MetLife
30+ Zigsaw Consultancy Interview Questions and Answers
Q1. Type of controls worked upon. How to manage multiple assignments across different countries and time zones. Different stages of control testing i.e. population validation, documents required
Controls worked on include population validation and document verification. Managing multiple assignments across different countries and time zones requires effective communication and time management skills.
Implementing population validation to ensure accuracy and completeness of data
Verifying required documents to ensure compliance with regulations
Utilizing effective communication tools and strategies to coordinate assignments across different countries and time zones
Priori...read more
Q2. What do you know about validations that can be put in login feature of Salesforce?
Validations in the login feature of Salesforce ensure secure access and prevent unauthorized entry.
Validations can be used to enforce password complexity requirements.
IP range restrictions can be implemented to allow access only from specific locations.
Two-factor authentication can be enforced for an additional layer of security.
Login hours can be set to restrict access during specific time periods.
Login IP restrictions can be applied to allow access only from trusted IP addr...read more
Q3. Without using mouse how would you toggle between two operations(Shortcut key= Alt+Tab)
To toggle between two operations without using a mouse, press and hold the Alt key and then press the Tab key.
Press and hold the Alt key
While holding the Alt key, press the Tab key
Release the Alt key to switch between the two operations
Q4. What do you know about Data Security module in Salesforce?
Data Security module in Salesforce ensures the protection and confidentiality of data.
Data Security module includes features like object-level security, field-level security, record-level security, and sharing rules.
Object-level security controls access to entire objects and their records.
Field-level security restricts access to specific fields within an object.
Record-level security determines which records users can view and edit.
Sharing rules define the level of access user...read more
Q5. What if not offer as per expectation
I would negotiate and try to find a middle ground that is acceptable for both parties.
I would express my gratitude for the offer and the opportunity to interview.
I would mention my expectations and try to understand the reasoning behind the offer.
I would negotiate and present my case for a higher salary or additional benefits.
I would be open to compromise and find a middle ground that is acceptable for both parties.
I would also consider the overall package, including opportun...read more
Q6. What do you know about layouts?
Layouts in Salesforce define the arrangement of fields, related lists, and other components on a record detail or edit page.
Layouts determine the user interface for viewing and editing records in Salesforce.
They can be customized to display only relevant information and fields for different user profiles.
Layouts can include fields, related lists, buttons, and other components.
Multiple layouts can be created for different record types or user profiles.
Page layouts control the ...read more
Q7. How many points do you have in your trailhead account?
I have 5,000 points in my Trailhead account.
I have earned points by completing various modules and projects on Trailhead.
I have completed certifications which have also contributed to my points.
I actively participate in challenges and events to earn additional points.
Here are some examples of badges I have earned: [Badge 1], [Badge 2], [Badge 3].
Q8. What are KRA's?
KRA's are Key Result Areas, which are specific areas of responsibility that an individual or team is accountable for.
KRA's define the main areas of focus for an individual or team
They help in setting clear goals and expectations
KRA's are measurable and aligned with the overall objectives of the organization
They provide a framework for performance evaluation and feedback
Examples of KRA's can include sales targets, customer satisfaction, project completion, etc.
Q9. What is pre-existing insurance?
Pre-existing insurance refers to coverage for medical conditions that existed before the insurance policy was purchased.
Pre-existing insurance provides coverage for medical conditions that were present before the insurance policy was obtained.
It typically involves higher premiums or exclusions for pre-existing conditions.
Examples include coverage for diabetes or heart disease that was diagnosed prior to obtaining the insurance policy.
Q10. What are oops concepts
Oops concepts refer to Object-Oriented Programming concepts that help in organizing and managing code effectively.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability of objects to take on multiple forms or have multiple behaviors.
Abstraction: Hiding the complex implementation details and showing only the necessary features of an ob...read more
Q11. What is method overloading
Method overloading is when multiple methods in a class have the same name but different parameters.
Allows a class to have multiple methods with the same name but different parameters
Parameters can differ in number, type, or order
Example: void print(int num) and void print(String text) in a class
Q12. Power bi needs and measure required
Power BI needs and measures required for effective data analysis and visualization.
Identify key performance indicators (KPIs) to track and measure
Ensure data is clean, accurate, and up-to-date for reliable analysis
Create interactive visualizations and reports to communicate insights effectively
Utilize DAX formulas for advanced calculations and measures
Implement data modeling techniques for efficient data organization
Regularly review and update Power BI dashboards based on cha...read more
Q13. Technology is good or bad?
Technology is neither inherently good nor bad, but its impact depends on how it is used.
Technology has greatly improved communication and connectivity.
It has revolutionized industries and increased productivity.
However, technology can also be misused for harmful purposes, such as cybercrime or invasion of privacy.
The ethical implications of technology use need to be carefully considered.
Examples of positive technology impact include advancements in healthcare, education, and ...read more
Q14. What is insurance?
Insurance is a contract between an individual or organization and an insurance company, where the insurer provides financial protection against potential losses or damages.
Insurance is a risk management tool that helps individuals and organizations protect themselves against unforeseen events.
It involves the payment of premiums in exchange for coverage against specific risks.
Insurance policies can cover various aspects such as health, property, life, auto, etc.
The insurer agr...read more
Q15. Introduce about company shift timings facilities
Our company offers flexible shift timings to accommodate different employee needs.
We have morning, afternoon, and evening shifts available.
Employees can choose their preferred shift based on their personal preferences or commitments.
This flexibility helps maintain work-life balance and increases employee satisfaction.
For example, some employees may prefer to work in the morning to have the rest of the day for personal activities, while others may prefer evening shifts to acco...read more
Q16. What is testing life cycle? explain it
Testing life cycle is a process of testing software from planning to deployment.
It includes planning, designing, executing, and reporting.
It starts with the identification of requirements and ends with the deployment of the software.
It helps to ensure that the software meets the desired quality standards.
It involves various types of testing such as unit testing, integration testing, system testing, and acceptance testing.
It also includes bug tracking and fixing.
It is an itera...read more
Q17. What is smoke testing?
Smoke testing is a preliminary testing technique to check if the software build is stable enough for further testing.
Smoke testing is a type of non-exhaustive testing.
It is performed to ensure that the critical functionalities of the software are working fine.
It is usually done after a new build is deployed to check if it is stable enough for further testing.
Smoke testing is a quick and easy way to catch major issues early on in the testing process.
Examples of smoke tests inc...read more
Q18. Do you have knowledge and experience on XYZ tools?
Yes, I have knowledge and experience on XYZ tools.
I have worked with XYZ tool for 2 years in my previous job.
I have also completed a certification course on XYZ tool.
I am familiar with the latest updates and features of XYZ tool.
I have used XYZ tool to perform vulnerability assessments and penetration testing.
I have also used XYZ tool to monitor network traffic and detect anomalies.
Q19. What is bug life cycle?
Bug life cycle refers to the stages a bug goes through from discovery to resolution.
Bug is discovered and reported
Bug is assigned to a developer
Developer reproduces the bug
Developer fixes the bug
Bug is tested and verified as fixed
Bug is closed
Q20. What do you understand by strategy
Strategy is a plan or approach designed to achieve a specific goal or objective.
Strategy involves making choices and decisions to allocate resources effectively.
It involves analyzing the current situation, setting goals, and determining the best course of action.
Strategy requires considering various factors such as competition, market trends, and internal capabilities.
It is about creating a roadmap to achieve long-term success.
Examples of strategies include market expansion, ...read more
Q21. In sql server trigger and stored procedures
Triggers and stored procedures are used in SQL Server for automating tasks and enforcing data integrity.
Triggers are automatically executed in response to certain events, such as insert, update, or delete operations on a table.
Stored procedures are precompiled SQL statements that can be executed with parameters.
Triggers can be used to enforce business rules or maintain data integrity, while stored procedures can be used for complex data manipulation or business logic.
Triggers...read more
Q22. what is the work of financial associate
Financial associates provide support to financial managers by analyzing financial data, preparing reports, and assisting with financial planning.
Analyze financial data to identify trends and opportunities
Prepare financial reports for management review
Assist with financial planning and budgeting
Conduct research on financial markets and industry trends
Communicate with clients and stakeholders regarding financial information
Provide support in financial decision-making processes
Q23. Talk about Insurance Value Chain
Insurance value chain refers to the process of creating and delivering insurance products and services to customers.
Insurance value chain includes activities such as product development, underwriting, distribution, claims processing, and customer service.
Insurers work with various stakeholders such as agents, brokers, reinsurers, and technology providers to deliver value to customers.
Efficient management of the insurance value chain can lead to improved customer satisfaction ...read more
Q24. What is purchase order
A purchase order is a commercial document issued by a buyer to a seller, indicating the type, quantity, and agreed price of products or services.
A purchase order is a written request from a buyer to a seller to purchase goods or services.
It serves as a legally binding contract between the buyer and the seller.
The purchase order includes details such as the item description, quantity, price, delivery date, and payment terms.
It helps in streamlining the procurement process and ...read more
Q25. How to open a mart business in your city
To open a mart business in your city, research the market demand, secure funding, find a suitable location, obtain necessary permits, and stock inventory.
Research the market demand to understand the needs of the local community
Secure funding through loans, investors, or personal savings
Find a suitable location with high foot traffic and visibility
Obtain necessary permits and licenses from local authorities
Stock inventory with a variety of products to cater to different custom...read more
Q26. What is SLA
SLA stands for Service Level Agreement.
SLA is a contract between a service provider and a customer that defines the level of service expected.
It outlines the metrics, responsibilities, and guarantees related to the service being provided.
SLAs are commonly used in various industries, including IT, telecommunications, and customer support.
Examples of SLA metrics include response time, resolution time, uptime, and availability.
SLAs help ensure that service providers meet the agr...read more
Q27. What is 3 wey mach
3 wey mach is not a recognized term or phrase.
There is no known meaning or context for the term '3 wey mach'.
It is possible that the question was asked incorrectly or there was a typo.
Without further information or clarification, it is not possible to provide a meaningful answer.
Q28. Difference between char and str
Char is a single character data type, while str is a sequence of characters.
Char is used to store a single character like 'a', 'b', '1', etc.
Str is used to store a sequence of characters like 'hello', '123', 'abc', etc.
Char takes up 1 byte of memory, while str can take up multiple bytes depending on the length.
Q29. Dependency Injection in .net core
Dependency Injection in .NET Core is a design pattern where classes receive dependencies from external sources rather than creating them.
In .NET Core, dependency injection is built into the framework and is used to provide objects that a class needs to perform its functions.
It helps in decoupling the classes and makes the code more maintainable and testable.
Services are registered in the ConfigureServices method of the Startup class and can be injected into classes using cons...read more
Q30. what is insurence
Insurance is a financial product that provides protection against financial losses resulting from unexpected events.
Insurance is a contract between an individual or organization and an insurance company.
The individual or organization pays a premium in exchange for coverage against specified risks.
Common types of insurance include health insurance, auto insurance, life insurance, and property insurance.
Insurance helps mitigate financial risks and provides peace of mind in case...read more
Q31. Testing Technology/Types
Testing technology/types refer to the various methods and tools used to test software applications.
Functional testing
Performance testing
Security testing
Usability testing
Compatibility testing
Regression testing
Automation testing
Exploratory testing
Q32. Explain the waits
Waits in testing refer to the time intervals between test steps or actions.
Waits are used to ensure that the system has enough time to process information before moving on to the next step.
Types of waits include implicit waits, explicit waits, and fluent waits.
Examples of waits include waiting for an element to be visible before interacting with it, or waiting for a page to load completely before proceeding.
Q33. Types of assurances
Assurances are guarantees or promises made to ensure a certain outcome or level of quality.
Types of assurances include financial assurances, quality assurances, and performance assurances.
Financial assurances involve guarantees of financial stability or compensation in case of failure.
Quality assurances ensure that products or services meet certain standards or specifications.
Performance assurances guarantee a certain level of performance or reliability.
Examples include warra...read more
Top HR Questions asked in Zigsaw Consultancy
Interview Process at Zigsaw Consultancy
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month