i
Tata Advanced Systems
Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
My name is John Smith.
Full name is John Smith
Common and easy to remember name
My ambition is to continuously improve my skills and knowledge in assembly techniques, eventually becoming a lead technician in the field.
Strive to learn new assembly techniques and technologies
Set goals for career advancement within the assembly technician role
Seek opportunities for leadership and mentorship in the field
Attend workshops and training programs to enhance skills
I would analyze the root cause of the issue, implement a solution, and monitor for any recurrence.
Identify the root cause of the repetitive issue
Implement a solution to address the root cause
Monitor the process closely for any recurrence
Seek feedback from team members for additional insights
Document the steps taken and lessons learned for future reference
Types of heat exchangers include shell and tube, plate, finned tube, and double pipe.
Shell and tube heat exchangers are the most common type, with one fluid flowing through tubes and another surrounding them in a shell.
Plate heat exchangers use plates instead of tubes to separate the fluids and increase heat transfer.
Finned tube heat exchangers have fins on the tubes to increase surface area and improve heat transfer.
D...
Distillation columns used in industries include fractional distillation columns, vacuum distillation columns, and steam distillation columns.
Fractional distillation columns are used to separate mixtures based on boiling points, commonly used in oil refineries.
Vacuum distillation columns are used to distill high boiling point compounds at lower temperatures, commonly used in petrochemical industries.
Steam distillation c...
Tata Advanced Systems interview questions for popular designations
I applied via Naukri.com
Simple Aptitude question asked
Enquire about k8s and terraform
Get interview-ready with Top Tata Advanced Systems Interview Questions
General round questions
Fixtures are devices used to securely hold workpieces in place during manufacturing processes.
Types of fixtures include jigs, templates, clamps, and chucks
Jigs are used to guide cutting tools and ensure accuracy in machining operations
Templates are used to quickly position workpieces for repetitive tasks
Clamps are used to hold workpieces in place with adjustable pressure
Chucks are used to securely grip cylindrical work
CNC machine stands for Computer Numerical Control machine, which is a computer-controlled manufacturing tool used for cutting, milling, drilling, and shaping various materials.
CNC machines use computer programs to control the movement of the cutting tool or workpiece, resulting in precise and accurate machining.
They are commonly used in industries such as automotive, aerospace, and electronics for mass production of pa...
I was interviewed in Jul 2024.
Want is the meaning of thephrase?
The main idea of the passage is the importance of effective communication in relationships.
Effective communication is essential for building strong relationships
Miscommunication can lead to misunderstandings and conflicts
Active listening and clear expression of thoughts and feelings are key components of effective communication
The question asks to identify the supporting details in a text.
Supporting details provide evidence or examples to back up the main idea of the text.
Look for specific facts, examples, statistics, or quotes that support the main argument.
Supporting details help to clarify, explain, or prove the main point of the text.
Identifying supporting details can help readers better understand the author's message.
Supporting details...
The three main components of a cyber security system are prevention, detection, and response.
Prevention: Measures taken to prevent cyber attacks, such as firewalls, antivirus software, and secure passwords.
Detection: Tools and techniques used to detect potential cyber threats, such as intrusion detection systems and security monitoring.
Response: Strategies and protocols in place to respond to and mitigate the impact of...
Defense in depth is a cybersecurity strategy that uses multiple layers of security controls to protect against various types of cyber threats.
Defense in depth involves implementing multiple layers of security controls such as firewalls, intrusion detection systems, encryption, and access controls.
Each layer of security provides a different level of protection, making it more difficult for attackers to penetrate the sys...
The primary goal of cyber security is to protect digital information and systems from unauthorized access, attacks, and damage.
Preventing unauthorized access to sensitive data
Protecting systems from cyber attacks such as malware, ransomware, and phishing
Ensuring the confidentiality, integrity, and availability of information
Implementing security measures such as firewalls, encryption, and multi-factor authentication
Edu...
EDR (Endpoint Detection and Response) solution is a cybersecurity technology that continuously monitors and analyzes endpoint activities to detect and respond to threats.
Continuous monitoring of endpoint activities
Real-time detection of threats
Immediate response to security incidents
Behavioral analysis of endpoints
Integration with SIEM for centralized monitoring
Examples: CrowdStrike Falcon, Carbon Black, SentinelOne
ArcSight is a security information and event management (SIEM) software that helps organizations detect and respond to security threats.
ArcSight uses a hierarchical structure of components such as connectors, Logger, ESM, and Command Center.
Connectors collect and normalize data from various sources.
Logger stores and indexes the collected data for analysis.
ESM (Enterprise Security Manager) correlates and analyzes the da...
Event IDs are unique identifiers for specific events in a system or network.
Event ID 4624 - Successful account logon
Event ID 4625 - Failed account logon
Event ID 4768 - Kerberos authentication ticket request
Event ID 4776 - Domain controller authentication
Event ID 7036 - Service control manager event
Top trending discussions
Some of the top questions asked at the Tata Advanced Systems interview -
The duration of Tata Advanced Systems interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 132 interviews
Interview experience
based on 1.8k reviews
Rating in categories
Punjab,
West bengal
+1₹ 3-3.5 LPA
Bangalore / Bengaluru
0-2 Yrs
Not Disclosed
Assistant Manager
521
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Executive
403
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Engineer
335
salaries
| ₹0 L/yr - ₹0 L/yr |
Executive
303
salaries
| ₹0 L/yr - ₹0 L/yr |
Officer
238
salaries
| ₹0 L/yr - ₹0 L/yr |
Larsen & Toubro Limited
Bharat Electronics
Hindustan Aeronautics
Swan Defence and Heavy Industries