RITES
Seth G.S Medical College & K.E.M Hospital Interview Questions and Answers
Q1. Share list of controls which are required to safe guard the organizations from perimeter to end points.
Controls required to safeguard organizations from perimeter to end points include firewalls, antivirus software, encryption, access controls, and regular security audits.
Firewalls to monitor and control incoming and outgoing network traffic
Antivirus software to detect and remove malware
Encryption to protect sensitive data in transit and at rest
Access controls to limit user permissions and restrict unauthorized access
Regular security audits to identify and address vulnerabilit...read more
Q2. What Type of well foundation executed how the sinking procedure was
The well foundation executed was a caisson type and the sinking procedure involved controlled excavation and filling with concrete.
The well foundation executed was a caisson type.
The sinking procedure involved controlled excavation.
The well foundation was filled with concrete.
The sinking procedure ensured stability and proper alignment of the foundation.
Q3. What is network security and how you will mange the the organization security's?
Network security involves implementing measures to protect the organization's network from unauthorized access or attacks.
Implementing firewalls to monitor and control incoming and outgoing network traffic
Using encryption to secure data transmission over the network
Regularly updating software and systems to patch vulnerabilities
Implementing strong authentication methods such as multi-factor authentication
Conducting regular security audits and assessments to identify and addre...read more
Q4. How you will ensure the security of end points and applications..
I will ensure the security of end points and applications by implementing strong access controls, regular security updates, and continuous monitoring.
Implementing strong access controls to restrict unauthorized access to end points and applications
Regularly updating security patches and software to protect against vulnerabilities
Implementing encryption to protect data in transit and at rest
Utilizing endpoint detection and response (EDR) solutions for real-time monitoring and ...read more
Q5. What is information security and what are the standard
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to ensure the confidentiality, integrity, and availability of data.
Common standards in information security include ISO/IEC 27001, NIST Cybersecurity Framework, and PCI DSS.
Examples of information security measures include encryption, access control, firewalls, and regular ...read more
Q6. What type of steel Bridge executed
The steel bridge executed was a cable-stayed bridge.
The bridge was constructed using steel cables to support the deck.
Cable-stayed bridges are known for their aesthetic appeal and structural efficiency.
Examples of famous cable-stayed bridges include the Millau Viaduct in France and the Russky Bridge in Russia.
Q7. What is risk ?
Risk is the potential for loss or harm resulting from a particular action or decision.
Risk is inherent in all aspects of life and business.
It involves uncertainty and the possibility of negative outcomes.
Risk can be managed through strategies such as risk assessment, mitigation, and transfer.
Examples of risks include financial risk, operational risk, and reputational risk.
Q8. Stressing sequence of psc I gider
The question is asking about the sequence of psc I gider.
PSC stands for Primary Sclerosing Cholangitis, a chronic liver disease.
The question is likely asking about the order or progression of symptoms or events related to PSC.
Examples of possible pointers could include the stages of PSC, the diagnostic process, or the treatment options.
Q9. How you confirm on torquing
Confirming torquing involves verifying the accuracy of applied torque.
Confirming torquing is essential to ensure the proper tightening of fasteners.
It involves using torque wrenches or other torque measuring devices.
Verification can be done by comparing the applied torque with the specified torque value.
Visual inspection of fasteners can also help confirm torquing.
Regular calibration of torque tools is necessary for accurate confirmation.
Interview Process at Seth G.S Medical College & K.E.M Hospital
Reviews
Interviews
Salaries
Users/Month