KPMG India
10+ Indian Register of Shipping Interview Questions and Answers
Q1. Explain P2P process and also explain how will you audit the same
P2P process involves procurement of goods/services from a supplier and payment to the supplier.
P2P stands for Procure-to-Pay process
It involves identifying the need for goods/services, selecting a supplier, creating a purchase order, receiving the goods/services, and making payment to the supplier
The audit of P2P process involves reviewing the controls in place to ensure accuracy and completeness of transactions, verifying the existence of proper documentation, and testing th...read more
Q2. What is Cash Flow Statement? How it is prepared?
Cash Flow Statement is a financial statement that shows the inflow and outflow of cash in a business over a period of time.
It is prepared to provide information about the cash generated and used by a business.
It is divided into three sections: operating activities, investing activities, and financing activities.
Operating activities include cash inflows and outflows from day-to-day business operations.
Investing activities include cash inflows and outflows from buying or sellin...read more
Q3. What is the internal audit compliance section
Internal audit compliance section is responsible for ensuring that the organization is following all the relevant laws and regulations.
It is a department within an organization that ensures compliance with laws and regulations
It conducts audits to identify areas of non-compliance and recommends corrective actions
It also ensures that internal policies and procedures are being followed
Examples include compliance with financial regulations, data protection laws, and workplace sa...read more
Q4. What is the process for creating patterns using Python?
Creating patterns using Python involves using loops and conditional statements to generate desired sequences of characters.
Use loops like for and while to iterate through characters or rows
Use conditional statements like if-else to control the pattern generation
Combine different patterns to create complex designs
Utilize string manipulation functions to modify and format the patterns
Q5. What is accounts? What is time value of money
Accounts refer to financial records of an organization. Time value of money is the concept that money available today is worth more than the same amount in the future.
Accounts are financial records that track the financial activities of an organization, including assets, liabilities, income, and expenses.
Time value of money is the idea that a dollar today is worth more than a dollar in the future due to its potential earning capacity.
This concept is important in finance and i...read more
Q6. What is ITC in GST ?
ITC stands for Input Tax Credit in GST.
ITC is the credit that a business can claim for the taxes paid on inputs used in the production of goods or services.
It helps to avoid the cascading effect of taxes and reduces the overall tax burden.
ITC can be claimed on goods and services used for business purposes, except for a few specified items.
For example, if a manufacturer buys raw materials worth Rs. 10,000 and pays Rs. 1,800 as GST, they can claim ITC of Rs. 1,800 and reduce th...read more
Q7. Explain Joins and How they are used?
Joins are used in databases to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN returns all rows from the right table and t...read more
Q8. Do you have knowledge about MS Excel?
Yes, I have knowledge about MS Excel.
Proficient in creating and formatting spreadsheets
Skilled in using formulas and functions
Experienced in data analysis and visualization
Familiar with pivot tables and charts
Q9. Risk assessment steps for onboarding news applications
Risk assessment steps for onboarding new applications involve identifying potential threats, evaluating vulnerabilities, and implementing controls.
Identify potential threats such as data breaches, malware attacks, and unauthorized access.
Evaluate vulnerabilities in the application's design, code, and infrastructure.
Implement controls such as encryption, access controls, and regular security audits.
Conduct regular risk assessments to identify new threats and vulnerabilities.
Tr...read more
Q10. What do you know about servicenow
ServiceNow is a cloud-based platform that provides IT service management, IT operations management, and IT business management solutions.
ServiceNow offers a range of products and services for IT professionals to streamline and automate their workflows.
It helps organizations manage their IT infrastructure, services, and operations more efficiently.
ServiceNow's platform includes modules for IT service management, IT operations management, and IT business management.
It allows fo...read more
Q11. what is circular linked list?
A circular linked list is a linked list where the last node points to the first node, forming a loop.
Each node has a pointer to the next node and the last node points to the first node.
Traversal can start from any node and continue until the starting node is reached again.
Used in applications where data needs to be accessed in a circular manner, such as a playlist in music apps.
Q12. Cryptography Encryption types of encryption
Cryptography encryption involves various types of encryption algorithms to secure data.
Symmetric encryption uses a single key for both encryption and decryption (e.g. AES)
Asymmetric encryption uses a pair of keys, public and private, for encryption and decryption (e.g. RSA)
Hash functions generate fixed-size output from input data (e.g. SHA-256)
Stream ciphers encrypt data bit by bit (e.g. RC4)
Block ciphers encrypt data in fixed-size blocks (e.g. DES)
Q13. Explain about CIA triad.
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to maintain confidentiality
Top HR Questions asked in Indian Register of Shipping
Interview Process at Indian Register of Shipping
Top Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month