Add office photos
Employer?
Claim Account for FREE

RITES

3.9
based on 553 Reviews
Video summary
Filter interviews by

Seth G.S Medical College & K.E.M Hospital Interview Questions and Answers

Updated 5 Feb 2024

Q1. Share list of controls which are required to safe guard the organizations from perimeter to end points.

Ans.

Controls required to safeguard organizations from perimeter to end points include firewalls, antivirus software, encryption, access controls, and regular security audits.

  • Firewalls to monitor and control incoming and outgoing network traffic

  • Antivirus software to detect and remove malware

  • Encryption to protect sensitive data in transit and at rest

  • Access controls to limit user permissions and restrict unauthorized access

  • Regular security audits to identify and address vulnerabilit...read more

View 1 answer

Q2. What Type of well foundation executed how the sinking procedure was

Ans.

The well foundation executed was a caisson type and the sinking procedure involved controlled excavation and filling with concrete.

  • The well foundation executed was a caisson type.

  • The sinking procedure involved controlled excavation.

  • The well foundation was filled with concrete.

  • The sinking procedure ensured stability and proper alignment of the foundation.

View 3 more answers

Q3. What is network security and how you will mange the the organization security's?

Ans.

Network security involves implementing measures to protect the organization's network from unauthorized access or attacks.

  • Implementing firewalls to monitor and control incoming and outgoing network traffic

  • Using encryption to secure data transmission over the network

  • Regularly updating software and systems to patch vulnerabilities

  • Implementing strong authentication methods such as multi-factor authentication

  • Conducting regular security audits and assessments to identify and addre...read more

View 1 answer

Q4. How you will ensure the security of end points and applications..

Ans.

I will ensure the security of end points and applications by implementing strong access controls, regular security updates, and continuous monitoring.

  • Implementing strong access controls to restrict unauthorized access to end points and applications

  • Regularly updating security patches and software to protect against vulnerabilities

  • Implementing encryption to protect data in transit and at rest

  • Utilizing endpoint detection and response (EDR) solutions for real-time monitoring and ...read more

View 1 answer
Discover Seth G.S Medical College & K.E.M Hospital interview dos and don'ts from real experiences

Q5. What is information security and what are the standard

Ans.

Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

  • Information security involves implementing measures to ensure the confidentiality, integrity, and availability of data.

  • Common standards in information security include ISO/IEC 27001, NIST Cybersecurity Framework, and PCI DSS.

  • Examples of information security measures include encryption, access control, firewalls, and regular ...read more

View 1 answer

Q6. What type of steel Bridge executed

Ans.

The steel bridge executed was a cable-stayed bridge.

  • The bridge was constructed using steel cables to support the deck.

  • Cable-stayed bridges are known for their aesthetic appeal and structural efficiency.

  • Examples of famous cable-stayed bridges include the Millau Viaduct in France and the Russky Bridge in Russia.

View 2 more answers

Q7. What is risk ?

Ans.

Risk is the potential for loss or harm resulting from a particular action or decision.

  • Risk is inherent in all aspects of life and business.

  • It involves uncertainty and the possibility of negative outcomes.

  • Risk can be managed through strategies such as risk assessment, mitigation, and transfer.

  • Examples of risks include financial risk, operational risk, and reputational risk.

View 1 answer

Q8. Stressing sequence of psc I gider

Ans.

The question is asking about the sequence of psc I gider.

  • PSC stands for Primary Sclerosing Cholangitis, a chronic liver disease.

  • The question is likely asking about the order or progression of symptoms or events related to PSC.

  • Examples of possible pointers could include the stages of PSC, the diagnostic process, or the treatment options.

View 1 answer

Q9. How you confirm on torquing

Ans.

Confirming torquing involves verifying the accuracy of applied torque.

  • Confirming torquing is essential to ensure the proper tightening of fasteners.

  • It involves using torque wrenches or other torque measuring devices.

  • Verification can be done by comparing the applied torque with the specified torque value.

  • Visual inspection of fasteners can also help confirm torquing.

  • Regular calibration of torque tools is necessary for accurate confirmation.

View 2 more answers
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Seth G.S Medical College & K.E.M Hospital

based on 1 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter