KPMG India
30+ Advait Techserve Interview Questions and Answers
Q1. what do you know about networking?
Networking refers to the practice of connecting devices together to share resources and communicate with each other.
Networking involves the use of protocols and standards such as TCP/IP, DNS, and HTTP.
Networking can be done through wired or wireless connections.
Networking can be used for various purposes such as sharing files, printers, and internet access.
Networking can be secured through the use of firewalls, encryption, and authentication.
Examples of networking devices inc...read more
Q2. Explain P2P process and also explain how will you audit the same
P2P process involves procurement of goods/services from a supplier and payment to the supplier.
P2P stands for Procure-to-Pay process
It involves identifying the need for goods/services, selecting a supplier, creating a purchase order, receiving the goods/services, and making payment to the supplier
The audit of P2P process involves reviewing the controls in place to ensure accuracy and completeness of transactions, verifying the existence of proper documentation, and testing th...read more
Q3. What is correlation and how do you infer relationship using correlation.
Correlation is a statistical measure that shows the relationship between two variables.
Correlation ranges from -1 to 1, where -1 indicates a negative correlation, 0 indicates no correlation, and 1 indicates a positive correlation.
Correlation does not imply causation.
Correlation can be calculated using various methods such as Pearson correlation coefficient, Spearman's rank correlation coefficient, and Kendall's tau correlation coefficient.
Infer relationship using correlation ...read more
Q4. what do you know about virtualization?
Virtualization is the creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources.
Virtualization allows multiple operating systems to run on a single physical machine
It enables better utilization of hardware resources
Examples include VMware, Hyper-V, and VirtualBox
Virtualization can also be used for cloud computing and disaster recovery
It can improve scalability, flexibility, and security
Q5. What is Cash Flow Statement? How it is prepared?
Cash Flow Statement is a financial statement that shows the inflow and outflow of cash in a business over a period of time.
It is prepared to provide information about the cash generated and used by a business.
It is divided into three sections: operating activities, investing activities, and financing activities.
Operating activities include cash inflows and outflows from day-to-day business operations.
Investing activities include cash inflows and outflows from buying or sellin...read more
Q6. What is FastPass? what dose it consists of?
FastPass is a Disney World ride reservation system that allows guests to skip long lines.
FastPass is a free service available to all Disney World guests.
Guests can reserve a FastPass for select attractions up to 30 days in advance.
FastPass allows guests to skip the regular line and enter through a shorter, faster line.
Guests can only hold one FastPass at a time, but can get additional FastPasses after using their initial one.
Examples of popular attractions with FastPass inclu...read more
Q7. India- Market Entry Strategy for a Greentech company with focus on Solar Energy
Developing a market entry strategy for a greentech company focusing on solar energy in India.
Conduct thorough market research to understand the demand and competition in the Indian solar energy sector.
Identify potential partners or local companies to collaborate with for market entry.
Adapt the business model to suit the Indian market, considering factors like affordability, government policies, and infrastructure.
Establish strong relationships with government agencies and reg...read more
Q8. What is the internal audit compliance section
Internal audit compliance section is responsible for ensuring that the organization is following all the relevant laws and regulations.
It is a department within an organization that ensures compliance with laws and regulations
It conducts audits to identify areas of non-compliance and recommends corrective actions
It also ensures that internal policies and procedures are being followed
Examples include compliance with financial regulations, data protection laws, and workplace sa...read more
Q9. What is dimension in tableau ?
Dimensions are categorical variables in Tableau used to group and slice data.
Dimensions are used to create categorical hierarchies and groupings.
They are used to slice and filter data in visualizations.
Examples of dimensions include product categories, regions, and dates.
Dimensions are displayed as discrete fields in Tableau.
They can be used in conjunction with measures to create meaningful visualizations.
Q10. What is software licensing?
Software licensing refers to the legal agreement between the software owner and the user for the use of the software.
It outlines the terms and conditions for the use of the software
It specifies the number of users or devices that can access the software
It may include restrictions on copying, modifying, or distributing the software
Examples include proprietary software licenses, open source licenses, and subscription-based licenses
Q11. What are the fundamental pillars of Cyber Security ?
The fundamental pillars of Cyber Security include confidentiality, integrity, availability, and resilience.
Confidentiality: Ensuring that data is only accessible to authorized individuals or systems.
Integrity: Maintaining the accuracy and trustworthiness of data throughout its lifecycle.
Availability: Ensuring that systems and data are accessible when needed by authorized users.
Resilience: Ability to withstand and quickly recover from cyber attacks or incidents.
Examples: Encry...read more
Q12. How you pull out data, how to make pivot and all.
I pull out data using SQL queries or data extraction tools, then manipulate it in Excel to create pivot tables for analysis.
Use SQL queries to extract data from databases
Import data into Excel and use pivot tables to summarize and analyze the data
Apply filters, groupings, and calculations in pivot tables to gain insights
Visualize data using charts and graphs for better understanding
Q13. What is accounts? What is time value of money
Accounts refer to financial records of an organization. Time value of money is the concept that money available today is worth more than the same amount in the future.
Accounts are financial records that track the financial activities of an organization, including assets, liabilities, income, and expenses.
Time value of money is the idea that a dollar today is worth more than a dollar in the future due to its potential earning capacity.
This concept is important in finance and i...read more
Q14. What is Normalisation ?
Normalisation is the process of organizing data in a database to reduce redundancy and dependency.
It involves breaking down a table into smaller tables and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, with each level having specific rules to follow.
For example, first normal form (1NF) requires that each table has a primary key and no repeating groups.
Normalization is import...read more
Q15. What is ITC in GST ?
ITC stands for Input Tax Credit in GST.
ITC is the credit that a business can claim for the taxes paid on inputs used in the production of goods or services.
It helps to avoid the cascading effect of taxes and reduces the overall tax burden.
ITC can be claimed on goods and services used for business purposes, except for a few specified items.
For example, if a manufacturer buys raw materials worth Rs. 10,000 and pays Rs. 1,800 as GST, they can claim ITC of Rs. 1,800 and reduce th...read more
Q16. What do you know about financial modelling
Financial modelling involves creating mathematical representations of financial situations to make informed business decisions.
Financial modelling is used to forecast future financial performance based on historical data and assumptions.
It helps in analyzing the impact of different variables on financial outcomes.
Common types of financial models include discounted cash flow (DCF), merger and acquisition (M&A), and budgeting models.
Excel is often used for financial modelling d...read more
Q17. Sell me this pen?
This pen is not just a writing tool, it's a statement of style and sophistication.
This pen is made with high-quality materials that ensure a smooth writing experience.
It's sleek and stylish design makes it a perfect accessory for any professional setting.
The ink is long-lasting and won't smudge or smear, ensuring your writing always looks neat and tidy.
It's also refillable, making it a sustainable and cost-effective choice.
This pen is not just a writing tool, it's a statement...read more
Q18. Do you have knowledge about MS Excel?
Yes, I have knowledge about MS Excel.
Proficient in creating and formatting spreadsheets
Skilled in using formulas and functions
Experienced in data analysis and visualization
Familiar with pivot tables and charts
Q19. What is java bean class, singleton class
Java bean class is a reusable software component and singleton class restricts the instantiation of a class to one object.
Java bean class is a POJO (Plain Old Java Object) that encapsulates many objects into a single object for easy access.
It follows a naming convention where the class name starts with a capital letter and has a public default constructor.
Singleton class is a design pattern that ensures only one instance of a class is created and provides a global point of ac...read more
Q20. Write a program to check if a program is palindrome
Program to check if a string is a palindrome
Create a function that takes a string as input
Remove all non-alphanumeric characters and convert to lowercase
Compare the string with its reverse to check if it's a palindrome
Q21. Risk assessment steps for onboarding news applications
Risk assessment steps for onboarding new applications involve identifying potential threats, evaluating vulnerabilities, and implementing controls.
Identify potential threats such as data breaches, malware attacks, and unauthorized access.
Evaluate vulnerabilities in the application's design, code, and infrastructure.
Implement controls such as encryption, access controls, and regular security audits.
Conduct regular risk assessments to identify new threats and vulnerabilities.
Tr...read more
Q22. What do you know about servicenow
ServiceNow is a cloud-based platform that provides IT service management, IT operations management, and IT business management solutions.
ServiceNow offers a range of products and services for IT professionals to streamline and automate their workflows.
It helps organizations manage their IT infrastructure, services, and operations more efficiently.
ServiceNow's platform includes modules for IT service management, IT operations management, and IT business management.
It allows fo...read more
Q23. what is circular linked list?
A circular linked list is a linked list where the last node points to the first node, forming a loop.
Each node has a pointer to the next node and the last node points to the first node.
Traversal can start from any node and continue until the starting node is reached again.
Used in applications where data needs to be accessed in a circular manner, such as a playlist in music apps.
Q24. Cryptography Encryption types of encryption
Cryptography encryption involves various types of encryption algorithms to secure data.
Symmetric encryption uses a single key for both encryption and decryption (e.g. AES)
Asymmetric encryption uses a pair of keys, public and private, for encryption and decryption (e.g. RSA)
Hash functions generate fixed-size output from input data (e.g. SHA-256)
Stream ciphers encrypt data bit by bit (e.g. RC4)
Block ciphers encrypt data in fixed-size blocks (e.g. DES)
Q25. How corporate kyc works
Corporate KYC is the process of verifying the identity of a company and its beneficial owners.
The company must provide documentation such as incorporation papers, business licenses, and tax identification numbers.
Beneficial owners must also be identified and verified through documentation such as passports or government-issued IDs.
The KYC process helps prevent money laundering, terrorist financing, and other illegal activities.
Financial institutions and other regulated entiti...read more
Q26. What is KPMG do
KPMG is a multinational professional services network providing audit, tax, and advisory services.
KPMG is one of the Big Four accounting firms in the world.
They offer services in areas such as audit, tax, and advisory.
KPMG helps clients manage risks, improve performance, and create value.
The company operates in over 150 countries and territories.
KPMG is known for its expertise in financial services, healthcare, technology, and other industries.
Q27. what is primary key
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is unique
It can be a single column or a combination of columns
Primary key values cannot be null
Q28. relation of financial system
The financial system refers to the network of institutions, markets, and regulations that facilitate the flow of funds between savers and borrowers.
The financial system includes banks, stock exchanges, insurance companies, and regulatory bodies.
It plays a crucial role in allocating resources efficiently in an economy.
Financial systems vary across countries based on their level of development and regulatory framework.
Examples of financial systems include the US financial syste...read more
Q29. Explain about CIA triad.
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to maintain confidentiality
Q30. Explain About finance
Finance is the management of money and investments, including budgeting, saving, borrowing, lending, and investing.
Finance involves managing money and investments.
It includes activities like budgeting, saving, borrowing, lending, and investing.
Finance helps individuals and organizations make informed financial decisions.
Financial markets play a key role in finance, facilitating the buying and selling of assets like stocks and bonds.
Q31. What is kyc and transaction monitoring?
KYC (Know Your Customer) is the process of verifying the identity of clients, while transaction monitoring involves tracking and analyzing transactions to detect suspicious activities.
KYC is a regulatory requirement to prevent money laundering and terrorist financing.
It involves collecting personal information and verifying the identity of customers.
Transaction monitoring is the process of tracking and analyzing transactions to identify suspicious activities.
It helps in detec...read more
Q32. Explain the process of kyc
KYC (Know Your Customer) is a process used by financial institutions to verify the identity of their clients.
Collecting personal information from clients
Verifying the authenticity of the information provided
Assessing the risk of illegal activities such as money laundering or fraud
Monitoring transactions for suspicious activities
Updating customer information regularly
Q33. What is Pep screening ?
PEP screening is a process used to identify potential employees who are likely to be successful in a particular role.
PEP screening involves assessing candidates based on their skills, experience, and personality traits.
It helps employers make informed hiring decisions and reduce turnover rates.
Examples of PEP screening methods include behavioral assessments, cognitive tests, and job simulations.
Top HR Questions asked in Advait Techserve
Interview Process at Advait Techserve
Top Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month