Filter interviews by
Incoming and outgoing materials should be handled with proper protocols and procedures to ensure security.
Establish clear guidelines and protocols for handling incoming and outgoing materials
Implement a system for tracking and documenting all incoming and outgoing materials
Conduct thorough inspections and screenings of incoming materials to detect any potential security threats
Ensure proper packaging and labeling of ou...
I applied via Naukri.com and was interviewed before May 2021. There were 2 interview rounds.
Supervision/control of security staff
Maintenance of security office records/documents
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
posted on 10 Oct 2024
TCP/IP model is a conceptual framework used to understand how data is transmitted over a network.
Consists of four layers: Application, Transport, Internet, Link
Each layer has specific functions and protocols
Data is encapsulated and decapsulated as it moves through the layers
Example: HTTP operates at the Application layer, while TCP operates at the Transport layer
Strength: Strong leadership skills, Weakness: Difficulty delegating tasks
Strength: Effective communication and problem-solving skills
Strength: Ability to remain calm under pressure
Weakness: Tendency to take on too much responsibility
Weakness: Struggle with trusting others to complete tasks
I applied via Company Website and was interviewed in Jul 2023. There were 3 interview rounds.
Assignment and online activist network boan you too and we can do it
I applied via Company Website and was interviewed in Jul 2022. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2022. There were 3 interview rounds.
Access control system restricts entry to authorized personnel. CCTV monitoring is surveillance through cameras.
Access control system limits access to specific areas or resources based on authorization.
Material movement refers to the control of goods and products entering or leaving a facility.
CCTV monitoring involves the use of cameras to monitor and record activities in a specific area.
Access control and CCTV monitori...
Key issuance process is the procedure of providing access to keys to authorized personnel.
The process involves verifying the identity of the person requesting the key.
The key is then issued to the person along with instructions on how to use it.
The process also includes keeping a record of who has been issued keys and when they were returned.
Examples of keys that may be issued include building keys, room keys, and vehi
Workplace violence and medical emergencies
I applied via Referral and was interviewed before Nov 2022. There were 3 interview rounds.
Security Releted Question🙋
Cognizant
Teleperformance
Reliance Retail
iEnergizer