacks or incidents.

  • Examples: Encry...read more

Add your answer

Q12. How you pull out data, how to make pivot and all.

Ans.

I pull out data using SQL queries or data extraction tools, then manipulate it in Excel to create pivot tables for analysis.

  • Use SQL queries to extract data from databases

  • Import data into Excel and use pivot tables to summarize and analyze the data

  • Apply filters, groupings, and calculations in pivot tables to gain insights

  • Visualize data using charts and graphs for better understanding

Add your answer

Q13. What is accounts? What is time value of money

Ans.

Accounts refer to financial records of an organization. Time value of money is the concept that money available today is worth more than the same amount in the future.

  • Accounts are financial records that track the financial activities of an organization, including assets, liabilities, income, and expenses.

  • Time value of money is the idea that a dollar today is worth more than a dollar in the future due to its potential earning capacity.

  • This concept is important in finance and i...read more

Add your answer

Q14. What is Normalisation ?

Ans.

Normalisation is the process of organizing data in a database to reduce redundancy and dependency.

  • It involves breaking down a table into smaller tables and defining relationships between them.

  • Normalization helps to eliminate data inconsistencies and anomalies.

  • There are different levels of normalization, with each level having specific rules to follow.

  • For example, first normal form (1NF) requires that each table has a primary key and no repeating groups.

  • Normalization is import...read more

Add your answer

Q15. What is ITC in GST ?

Ans.

ITC stands for Input Tax Credit in GST.

  • ITC is the credit that a business can claim for the taxes paid on inputs used in the production of goods or services.

  • It helps to avoid the cascading effect of taxes and reduces the overall tax burden.

  • ITC can be claimed on goods and services used for business purposes, except for a few specified items.

  • For example, if a manufacturer buys raw materials worth Rs. 10,000 and pays Rs. 1,800 as GST, they can claim ITC of Rs. 1,800 and reduce th...read more

Add your answer

Q16. What do you know about financial modelling

Ans.

Financial modelling involves creating mathematical representations of financial situations to make informed business decisions.

  • Financial modelling is used to forecast future financial performance based on historical data and assumptions.

  • It helps in analyzing the impact of different variables on financial outcomes.

  • Common types of financial models include discounted cash flow (DCF), merger and acquisition (M&A), and budgeting models.

  • Excel is often used for financial modelling d...read more

Add your answer

Q17. Sell me this pen?

Ans.

This pen is not just a writing tool, it's a statement of style and sophistication.

  • This pen is made with high-quality materials that ensure a smooth writing experience.

  • It's sleek and stylish design makes it a perfect accessory for any professional setting.

  • The ink is long-lasting and won't smudge or smear, ensuring your writing always looks neat and tidy.

  • It's also refillable, making it a sustainable and cost-effective choice.

  • This pen is not just a writing tool, it's a statement...read more

Add your answer

Q18. Do you have knowledge about MS Excel?

Ans.

Yes, I have knowledge about MS Excel.

  • Proficient in creating and formatting spreadsheets

  • Skilled in using formulas and functions

  • Experienced in data analysis and visualization

  • Familiar with pivot tables and charts

Add your answer

Q19. What is java bean class, singleton class

Ans.

Java bean class is a reusable software component and singleton class restricts the instantiation of a class to one object.

  • Java bean class is a POJO (Plain Old Java Object) that encapsulates many objects into a single object for easy access.

  • It follows a naming convention where the class name starts with a capital letter and has a public default constructor.

  • Singleton class is a design pattern that ensures only one instance of a class is created and provides a global point of ac...read more

Add your answer

Q20. Write a program to check if a program is palindrome

Ans.

Program to check if a string is a palindrome

  • Create a function that takes a string as input

  • Remove all non-alphanumeric characters and convert to lowercase

  • Compare the string with its reverse to check if it's a palindrome

Add your answer

Q21. Risk assessment steps for onboarding news applications

Ans.

Risk assessment steps for onboarding new applications involve identifying potential threats, evaluating vulnerabilities, and implementing controls.

  • Identify potential threats such as data breaches, malware attacks, and unauthorized access.

  • Evaluate vulnerabilities in the application's design, code, and infrastructure.

  • Implement controls such as encryption, access controls, and regular security audits.

  • Conduct regular risk assessments to identify new threats and vulnerabilities.

  • Tr...read more

Add your answer

Q22. What do you know about servicenow

Ans.

ServiceNow is a cloud-based platform that provides IT service management, IT operations management, and IT business management solutions.

  • ServiceNow offers a range of products and services for IT professionals to streamline and automate their workflows.

  • It helps organizations manage their IT infrastructure, services, and operations more efficiently.

  • ServiceNow's platform includes modules for IT service management, IT operations management, and IT business management.

  • It allows fo...read more

Add your answer

Q23. what is circular linked list?

Ans.

A circular linked list is a linked list where the last node points to the first node, forming a loop.

  • Each node has a pointer to the next node and the last node points to the first node.

  • Traversal can start from any node and continue until the starting node is reached again.

  • Used in applications where data needs to be accessed in a circular manner, such as a playlist in music apps.

Add your answer

Q24. Cryptography Encryption types of encryption

Ans.

Cryptography encryption involves various types of encryption algorithms to secure data.

  • Symmetric encryption uses a single key for both encryption and decryption (e.g. AES)

  • Asymmetric encryption uses a pair of keys, public and private, for encryption and decryption (e.g. RSA)

  • Hash functions generate fixed-size output from input data (e.g. SHA-256)

  • Stream ciphers encrypt data bit by bit (e.g. RC4)

  • Block ciphers encrypt data in fixed-size blocks (e.g. DES)

Add your answer

Q25. How corporate kyc works

Ans.

Corporate KYC is the process of verifying the identity of a company and its beneficial owners.

  • The company must provide documentation such as incorporation papers, business licenses, and tax identification numbers.

  • Beneficial owners must also be identified and verified through documentation such as passports or government-issued IDs.

  • The KYC process helps prevent money laundering, terrorist financing, and other illegal activities.

  • Financial institutions and other regulated entiti...read more

Add your answer

Q26. What is KPMG do

Ans.

KPMG is a multinational professional services network providing audit, tax, and advisory services.

  • KPMG is one of the Big Four accounting firms in the world.

  • They offer services in areas such as audit, tax, and advisory.

  • KPMG helps clients manage risks, improve performance, and create value.

  • The company operates in over 150 countries and territories.

  • KPMG is known for its expertise in financial services, healthcare, technology, and other industries.

Add your answer

Q27. what is primary key

Ans.

Primary key is a unique identifier for each record in a database table.

  • Primary key ensures each record in a table is unique

  • It can be a single column or a combination of columns

  • Primary key values cannot be null

Add your answer

Q28. relation of financial system

Ans.

The financial system refers to the network of institutions, markets, and regulations that facilitate the flow of funds between savers and borrowers.

  • The financial system includes banks, stock exchanges, insurance companies, and regulatory bodies.

  • It plays a crucial role in allocating resources efficiently in an economy.

  • Financial systems vary across countries based on their level of development and regulatory framework.

  • Examples of financial systems include the US financial syste...read more

Add your answer

Q29. Explain about CIA triad.

Ans.

CIA triad is a model designed to guide policies for information security within an organization.

  • CIA stands for Confidentiality, Integrity, and Availability

  • Confidentiality ensures that information is only accessible to those who are authorized to view it

  • Integrity ensures that information is accurate and trustworthy

  • Availability ensures that information is accessible when needed

  • Example: Encrypting sensitive data to maintain confidentiality

Add your answer

Q30. Explain About finance

Ans.

Finance is the management of money and investments, including budgeting, saving, borrowing, lending, and investing.

  • Finance involves managing money and investments.

  • It includes activities like budgeting, saving, borrowing, lending, and investing.

  • Finance helps individuals and organizations make informed financial decisions.

  • Financial markets play a key role in finance, facilitating the buying and selling of assets like stocks and bonds.

Add your answer

Q31. What is kyc and transaction monitoring?

Ans.

KYC (Know Your Customer) is the process of verifying the identity of clients, while transaction monitoring involves tracking and analyzing transactions to detect suspicious activities.

  • KYC is a regulatory requirement to prevent money laundering and terrorist financing.

  • It involves collecting personal information and verifying the identity of customers.

  • Transaction monitoring is the process of tracking and analyzing transactions to identify suspicious activities.

  • It helps in detec...read more

Add your answer

Q32. Explain the process of kyc

Ans.

KYC (Know Your Customer) is a process used by financial institutions to verify the identity of their clients.

  • Collecting personal information from clients

  • Verifying the authenticity of the information provided

  • Assessing the risk of illegal activities such as money laundering or fraud

  • Monitoring transactions for suspicious activities

  • Updating customer information regularly

Add your answer

Q33. What is Pep screening ?

Ans.

PEP screening is a process used to identify potential employees who are likely to be successful in a particular role.

  • PEP screening involves assessing candidates based on their skills, experience, and personality traits.

  • It helps employers make informed hiring decisions and reduce turnover rates.

  • Examples of PEP screening methods include behavioral assessments, cognitive tests, and job simulations.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Advait Techserve

based on 28 interviews in the last 1 year
3 Interview rounds
Aptitude Test Round
Technical Round
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Analyst Interview Questions from Similar Companies

3.8
 • 17 Interview Questions
4.0
 • 12 Interview Questions
3.9
 • 11 Interview Questions
4.0
 • 10 Interview Questions
3.9
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter