Mahindra Defence Systems
10+ Grasim Industries Interview Questions and Answers
Q1. Which is the technology suited for armoured warfare ammunition
The technology suited for armoured warfare ammunition is called Kinetic Energy Penetrator (KEP).
Kinetic Energy Penetrator (KEP) technology uses a dense, long rod made of a heavy metal like tungsten or depleted uranium to penetrate armour.
The rod is fired at high velocity from a gun, and upon impact, the kinetic energy is converted into heat, melting the armour and creating a hole.
KEP technology is used in various types of ammunition, including tank rounds, anti-tank missiles,...read more
Q2. What are future profile for armed forces for weapon systems
The future profile for armed forces for weapon systems is expected to be more technologically advanced and autonomous.
Increased use of unmanned systems and drones for surveillance and combat
Integration of artificial intelligence and machine learning in weapon systems
Development of hypersonic weapons for faster and more precise strikes
Focus on cyber warfare and electronic warfare capabilities
Continued modernization and upgrades of existing weapon systems
Q3. What is the customer demand that needs to be met
Customers demand high-quality products/services that meet their needs and expectations.
Customers want products/services that are reliable and efficient
Customers expect personalized experiences and excellent customer service
Customers demand transparency and ethical business practices
Customers want products/services that are affordable and provide value for money
Q4. What is the fertilization?
Fertilization is the process of fusion of a sperm cell with an egg cell to form a zygote.
Fertilization typically occurs in the fallopian tube of a female reproductive system.
It involves the penetration of the egg by the sperm and the fusion of their genetic material.
Fertilization marks the beginning of embryonic development.
In humans, fertilization results in the formation of a zygote which eventually develops into a fetus.
Q5. Technology Aspects of military experience
Military experience with technology aspects is valuable for sales and marketing roles.
Military experience provides exposure to advanced technology and equipment
Experience with communication and data systems
Ability to adapt quickly to new technology
Experience with cybersecurity and risk management
Examples: use of drones, satellite communication, advanced weaponry systems
Q6. What is natural frequency of a System
Natural frequency of a system is the frequency at which a system tends to oscillate in the absence of any external force.
Natural frequency is determined by the system's mass, stiffness, and damping properties.
It is the frequency at which a system will oscillate if disturbed and then left to vibrate freely.
Examples include a swinging pendulum, a vibrating guitar string, or a car suspension system.
Natural frequency is an important factor in designing structures and mechanical s...read more
Q7. What is Replicate?
Replicate is the process of copying data from one database to another in order to ensure data consistency and availability.
Replicate is commonly used in database management to create redundant copies of data for backup and disaster recovery purposes.
It helps in distributing data across multiple servers to improve performance and scalability.
Examples include MySQL replication, Oracle Data Guard, and SQL Server Always On Availability Groups.
Q8. What is the smotion?
Smotion is a term used to describe a combination of smooth motion.
Smotion refers to fluid and seamless movement.
It is often used in the context of animations or user interface design.
Examples include transitions between screens on a mobile app or the movement of elements on a website.
Q9. What is the Quorum?
Quorum is the minimum number of members required to be present at a meeting to make the proceedings valid.
Quorum ensures that decisions are made by a representative group of individuals.
It prevents a small group from making decisions on behalf of the entire organization.
For example, in a board meeting, the quorum might be set at 50%+1 of the total members.
If the quorum is not met, the meeting may not proceed or decisions made may not be valid.
Q10. What is the meaning of CTC
CTC stands for Cost to Company, which refers to the total salary package of an employee including all benefits and perks.
CTC includes salary, bonuses, incentives, allowances, and other benefits provided by the company.
It is the total amount spent by the company on an employee annually.
CTC helps in understanding the total cost incurred by the company for hiring and retaining an employee.
For example, if an employee's CTC is $50,000, it means the company is spending that amount ...read more
Q11. What is SQLi its types?
SQLi stands for SQL Injection. It is a type of cyber attack where an attacker injects malicious SQL code into a vulnerable website.
SQLi allows attackers to access sensitive data from a website's database
There are three types of SQLi: In-band, Inferential, and Out-of-band
In-band SQLi is the most common type and involves using the same communication channel to launch the attack and retrieve data
Inferential SQLi involves using logical deductions to infer information from the dat...read more
Q12. Owaps top10 .. explain anyone.?
OWASP Top 10 is a list of the most critical web application security risks.
Injection attacks: SQL, NoSQL, OS, LDAP, etc.
Broken authentication and session management
Cross-site scripting (XSS)
Broken access control
Security misconfiguration
Insecure cryptographic storage
Insufficient logging and monitoring
Insecure communication
Using components with known vulnerabilities
Insufficient attack protection and rate limiting
Q13. What is Dom xss?
Dom xss is a type of cross-site scripting attack that exploits vulnerabilities in client-side scripts.
Dom xss attacks occur when an attacker injects malicious code into a website's DOM (Document Object Model) through user input.
The injected code can then execute in the victim's browser, potentially stealing sensitive information or performing unauthorized actions.
Preventing Dom xss requires proper input validation and sanitization, as well as using security measures such as C...read more
Interview Process at Grasim Industries
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month