Associate Consultant

900+ Associate Consultant Interview Questions and Answers

Updated 14 Dec 2024

Popular Companies

search-icon

Q51. How many airplanes fly in and out of Bangalore in a day

Ans.

The number of airplanes flying in and out of Bangalore varies daily.

  • The number of flights depends on factors such as day of the week, time of day, and season.

  • On average, Kempegowda International Airport in Bangalore handles around 600 flights per day.

  • This includes both domestic and international flights.

  • During peak travel times, such as holidays, the number of flights may increase.

  • However, during times of inclement weather or other disruptions, the number of flights may decre...read more

Q52. Have you worked on BGP? What are the attributes? How to manipulate traffic using attributes?

Ans.

BGP is a routing protocol used in large networks. It has attributes that can be manipulated to control traffic flow.

  • BGP attributes include AS path, next hop, local preference, and MED.

  • AS path is used to prevent loops and determine the shortest path.

  • Next hop is used to determine the next router to send traffic to.

  • Local preference is used to determine the preferred path for outbound traffic.

  • MED is used to influence the path for inbound traffic.

  • Traffic can be manipulated by chan...read more

Q53. Technical Questions

Different sorting algorithms and their implementation in real life.
Doubly linked list with real time examples.
Minor project
Difference between UNION and UNION ALL
Difference between UNION and J...read more

Q54. Have i worked on springboot..then annotations ..how to do profiling in spring boot Lamda expression in Java 8 Then in cloud any performance issues where to start looking For running a schedule based on some met...

read more
Ans.

Questions on Spring Boot, Lambda expressions, and performance issues in cloud computing

  • Spring Boot annotations and profiling

  • Lambda expressions in Java 8

  • Performance issues in cloud computing and where to start looking

  • Triggering a schedule based on metrics

  • Comparing cost of EC2 and Lambda

  • When to choose Lambda

Are these interview questions helpful?
Q55. SQL Question

SQL query to find students with score above a particular threshold and sorth them acc to their score and then names

Ans.

SQL query to find and sort students with scores above a threshold

  • Use the SELECT statement to retrieve the required data

  • Use the WHERE clause to filter students with scores above the threshold

  • Use the ORDER BY clause to sort the results by score and then by name

Q56. Basic HR Questions

Basic HR questions were asked and one puzzle was asked.

Do you have any serious medical issues?

Did you ever have a conflict with your current/previous boss or professor?

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. How many burgers are made in an McD outlet in a day

Ans.

The number of burgers made in a McD outlet varies depending on the location, day of the week, and time of day.

  • The number of burgers made in a McD outlet can range from a few hundred to several thousand per day.

  • Factors that can affect the number of burgers made include the size of the outlet, the popularity of the location, and the time of day.

  • For example, a busy outlet in a popular tourist area may make thousands of burgers per day during peak season, while a smaller outlet i...read more

Q58. Have you worked upon static routing? How do you increase AD in static routing?

Ans.

Yes, I have worked on static routing. AD can be increased by changing the administrative distance value.

  • Static routing is a type of routing where the routes are manually configured by the network administrator.

  • Administrative distance (AD) is a value assigned to a routing protocol or static route to indicate its trustworthiness.

  • To increase AD in static routing, we can change the administrative distance value to a higher number.

  • For example, if the current AD value is 1, we can ...read more

Associate Consultant Jobs

Assocaite Consultant / Manager Expert - Product owner 12-16 years
CGI Information Systems and Management Consultants
4.0
Hyderabad / Secunderabad
Assocaite Consultant / Manager Expert - Product owner (Digital Banking 10-17 years
CGI Information Systems And Management Consultants
4.0
₹ 20 L/yr - ₹ 30 L/yr
Hyderabad / Secunderabad
Associate Consultant 10-18 years
CGI Information Systems and Management Consultants
4.0
Bangalore / Bengaluru

Q59. What is CSRF,XSS, approach for e commerce related websites , recon methods

Ans.

CSRF and XSS are common web security vulnerabilities. E-commerce websites require a multi-layered approach to security.

  • CSRF (Cross-Site Request Forgery) is an attack where a user is tricked into performing an action on a website without their knowledge or consent.

  • XSS (Cross-Site Scripting) is an attack where malicious code is injected into a website, allowing an attacker to steal sensitive information or take control of the website.

  • Approach for e-commerce websites should incl...read more

Q60. DBMS Questions

Explain normalization with the help of examples,
ACID properties,
Triggers, SQL queries.
One question was -> "What is Pragma".

Q61. How can two systems communicate in different vlan over a switch?

Ans.

Two systems in different VLANs can communicate through a router or layer 3 switch.

  • A router or layer 3 switch is required to route traffic between VLANs

  • Each system must have a unique IP address within their respective VLANs

  • The router or layer 3 switch must have interfaces configured for each VLAN

  • The router or layer 3 switch must have a routing table that includes both VLANs

  • Firewall rules may need to be configured to allow traffic between VLANs

Q62. 3. How map works internally in Java

Ans.

Java Map is an interface that maps unique keys to values. It works internally using hash table data structure.

  • Map interface is implemented by HashMap, TreeMap, LinkedHashMap, etc.

  • Keys in a map must be unique and values can be duplicated.

  • Hash table data structure is used to store key-value pairs internally.

  • Hashing is used to convert keys into indices of an array where values are stored.

  • Collision resolution techniques like chaining and open addressing are used to handle collisi...read more

Q63. How spanning tree will work in given topology? Have you worked on spanning tree manipulation?

Ans.

Spanning tree protocol prevents loops in a network by disabling redundant links.

  • Spanning tree protocol selects a root bridge and disables all other paths to prevent loops.

  • It uses a cost metric to determine the shortest path to the root bridge.

  • STP manipulation involves changing the cost metric to influence the path selection.

  • Examples of STP manipulation include changing port priorities or enabling portfast.

  • STP can be visualized using tools like Wireshark or Cisco's Packet Trac...read more

Q64. How to configure HSRP and VRRP? What are their differences? Have you worked on GLBP?

Ans.

HSRP and VRRP are protocols used to provide redundancy for IP addresses. GLBP is another protocol that provides load balancing.

  • HSRP and VRRP are used to provide redundancy for default gateways in a network.

  • HSRP is Cisco proprietary while VRRP is an open standard.

  • HSRP uses a virtual IP address while VRRP uses a virtual router ID.

  • GLBP is a Cisco proprietary protocol that provides load balancing between multiple gateways.

  • GLBP uses a virtual IP address and virtual MAC address to ...read more

Q65. Technical Questions

Questions regarding java and project were asked.
Difference between prepared statement and callable statement were asked.
Asked to explain different methods for multithreading... (run and sta...read more

Q66. What is Git, Difference bw GIT and Git Hub, How many branches in your application explain branching strategy, Major issues faced in git, how you integrated git with jenkins

Ans.

Git is a version control system. GitHub is a web-based Git repository hosting service.

  • Git is a distributed version control system used for tracking changes in source code during software development.

  • GitHub is a web-based Git repository hosting service that provides a graphical interface and tools for collaboration.

  • Git has multiple branches that can be used for parallel development and feature branching.

  • Branching strategy can be based on feature, release, or hotfix.

  • Major issue...read more

Q67. Difference between mean , median , mode What sets you apart from the rest?

Ans.

Mean is the average of a set of numbers, median is the middle value, and mode is the most frequently occurring value.

  • Mean is calculated by adding up all the numbers in a set and dividing by the total number of values.

  • Median is the middle value in a set of numbers when they are arranged in order.

  • Mode is the value that appears most frequently in a set of numbers.

  • I have a strong understanding of statistical concepts and can apply them to real-world scenarios.

  • For example, if we h...read more

Q68. React Question

What are Hooks in React.js and what is its usage?

Q69. What is a linked list ? What are its uses?

Ans.

A linked list is a linear data structure where each element is a separate object linked together by pointers.

  • Linked list is used to implement stacks, queues, and hash tables.

  • It is used in computer memory allocation.

  • It is used in image processing to represent pixels.

  • It is used in music player to create a playlist.

  • It is used in web browsers to store the history of visited web pages.

Q70. 5. Difference between primitives and wrapper class in Java.

Ans.

Primitives are basic data types in Java while wrapper classes are objects that wrap around primitives.

  • Primitives are faster and take less memory than wrapper classes.

  • Wrapper classes provide additional functionality like conversion to and from strings.

  • Primitives are passed by value while wrapper classes are passed by reference.

  • Examples of primitives include int, boolean, and double while examples of wrapper classes include Integer, Boolean, and Double.

Q71. To advise an Indian Airline company on a new policy which will increase their revenue

Ans.

Introduce dynamic pricing based on demand and seasonality

  • Analyze demand patterns and seasonality to determine pricing

  • Offer discounts for early bookings and loyalty programs

  • Partner with hotels and travel agencies for bundled packages

  • Introduce premium services for additional revenue

  • Invest in marketing and advertising to promote new policy

Q72. Puzzle: How do you cut a cake into 8 slices by cutting it only 3 times with a knife?

Ans.

Cut the cake horizontally and then stack the layers before cutting vertically.

  • Cut the cake horizontally into two equal halves.

  • Stack the two halves on top of each other.

  • Cut the cake horizontally again into two equal halves.

  • Stack the four quarters on top of each other.

  • Cut the cake vertically down the middle.

  • Finally, cut the cake vertically again down the middle.

  • You now have 8 equal slices of cake!

Q73. React Question

What are Error Boundaries in React.js and why is it used?

Q74. Tcode for account group & what is function of account group?

Ans.

Tcode for account group is OBD4. Account group is used to classify GL accounts based on their nature and usage.

  • Account group is a key element in the creation of GL accounts

  • It helps in defining the fields that are mandatory while creating a GL account

  • It also determines the number range for GL accounts

  • Examples of account groups are Assets, Liabilities, Income, Expenses, etc.

Q75. What is IAM, what is AD ,Group Policy, Azure Sync, AAD Connect, MIM/FIM, connector configuration ,API, Security Group and DL erc

Ans.

IAM stands for Identity and Access Management, AD is Active Directory, Group Policy is used to manage user and computer settings, Azure Sync syncs on-premises AD with Azure AD, AAD Connect is a tool to connect AD with Azure AD, MIM/FIM are identity management tools, connector configuration is setting up connections between systems, API is a set of rules for building software, Security Group is a collection of users with similar access permissions, DL is a distribution list.

  • IA...read more

Q76. What are the frameworks we can use to train machine learning models?

Ans.

Frameworks for training machine learning models

  • TensorFlow

  • PyTorch

  • Scikit-learn

  • Keras

  • MXNet

Q77. What are the visualisation softwares you are aware of?

Ans.

Tableau, Power BI, QlikView, D3.js, Google Charts, Plotly, FusionCharts, Highcharts

  • Tableau - widely used for data visualization and business intelligence

  • Power BI - Microsoft's business analytics service for interactive visualizations

  • QlikView - business intelligence and data visualization software

  • D3.js - JavaScript library for creating interactive data visualizations

  • Google Charts - free web-based charting library

  • Plotly - online data visualization and analytics tool

  • FusionCharts...read more

Q78. An aluminium manufacturer wants to enter the multiplex business. What advice would you give him?

Ans.

Advise the aluminium manufacturer to conduct market research, assess competition, and develop a unique value proposition.

  • Conduct market research to identify demand and potential customers

  • Assess competition to understand their strengths and weaknesses

  • Develop a unique value proposition to differentiate from competitors

  • Consider partnering with established multiplex brands for expertise and credibility

  • Invest in high-quality facilities and amenities to attract customers

  • Create a st...read more

Q79. How many coolie/ labor will be working in an average railway station?

Ans.

The number of coolie/labor working in an average railway station varies depending on the size and location of the station.

  • The number of coolie/labor can range from a few to several hundred depending on the size of the station.

  • The location of the station also plays a role in determining the number of coolie/labor, as busy stations in metropolitan areas may require more staff.

  • The duties of coolie/labor can include loading and unloading luggage, cleaning, maintenance, and assist...read more

Q80. What do you think will be the demand for broadband connections in 5 years?

Ans.

The demand for broadband connections is expected to increase significantly in the next 5 years.

  • The rise of remote work and online education will drive the demand for faster and more reliable internet connections.

  • The increasing popularity of streaming services and online gaming will also contribute to the demand for broadband.

  • The growth of the Internet of Things (IoT) and smart homes will require more devices to be connected to the internet.

  • The deployment of 5G networks will p...read more

Q81. What is CICD, How you configured Jenkins for your application, How you integrated tools with jenkins, How you deployed your application, Jenkins Security

Ans.

CICD is a software development practice that aims to automate the building, testing, and deployment of applications.

  • Configured Jenkins to build, test, and deploy the application automatically

  • Integrated tools such as Git, Maven, and SonarQube with Jenkins

  • Deployed the application to a test environment using Jenkins pipeline

  • Implemented Jenkins security by creating users, roles, and permissions

Q82. 1. What are the different layers of OSI model.

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with the physical aspects of transmitting data

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes

  • Layer 3: Network layer - handles routing of data between different networks

  • Layer 4: Transport layer - ensures reliable delivery of data between applications

  • Layer 5: Session layer - establishes and manages connections between applications

  • Lay...read more

Q83. How would you sell a flat which is newly constructed but the client is saying that he is getting a similar carpet area old construction property for very less ? (Company doesn’t deal in old properties)

Ans.

Highlight the benefits of a newly constructed flat and emphasize the quality and modern amenities it offers.

  • Emphasize the quality of construction and modern amenities in the newly constructed flat.

  • Highlight the advantages of a new property such as lower maintenance costs, energy efficiency, and warranty on construction.

  • Explain the potential for appreciation in value over time due to being a new property.

  • Discuss the peace of mind that comes with owning a brand new property wit...read more

Q84. What are the current Renewable Energy schemes that are now being imlemented in India ?

Ans.

India is implementing various renewable energy schemes such as solar parks, wind power projects, and hydroelectric power projects.

  • Solar parks with a capacity of 40 GW are being set up across the country

  • Wind power projects with a capacity of 60 GW are being implemented

  • Hydroelectric power projects with a capacity of 60 GW are being developed

  • Kisan Urja Suraksha evam Utthaan Mahabhiyan (KUSUM) scheme for solar pumps and grid-connected solar power projects

  • Pradhan Mantri Kisan Urja...read more

Q85. SDLC vs STLC? write test cases? explain ur project and framework? so many questions on framework regarding? how to report bug? what is agile scrum?

Ans.

Questions on SDLC, STLC, test cases, project framework, bug reporting, and Agile Scrum.

  • SDLC (Software Development Life Cycle) is the process of developing software from planning to deployment.

  • STLC (Software Testing Life Cycle) is the process of testing software from planning to deployment.

  • Test cases are written to ensure that software meets the requirements and functions as expected.

  • Project framework refers to the structure and organization of a project, including tools and p...read more

Q86. Why do you want to work in forensic audit? What do you know about Procurement fraud? Case study question

Ans.

I want to work in forensic audit to utilize my analytical skills and attention to detail in uncovering financial fraud.

  • Interested in investigating financial discrepancies and uncovering fraudulent activities

  • Passionate about analyzing data and identifying patterns to detect fraud

  • Enjoy working in a challenging and dynamic environment where problem-solving skills are essential

  • Familiar with auditing procedures and regulations related to financial fraud detection

  • Possess strong com...read more

Q87. How many people travel by train in Inida in a year?

Ans.

The exact number of people traveling by train in India in a year is not available.

  • The Indian Railways carries millions of passengers every year.

  • The number of train travelers in India is constantly increasing.

  • The train network in India is one of the largest in the world.

Q88. Technical Questions

MCQs on Java .... Collection framework, Multi threading etc.

MCQs on swapping, thrashing, semaphores, paging, scheduling algorithms.
Some computer network questions were also there.

Q89. What are data structures?

Ans.

Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Data structures can be linear or non-linear

  • Examples of linear data structures include arrays, linked lists, and stacks

  • Examples of non-linear data structures include trees and graphs

  • Choosing the right data structure is important for optimizing performance and memory usage

Frequently asked in,

Q90. How to create a table in SQL and elements to it.

Ans.

To create a table in SQL, use the CREATE TABLE statement and define its elements.

  • Use CREATE TABLE statement followed by table name

  • Define columns with data types and constraints

  • Add primary key constraint to uniquely identify each row

  • Example: CREATE TABLE customers (id INT PRIMARY KEY, name VARCHAR(50), email VARCHAR(50))

Q91. How to use pivot in Excel and data grouping, coding knowledge

Ans.

Using pivot and data grouping in Excel requires coding knowledge.

  • Select the data range to be pivoted

  • Go to Insert tab and click on PivotTable

  • Drag and drop fields into Rows, Columns, and Values

  • To group data, select the cells and right-click to select Group

  • Coding knowledge can be used to automate pivot creation and data grouping

Q92. What would be my approach for conducting a research for a market?

Ans.

To conduct research for a market, one should start by defining the research objectives, identifying the target audience, collecting relevant data, analyzing the data, and drawing conclusions.

  • Define the research objectives and goals

  • Identify the target audience and market segment

  • Collect primary and secondary data through surveys, interviews, and market reports

  • Analyze the collected data using statistical tools and techniques

  • Draw conclusions and make recommendations based on the ...read more

Q93. Have you worked with large dataset, if yes, which tools did you use?

Ans.

Yes, I have worked with large datasets using tools like Python, SQL, and Tableau.

  • Utilized Python for data cleaning, manipulation, and analysis

  • Used SQL for querying databases and extracting relevant information

  • Created visualizations and dashboards using Tableau for data presentation

Q94. 2. What are different layers of TCP/IP model.

Ans.

TCP/IP model has four layers: Application, Transport, Internet, and Network Access.

  • Application layer handles high-level protocols like HTTP, FTP, SMTP, etc.

  • Transport layer provides end-to-end communication between hosts using TCP or UDP protocols.

  • Internet layer handles the routing of data packets between networks using IP protocol.

  • Network Access layer deals with the physical transmission of data over the network.

  • Examples of protocols at each layer: HTTP (Application), TCP (Tr...read more

Q95. How do we remove partial-dependency in 2NF?

Ans.

Partial dependency in 2NF can be removed by splitting the table into two separate tables.

  • Identify the attributes causing partial dependency in the table.

  • Create a new table with the partially dependent attributes along with the determinant attribute.

  • Link the new table to the original table using a foreign key.

  • Ensure each table now satisfies 2NF independently.

Q96. How many forms of normalization are there?

Ans.

There are three forms of normalization in database design: 1NF, 2NF, and 3NF.

  • 1NF (First Normal Form) - Ensures that each column in a table contains atomic values. No repeating groups of columns are allowed.

  • 2NF (Second Normal Form) - Requires that the table is in 1NF and all non-key attributes are fully functional dependent on the primary key.

  • 3NF (Third Normal Form) - Builds on 2NF by ensuring that there are no transitive dependencies between non-key attributes.

Q97. What is Abstraction? explain it with pseudocode

Ans.

Abstraction is the process of hiding complex implementation details and showing only the necessary features of an object.

  • Abstraction allows us to focus on what an object does rather than how it does it.

  • It helps in reducing complexity and improving efficiency in software development.

  • Pseudocode example: abstract class Shape { abstract void draw(); }

  • In the example above, the Shape class is abstract and only defines the draw method without specifying how it should be implemented.

Q98. What is Encapsulation? explain it with pseudocode

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for better control over the data by preventing direct access from outside the class.

  • Encapsulation is achieved in object-oriented programming languages through the use of access specifiers like public, private, and protected.

  • Pseudocode example: class Car { private int speed; pu...read more

Q99. Which is regulatory authority of India (Banks)?

Ans.

The regulatory authority of banks in India is the Reserve Bank of India (RBI).

  • Reserve Bank of India (RBI) is the central banking institution in India

  • RBI regulates the functioning of banks in India to ensure financial stability and prevent malpractices

  • It issues guidelines, policies, and regulations for banks to follow

Q100. What is severity and priority?

Ans.

Severity and priority are terms used in issue management to indicate the impact and urgency of an issue.

  • Severity refers to the degree of impact an issue has on the system or business.

  • Priority refers to the urgency with which an issue needs to be addressed.

  • Issues with high severity and high priority should be addressed immediately.

  • Examples of high severity issues include system crashes or data loss.

  • Examples of high priority issues include critical business processes being affe...read more

Previous
1
2
3
4
5
6
7
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10k Interviews
3.7
 • 7.3k Interviews
3.8
 • 4.6k Interviews
3.6
 • 3.6k Interviews
3.4
 • 1.3k Interviews
3.5
 • 1.1k Interviews
3.5
 • 766 Interviews
3.8
 • 286 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Associate Consultant Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter