Morgan Stanley
60+ UBS Interview Questions and Answers
Q1. Can you explain dcf to me? Can dcf be applied to equity?
DCF is a valuation method used to estimate the value of an investment based on its future cash flows.
DCF involves projecting future cash flows and discounting them back to their present value.
It can be applied to equity by estimating the future cash flows of a company and discounting them back to their present value to determine the company's intrinsic value.
DCF is commonly used in investment banking and finance to value companies and assets.
It is important to use realistic a...read more
Q2. What is market cap and how would you explain in Lehman terms?
Market cap is the total value of a company's outstanding shares. It's calculated by multiplying the current stock price by the number of shares outstanding.
Market cap is short for market capitalization.
It's a measure of a company's size and value.
It's calculated by multiplying the current stock price by the number of shares outstanding.
For example, if a company has 1 million shares outstanding and the current stock price is $50, the market cap would be $50 million.
Market cap ...read more
Q3. What is enterprise value and how is it calculated?
Enterprise value is the total value of a company, including debt and equity.
Enterprise value is calculated by adding market capitalization, debt, and minority interest, and then subtracting cash and cash equivalents.
It represents the total value of a company that an acquirer would have to pay to take over the company.
Enterprise value is a more accurate representation of a company's value than market capitalization alone.
For example, if a company has a market capitalization of...read more
Q4. Given an array with length n , find highest value which occurs same number of times within the array. [3,8,3,2,1,3,2] 3 occurs 3 times output=3. [4,6,7,6,7,5,4,2,4,9,4,1,9] 4 occurs 3 times output=4
Find the highest value that occurs the same number of times within an array.
Iterate through the array and count the occurrences of each value.
Store the counts in a dictionary or hash map.
Find the maximum count and check which value(s) have that count.
Return the highest value among those with the maximum count.
Q5. Tell me about Yourself. What excel functions are you aware of?
I am a detail-oriented analyst with knowledge of various Excel functions.
I am proficient in basic functions such as SUM, AVERAGE, MAX, MIN, COUNT, etc.
I am also familiar with more advanced functions such as VLOOKUP, HLOOKUP, INDEX, MATCH, IF, AND, OR, etc.
I have experience using PivotTables, PivotCharts, and creating macros to automate tasks.
I am constantly learning and exploring new functions to improve my skills.
Q6. Candies Distribution Problem Statement
Prateek is a kindergarten teacher with a mission to distribute candies to students based on their performance. Each student must get at least one candy, and if two student...read more
Determine the minimum number of candies needed to distribute to students based on their performance and ratings.
Iterate through the array of student ratings and assign 1 candy to each student initially.
Then iterate from left to right and check if the current student's rating is higher than the previous student, if so, assign candies accordingly.
Similarly, iterate from right to left to handle cases where the current student's rating is higher than the next student.
Keep track o...read more
Q7. Trapping Rainwater Problem Statement
You are given an array ARR
of long type, which represents an elevation map where ARR[i]
denotes the elevation of the ith
bar. Calculate the total amount of rainwater that ca...read more
Calculate the total amount of rainwater that can be trapped within given elevation map.
Iterate through the array to find the maximum height on the left and right of each bar.
Calculate the amount of water that can be trapped above each bar by taking the minimum of the maximum heights on the left and right.
Sum up the trapped water above each bar to get the total trapped water for the elevation map.
Q8. Types of valuation and reason for using each one of them
Valuation methods include market, income, and asset-based approaches, each used for different purposes.
Market approach: based on comparable sales of similar assets in the market
Income approach: based on the present value of expected future income generated by the asset
Asset-based approach: based on the value of the asset's tangible and intangible assets
Market approach is commonly used for real estate, income approach for businesses, and asset-based approach for liquidation or...read more
Q9. Given a class @Data class Account{String name; String acctBalance;}. Write logic to get Map using Stream API which shows the balance of each person i,e, key will be the name of the account holder and value will...
read moreLogic to get Map using Stream API to show balance of each person
Use Stream API to group accounts by name
Use map() to get the sum of balances for each group
Collect the results into a Map
Q10. What are Hedge Funds? Components of Financial Statements
Hedge funds are alternative investment vehicles that use pooled funds to employ various strategies to generate high returns.
Hedge funds are privately owned and managed investment funds
They use a variety of investment strategies such as long-short equity, global macro, and event-driven
They are typically only available to accredited investors due to their high-risk nature
Components of financial statements include balance sheet, income statement, and cash flow statement
Q11. What is weak reference? garbage collection in case of such references?
Weak reference is a reference that does not prevent the object from being garbage collected.
Weak references are used to refer to objects that can be garbage collected if there are no strong references to them.
They are typically used in scenarios where you want to hold a reference to an object, but don't want to prevent it from being collected.
Weak references are implemented using weak reference queues, which allow you to perform actions when weakly referenced objects are abou...read more
Q12. Find number of occurrences of a character in string. Provide multiple approaches for the solution and choose the best why? For "string aabcadd output=a3b1c1d2
Count occurrences of a character in a string and output in a specific format.
Use a hash table to store the count of each character.
Loop through the string and update the count in the hash table.
Create the output string using the hash table.
Q13. Internal implementation of HashSet? Which scenario will generate same hashcode for a HashMap?
HashSet is implemented using a HashMap internally. Same hashcode is generated when two objects have the same value for hashCode() and equals() methods.
HashSet internally uses a HashMap to store its elements.
The hashcode of an object is generated using the hashCode() method.
If two objects have the same value for hashCode() and equals() methods, they will generate the same hashcode.
For example, if two String objects have the same content, they will generate the same hashcode.
Q14. Implementation of singleton pattern and ways of breaking it? singleton pattern implementation in a multithreaded environment?
Singleton pattern ensures a class has only one instance, while allowing global access to it.
Implement a private constructor to prevent direct instantiation.
Create a static method to provide a single point of access to the instance.
Use lazy initialization to create the instance only when needed.
Ensure thread safety in a multithreaded environment using synchronization or double-checked locking.
Breaking the singleton pattern can be done by using reflection, serialization, or clo...read more
Q15. What is SQL Cursor? Index? Aggregate Functions examples?
SQL Cursor is a database object used to manipulate data row by row.
Cursor is used to fetch and process data row by row
Index is a database object used to speed up data retrieval
Aggregate functions are used to perform calculations on a set of values
Examples of aggregate functions are SUM, AVG, COUNT, MAX, MIN
Q16. Validate BST Problem Statement
Given a binary tree with N
nodes, determine whether the tree is a Binary Search Tree (BST). If it is a BST, return true
; otherwise, return false
.
A binary search tree (BST) is a b...read more
Validate if a binary tree is a Binary Search Tree (BST) or not.
Check if the left subtree of a node contains only nodes with data less than the node's data.
Check if the right subtree of a node contains only nodes with data greater than the node's data.
Ensure both the left and right subtrees are also binary search trees.
Traverse the tree in an inorder manner and check if the elements are in sorted order.
Recursively validate each node's value against its parent's value range.
Q17. What are hedge funds, and what are their products and structures?
Hedge funds are investment funds that pool capital from accredited individuals or institutional investors and use various strategies to generate high returns.
Hedge funds typically have high minimum investment requirements and are only available to accredited investors.
They often use leverage and derivatives to amplify returns.
Hedge funds can invest in a wide range of assets, including stocks, bonds, commodities, and real estate.
Common hedge fund strategies include long/short ...read more
Q18. What are bonds and what are the different types of bonds?
Bonds are debt securities issued by companies or governments to raise capital. Different types include corporate bonds, municipal bonds, and treasury bonds.
Bonds are essentially loans that investors give to companies or governments in exchange for periodic interest payments and the return of the bond's face value at maturity.
Corporate bonds are issued by corporations to raise capital for various purposes, such as expansion or acquisitions.
Municipal bonds are issued by state a...read more
Q19. What is the difference between the dirty price and the clean price of a bond?
Dirty price includes accrued interest while clean price does not.
Dirty price includes accrued interest that the buyer must pay to the seller on top of the bond's market price.
Clean price is the market price of the bond without the accrued interest added.
The difference between the dirty price and the clean price is the accrued interest.
For example, if a bond has a clean price of $1,000 and accrued interest of $20, the dirty price would be $1,020.
Q20. Qtns on job description
The question is about the job description.
Clarify the responsibilities and duties of the job
Ask about the required skills and qualifications
Inquire about the work environment and company culture
Q21. What are corporate actions and what are their types?
Corporate actions are events initiated by a public company that impact its shareholders and securities.
Types of corporate actions include dividends, stock splits, mergers and acquisitions, rights issues, and spin-offs.
Dividends are payments made to shareholders from a company's profits.
Stock splits involve dividing existing shares into multiple shares to lower the price per share.
Mergers and acquisitions occur when two companies combine or one company buys another.
Rights issu...read more
Q22. Annotations : @Component vs @service, @Controller vs @RESTController, @Configuration, @Transactional
Annotations used in Spring Framework for defining components and services.
Annotations like @Component, @Service, and @Controller are used for defining components in Spring Framework.
@RestController is used for defining RESTful web services.
@Configuration is used for defining configuration classes.
@Transactional is used for defining transactional methods.
All these annotations help in defining and managing dependencies in Spring Framework.
Q23. Convert String from Camel case to Snake case
Converts a string from Camel case to Snake case.
Loop through the string and check for uppercase letters
Insert an underscore before each uppercase letter
Convert the string to lowercase
Q24. How HashMaps in Java work internally
HashMaps in Java use hashing to store key-value pairs, allowing for fast retrieval and insertion.
HashMap uses a hash table to store key-value pairs.
Keys are hashed to determine the index where the value will be stored.
Collisions are resolved using linked lists or balanced trees.
HashMap allows null keys and values.
Example: HashMap
map = new HashMap<>();
Q25. What is fix income products
Fixed income products are investments that pay a fixed interest or dividend income until maturity.
Fixed income products include bonds, certificates of deposit (CDs), and preferred stocks.
Investors receive regular interest payments from fixed income products.
The principal amount is returned to the investor at maturity.
Fixed income products are considered less risky than stocks but offer lower potential returns.
Q26. optimized solutions and core principles applied in OOPS
Optimized solutions and core principles applied in OOPS
Encapsulation, Inheritance, Polymorphism, Abstraction are core principles of OOPS
Optimized solutions can be achieved through efficient algorithms and data structures
Design patterns like Singleton, Factory, Observer can also be used for optimized solutions
Q27. Option pricing model- BSM assumptions and explanation
Black-Scholes-Merton (BSM) model is a mathematical model used for pricing options.
BSM model assumes constant risk-free rate, constant volatility, and lognormal distribution of stock prices.
It assumes no dividends are paid during the option's life.
The model assumes the option can only be exercised at expiration.
The underlying stock follows a geometric Brownian motion.
The model is used to calculate the theoretical price of European-style options.
BSM formula: C = S0*N(d1) - X*e^...read more
Q28. write classes and methods for bookmyshow
Classes and methods for bookmyshow to manage booking and ticketing system.
Create a class for Ticket with attributes like ticket ID, showtime, seat number, etc.
Create a class for Show with attributes like movie name, theater, showtime, etc.
Create a class for Booking with attributes like booking ID, tickets booked, total price, etc.
Methods like bookTicket() to book a ticket, cancelTicket() to cancel a ticket, getAvailableSeats() to check available seats, etc.
Q29. check palindrome , anagram of string with O(n)
To check palindrome and anagram of a string with O(n), use a hash table to store character frequencies.
Create a hash table to store the frequency of each character in the string.
For palindrome, check that no more than one character has an odd frequency.
For anagram, compare the hash tables of the two strings.
If the hash tables are equal, the strings are anagrams.
If the hash tables differ by only one character, the strings are palindrome anagrams.
If the hash tables differ by mo...read more
Q30. OTC products and how does it works
OTC products are over-the-counter medications that can be purchased without a prescription.
OTC products are typically used to treat minor ailments such as headaches, colds, and allergies.
They work by targeting specific symptoms or conditions, such as pain, inflammation, or congestion.
Examples of OTC products include pain relievers like ibuprofen and acetaminophen, allergy medications like loratadine and cetirizine, and cough and cold remedies like dextromethorphan and guaifen...read more
Q31. What is Cbv process
CBV process refers to Cost-Based Valuation process used in finance to determine the value of a company or asset.
CBV process involves analyzing the costs associated with a company or asset to determine its value.
It takes into account the expenses incurred in production, marketing, distribution, and other operational activities.
CBV process helps in understanding the financial health and potential profitability of a company or asset.
Examples of costs considered in CBV process in...read more
Q32. Process is throwing Out of Memory Error , describe the steps you will take to debug and then interviewer went down in Memory Management concepts and garbage collection algo's of JVM in great detail.
To debug Out of Memory Error, analyze memory usage and garbage collection algorithm of JVM.
Analyze heap dump to identify memory leaks
Check if JVM is running out of heap space
Analyze garbage collection logs to identify any issues
Tune JVM parameters to optimize memory usage
Consider using a profiler to identify memory-intensive code
Check for any large objects or arrays that may be causing the issue
Q33. Concurrent package: internal working of CopyOnWriteArrayList Diff between synchronized collection and concurrent collection
Explaining CopyOnWriteArrayList and difference between synchronized and concurrent collections.
CopyOnWriteArrayList is a thread-safe variant of ArrayList where all mutative operations are implemented by making a new copy of the underlying array.
Synchronized collections use a single lock to synchronize access to the collection, while concurrent collections use multiple locks to allow concurrent access.
Concurrent collections are designed to handle high-concurrency scenarios, wh...read more
Q34. Why is ATM option delta 0.5
ATM option delta is 0.5 because it represents a 50% chance of the option expiring in-the-money.
ATM option delta is 0.5 because it is at-the-money, meaning the option strike price is equal to the current underlying asset price.
Delta measures the sensitivity of an option's price to changes in the underlying asset price.
A delta of 0.5 indicates a 50% probability of the option expiring in-the-money.
ATM options have the highest gamma and vega values compared to other options.
For e...read more
Q35. SQL query for second highest salary
SQL query to find second highest salary
Use ORDER BY and LIMIT to get the highest salary
Use subquery to exclude the highest salary and get the second highest
Q36. Array Problem of DSA Medium
The array problem involves manipulating an array of strings.
Use built-in array methods like map, filter, and reduce for efficient manipulation.
Consider sorting the array based on specific criteria.
Think about using regular expressions for string manipulation.
Handle edge cases like empty arrays or null values appropriately.
Q37. Design Patterns and Design Principles
Design patterns and principles are essential for creating maintainable and scalable software.
Design patterns are reusable solutions to common software problems.
Design principles are guidelines for creating software that is easy to maintain and extend.
Examples of design patterns include Singleton, Factory, and Observer.
Examples of design principles include SOLID, DRY, and KISS.
Q38. Explain options and it’s pricing
Options are financial instruments that give the holder the right, but not the obligation, to buy or sell an underlying asset at a specified price within a specific time period.
Options can be call options or put options
Call options give the holder the right to buy the underlying asset at a specified price within a specific time period
Put options give the holder the right to sell the underlying asset at a specified price within a specific time period
The price of an option is de...read more
Q39. How to get non repeating substring from a string
To get non-repeating substring from a string, we can use the sliding window technique.
Create a hash set to store the characters in the current window.
Iterate through the string and add each character to the hash set.
If a repeating character is found, remove the first character from the hash set and move the window.
Keep track of the longest non-repeating substring found so far.
Return the longest non-repeating substring.
Q40. Tell me about any of the design patterns you are familiar with
I am familiar with design patterns such as Singleton, Factory, Observer, and MVC.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.
MVC (Model-View-Controller) pattern se...read more
Q41. Write program to find the largest number present in array having increasing then decreasing numbers.
Program to find largest number in array with increasing then decreasing numbers.
Find the peak element in the array using binary search.
If peak element is at index 0 or last index, return it.
Else, search for largest element in left and right subarrays.
Q42. how will you onboard stakeholders for cloud migration
Onboarding stakeholders for cloud migration involves communication, training, and collaboration.
Communicate the benefits of cloud migration to stakeholders, addressing any concerns or questions they may have.
Provide training sessions to educate stakeholders on the new cloud technology and how it will impact their work.
Collaborate with stakeholders to gather feedback, address any issues, and ensure a smooth transition to the cloud.
Create a detailed onboarding plan with clear t...read more
Q43. Can you explain FX Option and Credit Default Swap
FX Option is a financial derivative that gives the holder the right but not the obligation to exchange one currency for another at a predetermined exchange rate. Credit Default Swap is a financial contract that allows the buyer to transfer the credit risk of a bond or loan to a seller.
FX Option is used to hedge against currency risk in international trade
Credit Default Swap is used to protect against the risk of default on a bond or loan
FX Option can be either a call option o...read more
Q44. Working of HashMap Use of Equals and Hashcode method in case of HashMap
HashMap is a data structure that stores key-value pairs and uses hashcode and equals methods for efficient retrieval.
HashMap uses hashcode to generate an index for the key-value pair
If two keys have the same hashcode, equals method is used to check for equality
If equals method returns true, the value associated with the key is returned
If equals method returns false, a collision occurs and the key-value pair is stored in a linked list at the index
Q45. Explain any one product
iPhone 12
The latest smartphone from Apple
Comes in four different models: iPhone 12, iPhone 12 mini, iPhone 12 Pro, and iPhone 12 Pro Max
Features a new A14 Bionic chip for faster performance
Has a Ceramic Shield front cover for improved durability
Supports 5G connectivity for faster internet speeds
Has a dual-camera system with Night mode for better low-light photography
Q46. What is your understanding on Product control role
Product control role involves monitoring and managing the financial performance of a product or business line.
Responsible for ensuring accurate and timely financial reporting
Analyzing and interpreting financial data to identify trends and areas for improvement
Developing and implementing financial controls and processes
Collaborating with other departments to ensure product profitability
Examples: monitoring the performance of a specific product line, managing inventory levels a...read more
Q47. Thread: print odd and even number in sequence using Threads
Printing odd and even numbers in sequence using threads.
Create two threads, one for odd and one for even numbers.
Use a shared variable to keep track of the current number.
Use synchronized block to ensure only one thread is executing at a time.
Use wait() and notify() methods to signal the other thread.
Terminate the threads when the desired number of iterations is reached.
Q48. Dividends , accounting entries for dividends What are golden parachutes? Stock split Bonus entry Difference between Futures and forwards.
Q49. How will you manage data and risk governance
I will establish clear policies, procedures, and controls to ensure data integrity and minimize risks.
Implementing data governance frameworks to define roles, responsibilities, and processes for managing data
Leveraging technology solutions such as data encryption, access controls, and monitoring tools
Regularly conducting risk assessments to identify potential vulnerabilities and mitigate them
Ensuring compliance with regulatory requirements such as GDPR or HIPAA
Providing train...read more
Q50. Design problem to show how to retrieve data from dataverse model
Retrieve data from dataverse model design problem
Identify the specific data to be retrieved from the dataverse model
Create a query to extract the desired data
Utilize appropriate filters and conditions to narrow down the search results
Implement the query in the code to fetch the data
Handle any errors or exceptions that may occur during the retrieval process
Q51. Design Something similar as auto correct/suggestions functionality of Google search.
Design an auto-suggestion feature for a search engine.
Implement a search algorithm that suggests relevant keywords based on user input.
Use machine learning to improve the accuracy of suggestions over time.
Allow users to easily select and add suggested keywords to their search query.
Q52. How will you estimate rish for projects
Risk for projects can be estimated by considering factors such as project complexity, team experience, stakeholder involvement, and external dependencies.
Assess project complexity and potential challenges
Evaluate team experience and expertise in handling similar projects
Consider stakeholder involvement and communication
Identify external dependencies and potential risks
Use risk management techniques such as risk registers and risk analysis
Q53. Collections in java
Collections in Java are used to store and manipulate groups of objects.
Collections framework provides interfaces (List, Set, Map) and classes (ArrayList, HashSet, HashMap) for storing and manipulating data
Collections offer methods for adding, removing, and accessing elements in a collection
Collections can be sorted, filtered, and iterated over using various methods
Q54. Difference between implicit and explicit wait
Implicit wait is a global wait applied to all elements, while explicit wait is applied to specific elements.
Implicit wait is set once and applied to all elements in the script
Explicit wait is set for specific elements and waits until a certain condition is met
Implicit wait is not recommended as it can slow down the script unnecessarily
Explicit wait is more efficient as it only waits for the necessary time
Example of implicit wait: driver.manage().timeouts().implicitlyWait(10, ...read more
Q55. How and where did you implement threads
Implemented threads in a multi-threaded application to improve performance and concurrency.
Implemented threads in a multi-threaded application to handle multiple tasks concurrently
Used threads to improve performance by parallelizing tasks
Implemented threads in a web server to handle multiple client requests simultaneously
Q56. Tell me about Futures, Forwards, Swaps and CDS
Q57. Tell me about different classes of assets
Different classes of assets include fixed assets, current assets, intangible assets, and financial assets.
Fixed assets: Tangible assets like property, plant, and equipment
Current assets: Liquid assets like cash, accounts receivable, and inventory
Intangible assets: Non-physical assets like patents, trademarks, and goodwill
Financial assets: Investments like stocks, bonds, and derivatives
Q58. Design a system for a company in hospitality
Design a system for a company in hospitality
Implement a centralized reservation system for booking rooms, tables, and other services
Incorporate a customer feedback system to gather reviews and ratings for continuous improvement
Include a staff scheduling and management module to efficiently allocate resources
Integrate a payment gateway for secure transactions and invoicing
Utilize data analytics to track customer preferences and trends for personalized experiences
Q59. How to multiply 2 strings
It is not possible to multiply 2 strings in a mathematical sense.
Strings can be concatenated using the + operator.
To repeat a string, use the * operator followed by the number of repetitions.
To convert a string to a number, use the parseInt() or parseFloat() functions.
Q60. DO YOU HAVE CODING BACKGROUND?
Yes, I have a strong coding background with experience in multiple programming languages.
Proficient in languages such as Java, Python, and C++
Experience with web development technologies like HTML, CSS, and JavaScript
Familiarity with database management systems such as SQL
Developed various software applications and projects
Q61. SQL Query to find nth salary
SQL query to find nth salary
Use ORDER BY and LIMIT clauses
Use subquery to exclude previous salaries
Q62. Difference between MT 103 and 202
MT 103 is a SWIFT payment message type used for cash transfers, while MT 202 is for bank-to-bank transfers.
MT 103 is used for customer payments and transfers, while MT 202 is for bank-to-bank transfers
MT 103 is a single customer credit transfer, while MT 202 is a general financial institution transfer
MT 103 is used for international wire transfers, while MT 202 is used for interbank transfers
MT 103 includes details of the sender, receiver, and transaction amount, while MT 202...read more
Q63. New changes in Swift regulation
Swift regulation has undergone new changes.
The changes aim to improve transparency and reduce risks in the financial industry.
One of the changes is the introduction of the Legal Entity Identifier (LEI) requirement for certain transactions.
Another change is the implementation of the ISO 20022 messaging standard for cross-border payments.
The changes will impact financial institutions and their clients.
Compliance with the new regulations is mandatory.
Q64. To print last column in unix
To print last column in unix
Use the command 'cut' with the delimiter option '-d' and specify the delimiter
Specify the field option '-f' and set it to the last field using '$'
Example: 'cut -d ',' -f $' filename.csv' will print the last column of a CSV file
Q65. Design automated Parking Lot.
Automated parking lot design with efficient space utilization and user-friendly interface.
Use sensors to detect available parking spots
Implement a central computer system to manage parking allocation
Incorporate user-friendly interface for easy navigation and payment
Maximize space utilization with multi-level parking and compact car storage
Ensure safety measures are in place for pedestrians and vehicles
Q66. Please explain Singapore WHT
Singapore WHT stands for Singapore Withholding Tax, which is a tax deducted at source on certain types of income.
Singapore WHT is applicable on payments such as interest, royalties, and services provided by non-residents.
The tax rate for Singapore WHT varies depending on the type of income and the tax treaty between Singapore and the country of the recipient.
Singapore WHT is usually deducted by the payer of the income and remitted to the Inland Revenue Authority of Singapore ...read more
Q67. Modules in Anaible
Modules in Ansible are reusable, standalone scripts that can be used to perform specific tasks.
Modules can be written in any programming language
Modules can be executed on remote hosts
Modules can be used to install packages, manage files, and perform other tasks
Modules can be found in the Ansible library or created by users
Examples of modules include apt, yum, and copy
Q68. Please explain CRS
CRS stands for Common Reporting Standard, a global standard for the automatic exchange of financial account information between tax authorities.
CRS was developed by the Organisation for Economic Co-operation and Development (OECD) to combat tax evasion.
It requires financial institutions to collect and report information on foreign tax residents to their local tax authorities.
Over 100 countries have committed to implementing CRS, including major financial centers like Switzerl...read more
Top HR Questions asked in UBS
Interview Process at UBS
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month