Filter interviews by
Easy test you can clear it with keen knowledge
I have a strong background in auditing, excellent attention to detail, and a proven track record of identifying and mitigating risks.
Extensive experience in auditing practices and procedures
Strong attention to detail and ability to identify potential risks
Proven track record of successfully mitigating risks and improving internal controls
I bring a strong background in auditing, risk assessment, and compliance to help improve internal controls and minimize financial risks.
I have extensive experience in conducting audits to identify weaknesses and recommend improvements.
I am skilled in risk assessment to help mitigate potential financial risks for the company.
I can assist in ensuring compliance with regulations and industry standards to avoid penalties a...
Top trending discussions
posted on 3 Feb 2025
I was interviewed in Jan 2025.
VLANs are used to segment network traffic for security and performance purposes.
VLANs divide a single physical network into multiple virtual networks.
Each VLAN has its own broadcast domain, reducing network congestion.
VLANs can be configured on switches by assigning ports to specific VLANs.
VLAN tagging allows for traffic to be identified and routed to the correct VLAN.
VLANs can improve network security by isolating sen
Routing protocol is a set of rules used by routers to determine the best path for data packets to reach their destination.
Routing protocols help routers communicate with each other to share information about network topology.
They determine the best path for data packets based on factors like hop count, bandwidth, and delay.
Examples of routing protocols include RIP, OSPF, EIGRP, and BGP.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Data is encapsulated and decapsu...
It's so more complicated round and questions
LTE call flow involves multiple steps including connection establishment, data transfer, and connection release.
UE sends a connection request to the eNodeB
eNodeB forwards the request to the MME for authentication and authorization
MME communicates with the HSS for user authentication
Once authenticated, MME assigns a temporary ID to the UE and establishes a connection with the eNodeB
Data transfer occurs between the UE an...
LTE mobility procedures involve handover, tracking area update, and cell reselection.
Handover: process of transferring an ongoing call or data session from one cell to another
Tracking Area Update: updating the location of a mobile device when moving to a new tracking area
Cell Reselection: process of selecting the best cell when a mobile device moves out of the coverage area of the current cell
Logical reason and problem solving
I applied via Recruitment Consulltant
I was interviewed in Nov 2023.
First round was Aptitude test on logical reasoning
And coding problems on arrays and sql Queries
I applied via Company Website and was interviewed in Nov 2023. There were 2 interview rounds.
Timing and sync market and solution
based on 2 interviews
Interview experience
based on 171 reviews
Rating in categories
Deputy Manager
30
salaries
| ₹4.2 L/yr - ₹7.2 L/yr |
Business Development Executive
29
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
Assistant Manager
28
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Senior Executive
25
salaries
| ₹2.4 L/yr - ₹4 L/yr |
Assistant Sales Manager
21
salaries
| ₹2.6 L/yr - ₹5.1 L/yr |
Vodafone Idea
Bharti Airtel
Jio
Tata Communications