Filter interviews by
I applied via Newspaper Ad and was interviewed before Oct 2022. There were 2 interview rounds.
Network security involves implementing measures to protect the organization's network from unauthorized access or attacks.
Implementing firewalls to monitor and control incoming and outgoing network traffic
Using encryption to secure data transmission over the network
Regularly updating software and systems to patch vulnerabilities
Implementing strong authentication methods such as multi-factor authentication
Conducting reg...
Controls required to safeguard organizations from perimeter to end points include firewalls, antivirus software, encryption, access controls, and regular security audits.
Firewalls to monitor and control incoming and outgoing network traffic
Antivirus software to detect and remove malware
Encryption to protect sensitive data in transit and at rest
Access controls to limit user permissions and restrict unauthorized access
Re...
I will ensure the security of end points and applications by implementing strong access controls, regular security updates, and continuous monitoring.
Implementing strong access controls to restrict unauthorized access to end points and applications
Regularly updating security patches and software to protect against vulnerabilities
Implementing encryption to protect data in transit and at rest
Utilizing endpoint detection ...
Risk is the potential for loss or harm resulting from a particular action or decision.
Risk is inherent in all aspects of life and business.
It involves uncertainty and the possibility of negative outcomes.
Risk can be managed through strategies such as risk assessment, mitigation, and transfer.
Examples of risks include financial risk, operational risk, and reputational risk.
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to ensure the confidentiality, integrity, and availability of data.
Common standards in information security include ISO/IEC 27001, NIST Cybersecurity Framework, and PCI DSS.
Examples of information security measures i...
I applied via Company Website and was interviewed before Jun 2020. There were 4 interview rounds.
The well foundation executed was a caisson type and the sinking procedure involved controlled excavation and filling with concrete.
The well foundation executed was a caisson type.
The sinking procedure involved controlled excavation.
The well foundation was filled with concrete.
The sinking procedure ensured stability and proper alignment of the foundation.
The steel bridge executed was a cable-stayed bridge.
The bridge was constructed using steel cables to support the deck.
Cable-stayed bridges are known for their aesthetic appeal and structural efficiency.
Examples of famous cable-stayed bridges include the Millau Viaduct in France and the Russky Bridge in Russia.
Confirming torquing involves verifying the accuracy of applied torque.
Confirming torquing is essential to ensure the proper tightening of fasteners.
It involves using torque wrenches or other torque measuring devices.
Verification can be done by comparing the applied torque with the specified torque value.
Visual inspection of fasteners can also help confirm torquing.
Regular calibration of torque tools is necessary for ac
I applied via Naukri.com and was interviewed before Sep 2020. There was 1 interview round.
Hydrotest procedure is a process of testing the strength and integrity of a pressure vessel or pipeline by filling it with water and pressurizing it.
The vessel or pipeline is filled with water and pressurized to a specified level
The pressure is held for a specified amount of time to check for leaks or deformations
The test is usually performed before commissioning or after repairs
The test pressure and duration are deter...
HDD procedure refers to the process of installing and configuring a hard disk drive in a computer system.
Ensure the HDD is compatible with the computer system
Physically install the HDD in the appropriate bay
Connect the necessary cables to the HDD and motherboard
Configure the HDD in the BIOS settings
Format the HDD and install the operating system
Test the HDD for proper functionality
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
posted on 21 Sep 2021
I applied via Company Website and was interviewed in Mar 2021. There were 5 interview rounds.
posted on 8 Dec 2023
I applied via Approached by Company and was interviewed in Jun 2023. There were 2 interview rounds.
posted on 18 May 2024
I applied via Walk-in and was interviewed in Nov 2023. There were 3 interview rounds.
1- Material Calculation
2- Bar bending Schedule
3- Planning and Chart
4- Making Praposal
posted on 31 Jan 2023
I applied via Naukri.com and was interviewed in Jul 2022. There were 3 interview rounds.
posted on 18 Oct 2023
I applied via Campus Placement and was interviewed before Oct 2022. There were 3 interview rounds.
Yes, I have knowledge in Piping engineering.
I have a degree in Mechanical Engineering which includes coursework in Piping design and analysis.
I have practical experience working on piping projects in my previous roles.
I am familiar with industry standards and codes related to piping engineering such as ASME B31.3 and API 570.
Some of the top questions asked at the RITES Deputy General Manager interview -
based on 1 interview
Interview experience
based on 7 reviews
Rating in categories
Civil Engineer
151
salaries
| ₹3 L/yr - ₹9.3 L/yr |
Mechanical Engineer
108
salaries
| ₹3.4 L/yr - ₹6 L/yr |
Assistant Manager
106
salaries
| ₹4.8 L/yr - ₹18 L/yr |
Inspection Engineer
96
salaries
| ₹3.3 L/yr - ₹10 L/yr |
Engineer
91
salaries
| ₹3 L/yr - ₹10 L/yr |
L&T Construction
Simplex Infrastructures
AECOM
L&T Energy Hydrocarbon