Upload Button Icon Add office photos

Filter interviews by

Mintel Senior Engineer Interview Questions and Answers

Be the first one to contribute and help others!

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Not Selected

I was interviewed in Oct 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. How to create the IP sec tunnel?
  • Ans. 

    To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.

    • Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.

    • Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.

    • Ensure that the IPsec tunnel is properly configured and tested for secure d...

  • Answered by AI
  • Q2. How to troubleshoot the IP sec tunnel?
  • Ans. 

    To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.

    • Check the IPsec configuration on both ends to ensure they match

    • Verify that the tunnel endpoints can reach each other

    • Monitor logs on both devices for any error messages related to the tunnel

    • Use packet capture tools like Wireshark to analyze traffic going through the tunnel

  • Answered by AI
Round 2 - Technical 

(2 Questions)

  • Q1. How ssl vpn it will be working for the remote location?
  • Ans. 

    SSL VPN allows remote users to securely access the network from any location.

    • SSL VPN uses encryption to secure the connection between the remote user and the network.

    • It authenticates users before granting access to resources.

    • SSL VPN can be set up using a web browser or a client application.

    • It provides a secure way for remote employees to access company resources.

    • SSL VPN can be configured to restrict access based on use

  • Answered by AI
  • Q2. How to configure the IP sec tunnel for 3 different location and explain the traffic traffic flow and how it will be work?
  • Ans. 

    Configuring IPsec tunnel for 3 different locations and explaining traffic flow

    • Configure IPsec tunnel on routers/firewalls at each location

    • Set up IPsec policies for encryption and authentication

    • Define IPsec tunnel endpoints and establish secure communication

    • Ensure proper routing between locations for traffic flow

    • Monitor and troubleshoot the IPsec tunnel for any issues

  • Answered by AI
Round 3 - Technical 

(2 Questions)

  • Q1. How to upgrade to the palaalto firewall and fortigate?
  • Ans. 

    To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.

    • Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.

    • Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...

  • Answered by AI
  • Q2. The both locations IP sec tunnel are down. How to troubleshoot the issue.
  • Ans. 

    To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.

    • Check the IPsec configurations on both ends to ensure they match

    • Verify network connectivity between the two locations

    • Check firewall and security policies to ensure they are not blocking the IPsec traffic

    • Review logs on both ends for any error messages or indications of the issue

    • Restart the IPsec serv

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Coding Test 

Ai interview backend microservices core java

Round 2 - Technical 

(2 Questions)

  • Q1. Microservice architecture spring boot
  • Q2. Rest api implementation and communication

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare learn and retry
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Walk-in and was interviewed in Nov 2023. There were 3 interview rounds.

Round 1 - Technical 

(3 Questions)

  • Q1. What is Surging?
  • Ans. 

    Surging is a phenomenon in which a system experiences rapid and temporary increases in pressure or flow rate.

    • Surging can occur in various systems such as pipelines, compressors, pumps, and turbines.

    • It is often caused by sudden changes in demand, equipment malfunctions, or improper system design.

    • Surging can lead to damage to equipment, reduced efficiency, and safety hazards.

    • Examples include water hammer in pipelines and

  • Answered by AI
  • Q2. What is Froude No?
  • Ans. 

    Froude number is a dimensionless number used to quantify the influence of gravity on fluid flow.

    • Froude number is defined as the ratio of inertia force to gravitational force in a fluid flow.

    • It is used to determine the type of flow (subcritical, critical, or supercritical) in open channel flow.

    • Froude number is calculated as Fr = V / sqrt(g * d), where V is velocity, g is acceleration due to gravity, and d is depth of fl

  • Answered by AI
  • Q3. What is Weeping?
  • Ans. 

    Weeping is the process of fluid leaking out of a solid material, often due to damage or excess moisture.

    • Weeping can occur in materials such as wood, concrete, and metal.

    • It is often a sign of structural damage or deterioration.

    • Examples include water weeping from a crack in a wall or oil weeping from a car engine.

    • Weeping can also refer to the shedding of tears in humans and animals.

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Draw basic PFD of a WTP plant including feed quality and all the sensors.
  • Ans. 

    A basic PFD of a WTP plant including feed quality and sensors.

    • Include feed quality parameters such as turbidity, pH, temperature, and flow rate

    • Include sensors for monitoring parameters like chlorine levels, pressure, and conductivity

    • Show the flow of water through various treatment processes like coagulation, flocculation, sedimentation, filtration, and disinfection

  • Answered by AI
  • Q2. What are the process checks done in Line testing of a 6inch dia pigging line including the calculations involved?
  • Ans. 

    Process checks in line testing of a 6inch dia pigging line and associated calculations

    • Pressure testing to ensure integrity of the line

    • Flow testing to check for blockages or restrictions

    • Calibration of pigging equipment for accurate results

    • Calculations involve pressure drop, flow rate, and pigging efficiency

    • Recording and analyzing data for future reference

  • Answered by AI
Round 3 - HR 

(2 Questions)

  • Q1. Why do u qant to leave ur previous company?
  • Q2. How do u solve a matter of conflict during a Project meeting?

Senior Engineer Interview Questions & Answers

IQVIA user image Qhairunnisa Syed

posted on 8 Jun 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Dec 2023. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Basic topics of plsql
  • Q2. One query to fetch max n min of salary from emp table
  • Ans. 

    Use SQL query to fetch maximum and minimum salary from emp table

    • Use SELECT MAX(salary) FROM emp to fetch maximum salary

    • Use SELECT MIN(salary) FROM emp to fetch minimum salary

  • Answered by AI
Round 2 - Technical 

(2 Questions)

  • Q1. Performance tuning
  • Q2. Indexes and exceptions used
  • Ans. 

    Indexes and exceptions are used to optimize database performance and handle errors in code.

    • Indexes are used to quickly retrieve data from a database by creating a sorted list of values.

    • Exceptions are used to handle errors in code and prevent the program from crashing.

    • Examples: Creating indexes on frequently queried columns like 'id' or 'timestamp'. Using try-catch blocks to handle exceptions like divide by zero.

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. Explain GD&T and its significance
  • Ans. 

    GD&T stands for Geometric Dimensioning and Tolerancing. It is a system for defining and communicating engineering tolerances.

    • GD&T is used to specify the allowable variations in form, size, and orientation of part features.

    • It helps improve communication between designers, engineers, and manufacturers by providing a clear and concise way to define part requirements.

    • GD&T uses symbols, such as position, concentricity, and ...

  • Answered by AI
  • Q2. Difference between first and third angle projection
  • Ans. 

    First angle projection is commonly used in Europe and Asia, while third angle projection is commonly used in North America.

    • First angle projection places the object in the first quadrant, with the plane of projection between the observer and the object.

    • Third angle projection places the object in the third quadrant, with the plane of projection behind the object.

    • First angle projection is commonly used in Europe and Asia,...

  • Answered by AI
  • Q3. How well are you in CATIA
Round 3 - HR 

(1 Question)

  • Q1. What is your salary expectations

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Java hash map and how it works
  • Ans. 

    Java hash map is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.

    • HashMap in Java implements the Map interface and allows null keys and values.

    • It uses hashing to store and retrieve key-value pairs, providing O(1) time complexity for get() and put() operations.

    • Example: HashMap map = new HashMap<>(); map.put("key", 1); int value = map.get("key");

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Mar 2023. There were 3 interview rounds.

Round 1 - Coding Test 

Hacker Rank test with medium difficulty

Round 2 - Technical 

(1 Question)

  • Q1. Technical discussion mainly around system design, different architectures, problem solving and coding question may be asked.
Round 3 - Case Study 

A case study for a problem statement

I applied via Referral and was interviewed in Feb 2021. There was 1 interview round.

Interview Questionnaire 

3 Questions

  • Q1. Why can’t a columns with unique with a not null constraint be used as a primary key?
  • Ans. 

    A unique not null column can be used as a primary key, but not vice versa.

    • Primary key must be unique and not null, but not all unique not null columns need to be primary keys.

    • Primary key is used to identify each row uniquely, while unique not null column is used to ensure data integrity.

    • A table can have multiple unique not null columns, but only one primary key.

  • Answered by AI
  • Q2. Because null can’t be equated
  • Ans. 

    Null cannot be equated as it represents absence of a value.

    • Null is not equal to any value, including itself.

    • Attempting to equate null can result in unexpected behavior.

    • Null is often used to represent the absence of a value or unknown value.

  • Answered by AI
  • Q3. We have 2 procedures with the same names. One with 2 parameters.. second one with 3 parameters. The procedure with 3 parameters has a null also. What will be invoked when we call the procedure
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. OOPS concepts - encapsulation , abstraction
  • Q2. Java core - exceptions, theory
Round 2 - HR 

(2 Questions)

  • Q1. General questions
  • Q2. Location preferences , family
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.

Round 1 - Technical 

(4 Questions)

  • Q1. MITER attack framwork/ Cyber kill chain process/attack vectors
  • Q2. SIEM tools and its use
  • Ans. 

    SIEM tools are security information and event management tools used to collect, analyze, and report on security data.

    • SIEM tools help organizations to detect and respond to security incidents in real-time.

    • They collect data from various sources such as network devices, servers, and applications.

    • SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.

    • Examples of SIEM tools i...

  • Answered by AI
  • Q3. Are you written a playbooks rules
  • Ans. 

    Yes, I have experience writing playbooks rules for automation in various engineering projects.

    • Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.

    • I have experience creating rule-based automation scripts to streamline engineering processes.

    • I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.

  • Answered by AI
  • Q4. Digital forensics working procedures
  • Ans. 

    Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.

    • Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.

    • Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.

    • Analyzing the evidence using specialized tools and techniques to uncover ...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Might miss the job profile with requirements while shortlisting candidates. look for correct opportunity ask HR if doubts with your profile and job requirments are not matched.

Tell us how to improve this page.

Senior Research Analyst
4 salaries
unlock blur

₹9.7 L/yr - ₹21 L/yr

Explore more salaries
Compare Mintel with

Nielsen

3.7
Compare

Euromonitor International

3.6
Compare

GfK MODE

3.3
Compare

Kantar

3.6
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview