KPMG India
400+ Honda Motorcycle & Scooter Interview Questions and Answers
Q101. Introduction. Describe information security. Any examples of cybersecurity concerns recently? What are your intentions for going ahead?
Q102. What are the differences between WebDriver and ChromeDriver?
WebDriver is a tool for automating web application testing, while ChromeDriver is a specific implementation for controlling Chrome browser.
WebDriver is a generic tool that supports multiple browsers, while ChromeDriver is specifically for Chrome browser.
WebDriver provides a common API for interacting with different browsers, while ChromeDriver is used to control Chrome browser instances.
WebDriver can be used with different browsers like Firefox, Safari, etc., while ChromeDriv...read more
Q103. What is the Selenium architecture in relation to C#?
Selenium architecture allows for automation testing of web applications using C# bindings.
Selenium WebDriver interacts with web browsers to automate testing
C# bindings provide a way to write test scripts in C# language
Selenium Grid allows for parallel testing on multiple machines
Selenium IDE for recording and playback of test scripts
Q104. Have you ever managed cookies and caches in automation?
Yes, I have experience managing cookies and caches in automation.
Yes, I have written automation scripts to handle cookies by setting, getting, and deleting them.
I have also managed browser caches in automation to ensure accurate testing results.
Utilized tools like Selenium WebDriver to interact with cookies and caches during test execution.
Q105. Do you know any. Programming language??
Yes, I am proficient in programming languages such as Python, Java, and SQL.
Proficient in Python for data analysis and automation tasks
Experience with Java for backend development
Knowledge of SQL for database management
Q106. What all publishers are available in market?
Some popular publishers in the market include Penguin Random House, HarperCollins, Simon & Schuster, and Hachette Book Group.
Penguin Random House
HarperCollins
Simon & Schuster
Hachette Book Group
Q107. How do you calculate irr value?
IRR is calculated by finding the discount rate that makes the net present value of cash flows equal to zero.
IRR is a financial metric used to evaluate the profitability of an investment.
It takes into account the time value of money and the cash flows generated by the investment.
To calculate IRR, you need to know the initial investment, the cash flows generated by the investment, and the time period over which the cash flows occur.
IRR is the discount rate that makes the net pr...read more
Q108. Explain Joins and How they are used?
Joins are used in databases to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN returns all rows from the right table and t...read more
Q109. Do you have knowledge about MS Excel?
Yes, I have knowledge about MS Excel.
Proficient in creating and formatting spreadsheets
Skilled in using formulas and functions
Experienced in data analysis and visualization
Familiar with pivot tables and charts
Q110. What is lacking in current cyber lanscape.
Lack of proactive measures, shortage of skilled professionals, and increasing sophistication of cyber threats are major issues in the current cyber landscape.
Lack of proactive measures to prevent cyber attacks
Shortage of skilled professionals in the cybersecurity field
Increasing sophistication of cyber threats such as ransomware and phishing attacks
Q111. how do i analyse a company's fundamentals
Analyzing a company's fundamentals involves evaluating its financial statements, management team, industry position, and competitive advantage.
Review financial statements such as income statement, balance sheet, and cash flow statement to assess profitability, liquidity, and solvency.
Evaluate management team's experience, track record, and strategic vision.
Assess the company's industry position, market share, growth potential, and competitive landscape.
Analyze competitive adv...read more
Q112. Do you know AWS and Azure Cloud services
Yes, I am familiar with both AWS and Azure cloud services.
I have experience working with AWS services such as EC2, S3, RDS, and Lambda
I have also worked with Azure services like Virtual Machines, Blob Storage, and Azure Functions
I am familiar with the differences between AWS and Azure and when to use each platform
Q113. What is java bean class, singleton class
Java bean class is a reusable software component and singleton class restricts the instantiation of a class to one object.
Java bean class is a POJO (Plain Old Java Object) that encapsulates many objects into a single object for easy access.
It follows a naming convention where the class name starts with a capital letter and has a public default constructor.
Singleton class is a design pattern that ensures only one instance of a class is created and provides a global point of ac...read more
Q114. Frequently used functions and other tools used in excel for data analytics.
Common functions and tools in Excel for data analytics
Pivot tables for summarizing and analyzing data
VLOOKUP and HLOOKUP for searching and retrieving data
IF, SUMIF, and COUNTIF for conditional calculations
Data validation for ensuring data accuracy
Charts and graphs for visualizing data trends
Q115. What do you know about auditing?
Auditing is the process of examining financial records to ensure accuracy and compliance with laws and regulations.
Auditing involves reviewing financial statements, records, and transactions.
It is done to ensure that financial information is accurate and reliable.
Auditors also check for compliance with laws and regulations.
There are different types of audits, such as internal, external, and forensic audits.
Auditing is important for maintaining transparency and accountability ...read more
Q116. How to support to Plant and Business through your technical knowledge
I can provide technical expertise to optimize plant operations and support business goals.
Implementing new technologies to improve efficiency and reduce costs
Troubleshooting technical issues to minimize downtime
Training plant staff on new equipment and processes
Collaborating with cross-functional teams to drive continuous improvement
Analyzing data to identify areas for optimization and growth
Q117. Write a program to check if a program is palindrome
Program to check if a string is a palindrome
Create a function that takes a string as input
Remove all non-alphanumeric characters and convert to lowercase
Compare the string with its reverse to check if it's a palindrome
Q118. Risk assessment steps for onboarding news applications
Risk assessment steps for onboarding new applications involve identifying potential threats, evaluating vulnerabilities, and implementing controls.
Identify potential threats such as data breaches, malware attacks, and unauthorized access.
Evaluate vulnerabilities in the application's design, code, and infrastructure.
Implement controls such as encryption, access controls, and regular security audits.
Conduct regular risk assessments to identify new threats and vulnerabilities.
Tr...read more
Q119. How would you structure an industry study?
An industry study can be structured by defining the scope, conducting research, analyzing data, and presenting findings.
Define the scope of the study including the industry sector, key players, market trends, and challenges.
Conduct thorough research using a combination of primary and secondary sources such as interviews, surveys, reports, and databases.
Analyze the collected data using tools like SWOT analysis, Porter's Five Forces, and market segmentation.
Present the findings...read more
Q120. Difference between slicer and filter?
Slicers and filters are both used to control data visibility in Power BI, but slicers are visual elements while filters can be applied programmatically.
Slicers are visual controls that allow users to select values from a predefined list, which filters the data accordingly.
Filters can be applied programmatically using DAX formulas or Power Query M language.
Slicers are typically used for interactive data exploration and analysis, while filters are more commonly used for data ma...read more
Q121. When a company has revenues falling and still in profit
When a company has falling revenues but is still profitable, it may be due to cost-cutting measures, increased efficiency, or diversified revenue streams.
Cost-cutting measures may include reducing overhead expenses, renegotiating contracts, or streamlining operations.
Increased efficiency in production processes or sales strategies can help maintain profitability despite falling revenues.
Diversified revenue streams, such as expanding into new markets or offering new products/s...read more
Q122. Ind AS Knowledge of Ind AS 109, 107 & 32
Ind AS 109, 107 & 32 are accounting standards used in India.
Ind AS 109 deals with financial instruments and their classification, measurement, and impairment.
Ind AS 107 deals with disclosures related to financial instruments.
Ind AS 32 deals with financial instruments presentation.
These standards are used by companies in India to prepare their financial statements in accordance with the Indian Accounting Standards (Ind AS).
Q123. Difference between US GAAP and IFRS
US GAAP and IFRS are two different accounting standards used globally.
US GAAP is rules-based while IFRS is principles-based.
US GAAP allows LIFO inventory accounting while IFRS does not.
IFRS requires more extensive disclosures in financial statements.
US GAAP allows for extraordinary items to be reported separately while IFRS does not.
IFRS requires the capitalization of development costs while US GAAP does not.
US GAAP requires the use of the indirect method for the statement of...read more
Q124. Intermediate SQL with group by, with clause
Intermediate SQL with group by and with clause
GROUP BY is used to group rows based on a column or expression
WITH clause is used to create a temporary table or subquery
Can be used together to perform complex queries
Example: SELECT column1, SUM(column2) FROM table1 GROUP BY column1
Example: WITH temp_table AS (SELECT column1, column2 FROM table1) SELECT * FROM temp_table
Q125. Do you know how to build a dashboard?
Yes, I know how to build a dashboard.
Identify key metrics and data sources
Choose appropriate visualization tools
Design layout for easy understanding
Include interactive elements for user engagement
Q126. How did you do implementation in real time
I have experience with implementing new processes and systems in real time by carefully planning, communicating with stakeholders, and monitoring progress.
Develop a detailed implementation plan outlining tasks, timelines, and responsibilities
Communicate effectively with team members and stakeholders to ensure everyone is on the same page
Monitor progress regularly and make adjustments as needed to stay on track
Provide training and support to team members to ensure successful i...read more
Q127. How to audit cash, prepare reconciliation, A/R, PPE assertions type of question asked
Auditing cash, preparing reconciliations, and assessing A/R and PPE assertions.
Start by obtaining the cash balance from the general ledger and comparing it to the bank statement.
Perform bank reconciliations to ensure all transactions are accurately recorded.
For accounts receivable, confirm balances with customers and assess the allowance for doubtful accounts.
For property, plant, and equipment (PPE), review the depreciation method used and ensure assets are properly valued.
Te...read more
Q128. Wha are important feature of service cloud, LWC decorators, events in lwc, asynchronous apex , batch class, flows and its type , experience cloud basics .
Service Cloud features, LWC decorators, events, asynchronous apex, batch class, flows, and experience cloud basics.
Service Cloud features include case management, knowledge base, omni-channel routing, and service console.
LWC decorators are used to add metadata to Lightning web components, such as @api, @track, and @wire.
Events in LWC are used for communication between components, such as standard events like onchange and custom events.
Asynchronous Apex allows for long-running...read more
Q129. IFRS 16 explanation and why it is amended
IFRS 16 is a new accounting standard that requires lessees to recognize assets and liabilities for all leases on their balance sheets.
IFRS 16 was amended to improve financial reporting transparency and provide a more accurate representation of a company's financial position.
The standard eliminates the distinction between operating and finance leases for lessees, resulting in all leases being recognized on the balance sheet.
Under IFRS 16, lessees must recognize a right-of-use ...read more
Q130. -What is CAPM
CAPM stands for Capital Asset Pricing Model, a financial model used to determine the expected return on an investment.
CAPM is used to calculate the expected return on an investment based on the risk-free rate, market risk premium, and beta of the asset.
It assumes that investors are rational and risk-averse, and that they require compensation for taking on additional risk.
The model is widely used in finance and investment management.
For example, a portfolio manager may use CAP...read more
Q131. Why do companies use KYC?
Companies use KYC to verify the identity of their customers and comply with regulations.
KYC helps companies prevent fraud and financial crimes.
KYC also helps companies build trust with their customers.
KYC is required by law in many countries to prevent money laundering and terrorist financing.
KYC can also help companies better understand their customers and tailor their products and services to their needs.
Examples of companies that use KYC include banks, insurance companies,...read more
Q132. Explain feature file linking in relation to the step definition file?
Feature file linking is the process of connecting feature files with step definition files in BDD testing.
Feature files contain scenarios written in Gherkin language
Step definition files contain the actual code implementation for the steps in feature files
Linking is done by specifying the path to the step definition file in the feature file
This allows the automation tool to execute the steps defined in the feature file
Q133. What do you know about servicenow
ServiceNow is a cloud-based platform that provides IT service management, IT operations management, and IT business management solutions.
ServiceNow offers a range of products and services for IT professionals to streamline and automate their workflows.
It helps organizations manage their IT infrastructure, services, and operations more efficiently.
ServiceNow's platform includes modules for IT service management, IT operations management, and IT business management.
It allows fo...read more
Q134. Regulators and Regulations? Why banks do KYC?
Banks do KYC to comply with regulations and prevent financial crimes.
KYC helps banks verify the identity of their customers and assess the risk of doing business with them.
Regulators require banks to implement KYC procedures to prevent money laundering, terrorist financing, and other financial crimes.
KYC also helps banks maintain a good reputation and avoid legal and financial penalties.
Examples of KYC regulations include the USA PATRIOT Act, the EU's Fourth Anti-Money Launde...read more
Q135. What do you mean by a shell company?
A shell company is a business that exists only on paper and has no significant assets or operations.
Shell companies are often used for illegal activities such as money laundering or tax evasion.
They can also be used for legitimate purposes such as holding assets or facilitating business transactions.
Shell companies typically have minimal employees and physical presence.
Examples of shell companies include those set up in tax havens like the Cayman Islands.
They may also be used...read more
Q136. What is Change Management and Access Control Management in details with example
Change Management involves controlling changes to IT systems, while Access Control Management focuses on managing user access to these systems.
Change Management is the process of managing changes to IT systems in a controlled and systematic manner.
Access Control Management involves managing user access to IT systems, ensuring only authorized users have access to specific resources.
Change Management includes steps like planning, testing, implementing, and documenting changes t...read more
Q137. What are the fundamental concepts of security?
Fundamental concepts of security include confidentiality, integrity, availability, authentication, and authorization.
Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.
Integrity: Ensuring that data is accurate, complete, and has not been tampered with.
Availability: Ensuring that information and resources are accessible when needed.
Authentication: Verifying the identity of users or systems accessing information.
Authorization: G...read more
Q138. What steps are involved in fetching data from an on-premises Unix server?
Steps involved in fetching data from an on-premises Unix server
Establish a secure connection to the Unix server using SSH or other protocols
Identify the data source on the Unix server and determine the data extraction method
Use tools like SCP, SFTP, or rsync to transfer the data from the Unix server to Azure storage
Transform the data as needed before loading it into Azure Data Lake or Azure SQL Database
Q139. What contributions have you made to the framework?
I have contributed to the framework by designing and implementing new test cases, improving existing test scripts, and enhancing automation capabilities.
Designed and implemented new test cases to cover additional functionalities
Improved existing test scripts for better efficiency and coverage
Enhanced automation capabilities by integrating new tools and technologies
Collaborated with developers to identify and resolve issues in the framework
Q140. How do you manage dynamic elements on a webpage?
Dynamic elements on a webpage are managed using various techniques like waiting for element visibility, using explicit waits, and handling AJAX calls.
Use explicit waits to wait for the element to be present, visible, clickable, etc.
Use dynamic locators like XPath, CSS selectors, or relative locators to locate elements that change dynamically.
Handle AJAX calls by waiting for the call to complete before interacting with the element.
Use frameworks like Selenium WebDriver to inte...read more
Q141. What is the structure of a framework? Explain.
A framework is a structured set of guidelines, libraries, and tools used to develop and test software applications.
A framework provides a foundation for building software applications by defining the overall structure and design patterns.
It includes reusable components, libraries, and utilities that help in automating tasks and improving efficiency.
Frameworks can be categorized into different types such as testing frameworks, web application frameworks, and mobile app framewo...read more
Q142. What do you know about Cloud Computing?
Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.
It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.
Examples of cloud computing services include Amazon Web Servi...read more
Q143. Do you know Wireless Communication System?
Yes, I am familiar with Wireless Communication Systems.
I have experience with setting up and securing Wi-Fi networks
I understand different wireless protocols such as Bluetooth, NFC, and Zigbee
I am knowledgeable about wireless security measures like WPA2 encryption
I have worked with mobile devices and their wireless capabilities
Q144. Write client script of populate caller's manager name deptmant name in the description field
Use client script to populate caller's manager and department names in the description field.
Create a client script that triggers on the 'Caller' field change event.
Retrieve the caller's manager and department names from the user record.
Set the description field value to include the caller's manager and department names.
Ensure the client script runs smoothly without errors.
Q145. Difference between ADLS gen 1 and gen 2?
ADLS gen 2 is an upgrade to gen 1 with improved performance, scalability, and security features.
ADLS gen 2 is built on top of Azure Blob Storage, while gen 1 is a standalone service.
ADLS gen 2 supports hierarchical namespace, which allows for better organization and management of data.
ADLS gen 2 has better performance for large-scale analytics workloads, with faster read and write speeds.
ADLS gen 2 has improved security features, including encryption at rest and in transit.
AD...read more
Q146. NPV and IRR, when to use what?
NPV is used to determine the present value of future cash flows, while IRR is used to determine the rate of return on an investment.
Use NPV when comparing projects with different cash flow patterns
Use IRR when comparing projects with similar cash flow patterns
NPV assumes reinvestment at the cost of capital, while IRR assumes reinvestment at the IRR rate
NPV is more accurate when cash flows are certain, while IRR is more useful when cash flows are uncertain
Example: Use NPV to c...read more
Q147. how do you copy data from on-premise to azure cloud
Data can be copied from on-premise to Azure cloud using various methods like Azure Data Factory, Azure Storage Explorer, Azure Data Migration Service, etc.
Use Azure Data Factory to create data pipelines for moving data from on-premise to Azure cloud
Utilize Azure Storage Explorer to manually copy data from on-premise to Azure Blob Storage
Leverage Azure Data Migration Service for migrating large volumes of data from on-premise databases to Azure SQL Database
Consider using Azure...read more
Q148. what is circular linked list?
A circular linked list is a linked list where the last node points to the first node, forming a loop.
Each node has a pointer to the next node and the last node points to the first node.
Traversal can start from any node and continue until the starting node is reached again.
Used in applications where data needs to be accessed in a circular manner, such as a playlist in music apps.
Q149. Various financial reporting standards
Financial reporting standards vary by country and industry, with some of the most common being GAAP, IFRS, and SEC regulations.
GAAP (Generally Accepted Accounting Principles) is used in the United States
IFRS (International Financial Reporting Standards) is used in many countries around the world
SEC (Securities and Exchange Commission) regulations apply to publicly traded companies in the United States
Other standards include ASPE (Accounting Standards for Private Enterprises) ...read more
Q150. What are the major components while drafting a change plan?
Major components of a change plan include stakeholder analysis, communication strategy, risk assessment, implementation timeline, and evaluation metrics.
Stakeholder analysis: Identify key stakeholders and their roles in the change process.
Communication strategy: Develop a plan for how information about the change will be shared with stakeholders.
Risk assessment: Identify potential risks and develop strategies to mitigate them.
Implementation timeline: Create a detailed timelin...read more
Q151. Explain what you are doing in your currect profile?
I am currently working as a Risk Consultant, where I assess and analyze potential risks for clients to help them make informed decisions.
Conducting risk assessments to identify potential threats and vulnerabilities
Analyzing data to evaluate the likelihood and impact of risks
Developing risk mitigation strategies and recommendations for clients
Communicating findings and recommendations to clients and stakeholders
Q152. what is the financial posting after invoices gets posted?
Financial posting after invoices are posted includes updating the general ledger and accounts payable/receivable.
Invoices are typically posted to accounts payable or accounts receivable
General ledger is updated with the transaction details
Accounts payable/receivable balances are adjusted accordingly
Q153. What are the differences between component event and application event?
Component events are fired and handled by a single component, while application events are fired and handled by multiple components.
Component events are used for communication between components within a single application.
Application events are used for communication between components across multiple applications.
Component events are fired using fireEvent() method, while application events are fired using $A.get('e.namespace:eventName').fire() method.
Component events are ha...read more
Q154. What is Pep screening ?
PEP screening is a process used to identify potential employees who are likely to be successful in a particular role.
PEP screening involves assessing candidates based on their skills, experience, and personality traits.
It helps employers make informed hiring decisions and reduce turnover rates.
Examples of PEP screening methods include behavioral assessments, cognitive tests, and job simulations.
Q155. -Formula of FCFF and FCFE
FCFF and FCFE are formulas used in finance to calculate cash flow available to investors and equity holders respectively.
FCFF = Operating Cash Flow - Capital Expenditures + Net Borrowing
FCFE = Net Income - (Capital Expenditures - Depreciation) - Change in Working Capital + Net Borrowing
FCFF is used to determine the cash flow available to all investors, while FCFE is used to determine the cash flow available to equity holders
Both formulas are important in determining a company...read more
Q156. What are your current responsibilities as Azure Data Engineer
As an Azure Data Engineer, my current responsibilities include designing and implementing data solutions on Azure, optimizing data storage and processing, and ensuring data security and compliance.
Designing and implementing data solutions on Azure
Optimizing data storage and processing for performance and cost efficiency
Ensuring data security and compliance with regulations
Collaborating with data scientists and analysts to support their data needs
Q157. 2) How will you test Cost of sales WP?
Cost of sales WP can be tested by analyzing the expenses incurred in producing and delivering the product or service.
Review the cost of raw materials and labor involved in production
Analyze the cost of shipping and delivery
Compare the cost of sales to revenue generated
Check for any discrepancies or anomalies in the data
Consider industry benchmarks and trends
Q158. What is the process of designing a c&b strategy ?
Designing a c&b strategy involves analyzing market trends, defining objectives, creating policies, and implementing programs.
Conduct a thorough analysis of market trends and compensation practices
Define clear objectives and align them with the company's goals
Create policies that are fair, competitive, and compliant with legal requirements
Implement programs that support the company's culture and values
Regularly review and adjust the strategy to ensure its effectiveness
Q159. Journal entry for depreciation of an asset
Depreciation of an asset is recorded in a journal entry to allocate the cost of the asset over its useful life.
Debit the Depreciation Expense account to recognize the expense
Credit the Accumulated Depreciation account to reduce the asset's carrying amount
Include the date, description of the asset, amount of depreciation, and any relevant calculations
Journal entry should follow the double-entry accounting system
Q160. What is Semantic layer?
Semantic layer is a virtual layer that provides a simplified view of complex data.
It acts as a bridge between the physical data and the end-user.
It provides a common business language for users to access data.
It simplifies data access by hiding the complexity of the underlying data sources.
Examples include OLAP cubes, data marts, and virtual tables.
Q161. Did you know anything about micro communication
Micro communication refers to the exchange of information through small, discreet channels or devices.
Micro communication can involve technologies such as microphones, earpieces, and hidden cameras.
It is often used in espionage, surveillance, and security operations.
Examples include covert agents communicating with a handler via a hidden earpiece, or a spy transmitting information through a concealed microphone.
Q162. What all the requirements you worked in enhancements
I have worked on various requirements in enhancements.
Implemented custom logic to enhance standard SAP functionality
Developed user exits and BAdIs to add additional functionality
Enhanced existing reports and forms to meet specific business requirements
Integrated external systems with SAP using enhancement techniques
Worked on performance enhancements to optimize system performance
Q163. How to explain the functionality of PO to Customer
A Purchase Order (PO) is a document issued by a buyer to a seller, outlining the details of goods or services to be purchased.
Explain that a PO is a legally binding document that specifies the quantity, price, and terms of the purchase
Mention that the PO helps both parties track and manage the order, ensuring timely delivery and payment
Highlight that the PO serves as a reference for resolving any disputes or discrepancies in the transaction
Q164. Cryptography Encryption types of encryption
Cryptography encryption involves various types of encryption algorithms to secure data.
Symmetric encryption uses a single key for both encryption and decryption (e.g. AES)
Asymmetric encryption uses a pair of keys, public and private, for encryption and decryption (e.g. RSA)
Hash functions generate fixed-size output from input data (e.g. SHA-256)
Stream ciphers encrypt data bit by bit (e.g. RC4)
Block ciphers encrypt data in fixed-size blocks (e.g. DES)
Q165. Would you like to take up tax roles if audit is not available
Yes, I am open to taking up tax roles if audit opportunities are not available.
I have a strong foundation in accounting principles and tax regulations
I am willing to learn and adapt to new roles and responsibilities
Taking up tax roles can provide me with valuable experience and broaden my skill set
Q166. Why is due diligence necessary?
Due diligence is necessary to assess risks, verify information, and make informed decisions.
To identify potential risks and liabilities associated with a business transaction or investment.
To verify the accuracy of information provided by the other party.
To evaluate the financial health and performance of a company.
To ensure compliance with legal and regulatory requirements.
To make informed decisions based on reliable and comprehensive information.
Example: Conducting due dili...read more
Q167. When should revenue be recognised in case of ex work inco term
Revenue should be recognized in case of ex work inco term when the risks and rewards of ownership have been transferred to the buyer.
Revenue should be recognized when the seller has completed its obligations under the ex work inco term.
The transfer of risks and rewards of ownership to the buyer is a key factor in determining when revenue should be recognized.
The seller should have no significant continuing involvement or control over the goods after they have been delivered t...read more
Q168. What challenges did you encounter during the audit process?
Challenges faced during the audit process included lack of cooperation from certain departments, incomplete documentation, and tight deadlines.
Lack of cooperation from certain departments made it difficult to obtain necessary information for the audit.
Incomplete documentation required additional time and effort to gather missing information.
Tight deadlines added pressure to complete the audit within a limited timeframe.
Q169. What is internal Audit and tell me its complete process
Internal Audit is a systematic and independent evaluation of an organization's operations to ensure effectiveness, efficiency, and compliance.
Planning: Define scope, objectives, and methodology of the audit.
Fieldwork: Collect and analyze data, identify risks and controls.
Reporting: Communicate findings, recommendations, and action plans.
Follow-up: Monitor implementation of recommendations and track progress.
Examples: Performing financial audits, operational audits, compliance...read more
Q170. What is OFAC and FATCA? CDD and EDD?
OFAC and FATCA are regulations related to financial compliance. CDD and EDD are customer due diligence and enhanced due diligence processes.
OFAC (Office of Foreign Assets Control) is a US government agency that enforces economic and trade sanctions against countries, organizations, and individuals involved in terrorism, narcotics trafficking, and other illegal activities.
FATCA (Foreign Account Tax Compliance Act) is a US law that requires foreign financial institutions to rep...read more
Q171. How corporate kyc works
Corporate KYC is the process of verifying the identity of a company and its beneficial owners.
The company must provide documentation such as incorporation papers, business licenses, and tax identification numbers.
Beneficial owners must also be identified and verified through documentation such as passports or government-issued IDs.
The KYC process helps prevent money laundering, terrorist financing, and other illegal activities.
Financial institutions and other regulated entiti...read more
Q172. What actually needs to do programming?
Programming is the process of writing instructions for a computer to perform specific tasks.
Programming involves writing code using programming languages.
It requires problem-solving skills to break down complex problems into smaller, manageable tasks.
Programmers need to understand algorithms and data structures to optimize code efficiency.
Debugging and testing are essential to identify and fix errors in the code.
Continuous learning and staying updated with new technologies ar...read more
Q173. Guesstimate to estimate number of if tyres sold in a year
Estimate the number of car tyres sold in a year
Consider the total number of cars on the road
Assume an average tyre lifespan and replacement frequency
Factor in seasonal variations and regional differences
Consult industry reports and market trends
Approximately 1.5 billion car tyres are sold globally each year
Q174. How will you recognise revenue in service industries
Revenue recognition in service industries depends on the type of service provided and the terms of the contract.
Recognize revenue when the service is completed and the customer is billed
Recognize revenue over time if the service is ongoing and the customer is billed periodically
Recognize revenue when the service is delivered if payment is received in advance
Recognize revenue based on percentage of completion if the service is long-term and complex
Consider any warranties or gu...read more
Q175. What is difference between actual costing and standard costing
Actual costing is based on the actual costs incurred, while standard costing uses predetermined costs for materials, labor, and overhead.
Actual costing uses actual costs incurred for materials, labor, and overhead, providing a more accurate reflection of costs.
Standard costing uses predetermined costs for materials, labor, and overhead, allowing for easier budgeting and cost control.
Actual costing is more time-consuming and complex to calculate compared to standard costing.
Ac...read more
Q176. Tell me about golden rules of accountancy
Golden rules of accountancy are basic principles that guide the process of recording financial transactions.
There are three golden rules of accountancy: Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; Debit all expenses and losses, Credit all incomes and gains.
These rules help ensure that financial transactions are recorded accurately and consistently.
For example, when a company receives cash from a customer, the cash account is debited (incre...read more
Q177. What are the parametrics each manager should follow?
Managers should follow key parametrics such as communication, goal setting, team development, and performance evaluation.
Communication: Regularly communicate with team members to ensure clarity and alignment.
Goal setting: Set clear and achievable goals for the team and individuals.
Team development: Invest in training and development opportunities for team members.
Performance evaluation: Conduct regular performance reviews and provide feedback for improvement.
Q178. What are the regulators for AML, KYC and CTF?
Regulators for AML, KYC and CTF include FinCEN, FATF, and local regulatory authorities.
Financial Crimes Enforcement Network (FinCEN) - U.S. regulatory agency responsible for combating money laundering and terrorist financing.
Financial Action Task Force (FATF) - International organization that sets standards and promotes effective implementation of measures to combat money laundering and terrorist financing globally.
Local regulatory authorities - Each country may have its own ...read more
Q179. Do you CI/CD pipeline
Yes, I am familiar with CI/CD pipelines and have experience implementing them in projects.
I have experience setting up CI/CD pipelines using tools like Jenkins, GitLab CI, or CircleCI.
I understand the importance of automation in the software development process.
I have worked on integrating automated testing and deployment processes into CI/CD pipelines.
I am familiar with concepts like continuous integration, continuous delivery, and continuous deployment.
Q180. Type pf PO and Transfers in Oracle Retail Merchandising Module
Purchase Orders (PO) and Transfers are types of transactions in Oracle Retail Merchandising Module.
Purchase Orders (PO) are used to order merchandise from vendors.
Transfers are used to move merchandise between stores or warehouses.
POs can be created manually or automatically based on reorder points.
Transfers can be initiated to balance inventory levels or fulfill customer demand.
Q181. Do you know anything about Indian Tax?
Yes, Indian Tax system is complex and diverse with various taxes like income tax, GST, customs duty, etc.
Indian tax system is governed by the Central Board of Direct Taxes (CBDT) and the Central Board of Indirect Taxes and Customs (CBIC)
Income tax is levied on the income earned by individuals and businesses
Goods and Services Tax (GST) is a value-added tax levied on the supply of goods and services
Customs duty is levied on goods imported into India
There are also other taxes li...read more
Q182. Do you have any prior experience in internal auditing
Yes, I have 5 years of experience in internal auditing in the banking industry.
I have 5 years of experience in internal auditing in the banking industry
Conducted regular audits to ensure compliance with regulations
Identified and addressed financial risks within the organization
Prepared detailed audit reports for management review
Q183. Do you have idea about how the cloud works?
Cloud computing involves storing and accessing data and programs over the internet instead of on a computer's hard drive.
Cloud computing allows users to access data and applications from any device with an internet connection.
It provides scalability, flexibility, and cost-efficiency for businesses.
Examples of cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Q184. Self introduction What is AML, KYC and Sanction Screening
AML, KYC and Sanction Screening are measures taken by financial institutions to prevent money laundering, terrorist financing and other illegal activities.
AML stands for Anti-Money Laundering and refers to the policies, procedures and regulations put in place by financial institutions to prevent, detect and report money laundering activities.
KYC stands for Know Your Customer and refers to the process of verifying the identity of a customer before providing them with financial...read more
Q185. What is DCF model ?
DCF model is a valuation method used to estimate the value of an investment based on its future cash flows.
DCF stands for Discounted Cash Flow
It involves projecting future cash flows and discounting them back to their present value
The discount rate used is typically the cost of capital or required rate of return
It is commonly used in finance to value stocks, bonds, and other investments
Q186. how would you improve the claims process an Insurance clients?
Implementing automation, streamlining processes, enhancing communication with clients.
Implement automation to reduce manual errors and speed up processing times
Streamline processes to eliminate unnecessary steps and improve efficiency
Enhance communication with clients through regular updates and personalized interactions
Q187. Difference between limitation of liability and indemnfication clause
Limitation of liability caps the maximum amount a party can be liable for, while indemnification clause requires one party to compensate the other for losses.
Limitation of liability sets a maximum cap on the amount of damages a party can be liable for in case of breach or negligence.
Indemnification clause requires one party to compensate the other for losses, damages, or liabilities incurred as a result of a specific event or action.
Limitation of liability is often used to li...read more
Q188. What is sanctions and sanction screening?
Sanctions are penalties imposed on individuals, entities, or countries to enforce international laws or policies. Sanction screening is the process of checking individuals or entities against sanction lists to ensure compliance.
Sanctions are penalties imposed on individuals, entities, or countries for violating international laws or policies.
Sanctions can include financial restrictions, trade embargoes, travel bans, and asset freezes.
Sanction screening involves checking indiv...read more
Q189. Prepare a ppt based on topic's internet search within 30 minutes and present
Prepare a ppt on internet search topic in 30 minutes and present
Research the topic thoroughly using reliable sources
Create a clear outline for the presentation
Include relevant images, graphs, and statistics to support your points
Practice your presentation to ensure smooth delivery
Q190. How do you mitigate those risks identified?
To mitigate identified risks, we implement risk management strategies, create contingency plans, conduct regular risk assessments, and ensure proper communication.
Implement risk management strategies such as risk avoidance, risk reduction, risk transfer, and risk acceptance.
Create contingency plans to address potential risks and minimize their impact.
Conduct regular risk assessments to identify new risks and evaluate the effectiveness of existing risk mitigation measures.
Ensu...read more
Q191. How to initiate Sparkcontext
To initiate Sparkcontext, create a SparkConf object and pass it to SparkContext constructor.
Create a SparkConf object with app name and master URL
Pass the SparkConf object to SparkContext constructor
Example: conf = SparkConf().setAppName('myApp').setMaster('local[*]') sc = SparkContext(conf=conf)
Stop SparkContext using sc.stop()
Q192. What is transfer pricing? Which forms are used for filing? Methods in transfer pricing
Transfer pricing is the setting of prices for goods and services sold between related entities within an organization.
Transfer pricing is used to determine the prices at which goods and services are transferred between related entities within a company.
Forms such as Form 5471, Form 8865, and Form 8858 are commonly used for filing transfer pricing documentation.
Common methods in transfer pricing include comparable uncontrolled price (CUP), cost plus, resale price, and profit s...read more
Q193. Which domain? What is service now?
Q194. What are the levels in FAS157
FAS157 has three levels: Level 1 - quoted prices in active markets, Level 2 - observable inputs, Level 3 - unobservable inputs.
Level 1: Quoted prices in active markets
Level 2: Observable inputs
Level 3: Unobservable inputs
Q195. Why material Ledger mandatory in s/4hana?
Material Ledger is mandatory in S/4HANA for accurate valuation of inventory and cost of goods sold.
Material Ledger provides real-time, multi-dimensional valuation of inventory
It allows for parallel valuation in different currencies and valuation views
Enables accurate calculation of actual costs for materials using actual costing method
Supports transfer pricing and profit center valuation
Q196. What is the sales and procurement process?
Sales and procurement process involves the steps taken to acquire goods or services from suppliers and sell them to customers.
Sales process involves identifying leads, converting them to opportunities, creating quotes, and closing deals.
Procurement process involves identifying needs, selecting suppliers, negotiating contracts, and receiving goods/services.
Both processes involve order processing, invoicing, and payment.
Integration with inventory management and financial system...read more
Q197. What is Vulnerability?
Vulnerability is the state of being open to harm, attack, or damage.
Vulnerability refers to the susceptibility to physical, emotional, or psychological harm.
It can also refer to weaknesses or gaps in security systems that can be exploited by attackers.
Being vulnerable can also mean being open and honest about one's feelings or struggles.
Examples include a child being vulnerable to bullying, a computer system vulnerable to hacking, or a person vulnerable to heartbreak.
Q198. On python Code for sum of digit Palindrome or not
Python code for finding sum of digits and checking if a number is palindrome or not.
To find sum of digits, convert the number to string and iterate over each character to add them up
To check if a number is palindrome, convert the number to string and compare it with its reverse
Alternatively, you can also convert the number to a list of digits and check if it is equal to its reverse
Q199. Journal entry for purchase of an asset
Journal entry for purchase of an asset involves debiting the asset account and crediting the cash or accounts payable account.
Debit the asset account for the cost of the asset
Credit the cash or accounts payable account for the same amount
Include a description of the asset purchased in the journal entry
Ensure the entry follows the double-entry accounting system
Q200. Explanation of Real time project flow
Real time project flow refers to the sequence of events and processes that occur in a project as they happen, without any delay.
Real time data collection and analysis
Immediate decision-making based on current information
Continuous monitoring and updates
Quick response to changes or issues
Examples: Stock market trading, online customer support systems
Top HR Questions asked in Honda Motorcycle & Scooter
Interview Process at Honda Motorcycle & Scooter
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month