Associate Consultant
900+ Associate Consultant Interview Questions and Answers
Q51. How many airplanes fly in and out of Bangalore in a day
The number of airplanes flying in and out of Bangalore varies daily.
The number of flights depends on factors such as day of the week, time of day, and season.
On average, Kempegowda International Airport in Bangalore handles around 600 flights per day.
This includes both domestic and international flights.
During peak travel times, such as holidays, the number of flights may increase.
However, during times of inclement weather or other disruptions, the number of flights may decre...read more
Q52. Have you worked on BGP? What are the attributes? How to manipulate traffic using attributes?
BGP is a routing protocol used in large networks. It has attributes that can be manipulated to control traffic flow.
BGP attributes include AS path, next hop, local preference, and MED.
AS path is used to prevent loops and determine the shortest path.
Next hop is used to determine the next router to send traffic to.
Local preference is used to determine the preferred path for outbound traffic.
MED is used to influence the path for inbound traffic.
Traffic can be manipulated by chan...read more
Different sorting algorithms and their implementation in real life.
Doubly linked list with real time examples.
Minor project
Difference between UNION and UNION ALL
Difference between UNION and J...read more
Q54. Have i worked on springboot..then annotations ..how to do profiling in spring boot Lamda expression in Java 8 Then in cloud any performance issues where to start looking For running a schedule based on some met...
read moreQuestions on Spring Boot, Lambda expressions, and performance issues in cloud computing
Spring Boot annotations and profiling
Lambda expressions in Java 8
Performance issues in cloud computing and where to start looking
Triggering a schedule based on metrics
Comparing cost of EC2 and Lambda
When to choose Lambda
SQL query to find students with score above a particular threshold and sorth them acc to their score and then names
SQL query to find and sort students with scores above a threshold
Use the SELECT statement to retrieve the required data
Use the WHERE clause to filter students with scores above the threshold
Use the ORDER BY clause to sort the results by score and then by name
Basic HR questions were asked and one puzzle was asked.
Do you have any serious medical issues?
Did you ever have a conflict with your current/previous boss or professor?
Share interview questions and help millions of jobseekers 🌟
Q57. How many burgers are made in an McD outlet in a day
The number of burgers made in a McD outlet varies depending on the location, day of the week, and time of day.
The number of burgers made in a McD outlet can range from a few hundred to several thousand per day.
Factors that can affect the number of burgers made include the size of the outlet, the popularity of the location, and the time of day.
For example, a busy outlet in a popular tourist area may make thousands of burgers per day during peak season, while a smaller outlet i...read more
Q58. Have you worked upon static routing? How do you increase AD in static routing?
Yes, I have worked on static routing. AD can be increased by changing the administrative distance value.
Static routing is a type of routing where the routes are manually configured by the network administrator.
Administrative distance (AD) is a value assigned to a routing protocol or static route to indicate its trustworthiness.
To increase AD in static routing, we can change the administrative distance value to a higher number.
For example, if the current AD value is 1, we can ...read more
Associate Consultant Jobs
Q59. What is CSRF,XSS, approach for e commerce related websites , recon methods
CSRF and XSS are common web security vulnerabilities. E-commerce websites require a multi-layered approach to security.
CSRF (Cross-Site Request Forgery) is an attack where a user is tricked into performing an action on a website without their knowledge or consent.
XSS (Cross-Site Scripting) is an attack where malicious code is injected into a website, allowing an attacker to steal sensitive information or take control of the website.
Approach for e-commerce websites should incl...read more
Explain normalization with the help of examples,
ACID properties,
Triggers, SQL queries.
One question was -> "What is Pragma".
Q61. How can two systems communicate in different vlan over a switch?
Two systems in different VLANs can communicate through a router or layer 3 switch.
A router or layer 3 switch is required to route traffic between VLANs
Each system must have a unique IP address within their respective VLANs
The router or layer 3 switch must have interfaces configured for each VLAN
The router or layer 3 switch must have a routing table that includes both VLANs
Firewall rules may need to be configured to allow traffic between VLANs
Q62. 3. How map works internally in Java
Java Map is an interface that maps unique keys to values. It works internally using hash table data structure.
Map interface is implemented by HashMap, TreeMap, LinkedHashMap, etc.
Keys in a map must be unique and values can be duplicated.
Hash table data structure is used to store key-value pairs internally.
Hashing is used to convert keys into indices of an array where values are stored.
Collision resolution techniques like chaining and open addressing are used to handle collisi...read more
Q63. How spanning tree will work in given topology? Have you worked on spanning tree manipulation?
Spanning tree protocol prevents loops in a network by disabling redundant links.
Spanning tree protocol selects a root bridge and disables all other paths to prevent loops.
It uses a cost metric to determine the shortest path to the root bridge.
STP manipulation involves changing the cost metric to influence the path selection.
Examples of STP manipulation include changing port priorities or enabling portfast.
STP can be visualized using tools like Wireshark or Cisco's Packet Trac...read more
Q64. How to configure HSRP and VRRP? What are their differences? Have you worked on GLBP?
HSRP and VRRP are protocols used to provide redundancy for IP addresses. GLBP is another protocol that provides load balancing.
HSRP and VRRP are used to provide redundancy for default gateways in a network.
HSRP is Cisco proprietary while VRRP is an open standard.
HSRP uses a virtual IP address while VRRP uses a virtual router ID.
GLBP is a Cisco proprietary protocol that provides load balancing between multiple gateways.
GLBP uses a virtual IP address and virtual MAC address to ...read more
Questions regarding java and project were asked.
Difference between prepared statement and callable statement were asked.
Asked to explain different methods for multithreading... (run and sta...read more
Q66. What is Git, Difference bw GIT and Git Hub, How many branches in your application explain branching strategy, Major issues faced in git, how you integrated git with jenkins
Git is a version control system. GitHub is a web-based Git repository hosting service.
Git is a distributed version control system used for tracking changes in source code during software development.
GitHub is a web-based Git repository hosting service that provides a graphical interface and tools for collaboration.
Git has multiple branches that can be used for parallel development and feature branching.
Branching strategy can be based on feature, release, or hotfix.
Major issue...read more
Q67. Difference between mean , median , mode What sets you apart from the rest?
Mean is the average of a set of numbers, median is the middle value, and mode is the most frequently occurring value.
Mean is calculated by adding up all the numbers in a set and dividing by the total number of values.
Median is the middle value in a set of numbers when they are arranged in order.
Mode is the value that appears most frequently in a set of numbers.
I have a strong understanding of statistical concepts and can apply them to real-world scenarios.
For example, if we h...read more
What are Hooks in React.js and what is its usage?
Q69. What is a linked list ? What are its uses?
A linked list is a linear data structure where each element is a separate object linked together by pointers.
Linked list is used to implement stacks, queues, and hash tables.
It is used in computer memory allocation.
It is used in image processing to represent pixels.
It is used in music player to create a playlist.
It is used in web browsers to store the history of visited web pages.
Q70. 5. Difference between primitives and wrapper class in Java.
Primitives are basic data types in Java while wrapper classes are objects that wrap around primitives.
Primitives are faster and take less memory than wrapper classes.
Wrapper classes provide additional functionality like conversion to and from strings.
Primitives are passed by value while wrapper classes are passed by reference.
Examples of primitives include int, boolean, and double while examples of wrapper classes include Integer, Boolean, and Double.
Q71. To advise an Indian Airline company on a new policy which will increase their revenue
Introduce dynamic pricing based on demand and seasonality
Analyze demand patterns and seasonality to determine pricing
Offer discounts for early bookings and loyalty programs
Partner with hotels and travel agencies for bundled packages
Introduce premium services for additional revenue
Invest in marketing and advertising to promote new policy
Q72. Puzzle: How do you cut a cake into 8 slices by cutting it only 3 times with a knife?
Cut the cake horizontally and then stack the layers before cutting vertically.
Cut the cake horizontally into two equal halves.
Stack the two halves on top of each other.
Cut the cake horizontally again into two equal halves.
Stack the four quarters on top of each other.
Cut the cake vertically down the middle.
Finally, cut the cake vertically again down the middle.
You now have 8 equal slices of cake!
What are Error Boundaries in React.js and why is it used?
Q74. Tcode for account group & what is function of account group?
Tcode for account group is OBD4. Account group is used to classify GL accounts based on their nature and usage.
Account group is a key element in the creation of GL accounts
It helps in defining the fields that are mandatory while creating a GL account
It also determines the number range for GL accounts
Examples of account groups are Assets, Liabilities, Income, Expenses, etc.
Q75. What is IAM, what is AD ,Group Policy, Azure Sync, AAD Connect, MIM/FIM, connector configuration ,API, Security Group and DL erc
IAM stands for Identity and Access Management, AD is Active Directory, Group Policy is used to manage user and computer settings, Azure Sync syncs on-premises AD with Azure AD, AAD Connect is a tool to connect AD with Azure AD, MIM/FIM are identity management tools, connector configuration is setting up connections between systems, API is a set of rules for building software, Security Group is a collection of users with similar access permissions, DL is a distribution list.
IA...read more
Q76. What are the frameworks we can use to train machine learning models?
Frameworks for training machine learning models
TensorFlow
PyTorch
Scikit-learn
Keras
MXNet
Q77. What are the visualisation softwares you are aware of?
Tableau, Power BI, QlikView, D3.js, Google Charts, Plotly, FusionCharts, Highcharts
Tableau - widely used for data visualization and business intelligence
Power BI - Microsoft's business analytics service for interactive visualizations
QlikView - business intelligence and data visualization software
D3.js - JavaScript library for creating interactive data visualizations
Google Charts - free web-based charting library
Plotly - online data visualization and analytics tool
FusionCharts...read more
Q78. An aluminium manufacturer wants to enter the multiplex business. What advice would you give him?
Advise the aluminium manufacturer to conduct market research, assess competition, and develop a unique value proposition.
Conduct market research to identify demand and potential customers
Assess competition to understand their strengths and weaknesses
Develop a unique value proposition to differentiate from competitors
Consider partnering with established multiplex brands for expertise and credibility
Invest in high-quality facilities and amenities to attract customers
Create a st...read more
Q79. How many coolie/ labor will be working in an average railway station?
The number of coolie/labor working in an average railway station varies depending on the size and location of the station.
The number of coolie/labor can range from a few to several hundred depending on the size of the station.
The location of the station also plays a role in determining the number of coolie/labor, as busy stations in metropolitan areas may require more staff.
The duties of coolie/labor can include loading and unloading luggage, cleaning, maintenance, and assist...read more
Q80. What do you think will be the demand for broadband connections in 5 years?
The demand for broadband connections is expected to increase significantly in the next 5 years.
The rise of remote work and online education will drive the demand for faster and more reliable internet connections.
The increasing popularity of streaming services and online gaming will also contribute to the demand for broadband.
The growth of the Internet of Things (IoT) and smart homes will require more devices to be connected to the internet.
The deployment of 5G networks will p...read more
Q81. What is CICD, How you configured Jenkins for your application, How you integrated tools with jenkins, How you deployed your application, Jenkins Security
CICD is a software development practice that aims to automate the building, testing, and deployment of applications.
Configured Jenkins to build, test, and deploy the application automatically
Integrated tools such as Git, Maven, and SonarQube with Jenkins
Deployed the application to a test environment using Jenkins pipeline
Implemented Jenkins security by creating users, roles, and permissions
Q82. 1. What are the different layers of OSI model.
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - handles routing of data between different networks
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Session layer - establishes and manages connections between applications
Lay...read more
Q83. How would you sell a flat which is newly constructed but the client is saying that he is getting a similar carpet area old construction property for very less ? (Company doesn’t deal in old properties)
Highlight the benefits of a newly constructed flat and emphasize the quality and modern amenities it offers.
Emphasize the quality of construction and modern amenities in the newly constructed flat.
Highlight the advantages of a new property such as lower maintenance costs, energy efficiency, and warranty on construction.
Explain the potential for appreciation in value over time due to being a new property.
Discuss the peace of mind that comes with owning a brand new property wit...read more
Q84. What are the current Renewable Energy schemes that are now being imlemented in India ?
India is implementing various renewable energy schemes such as solar parks, wind power projects, and hydroelectric power projects.
Solar parks with a capacity of 40 GW are being set up across the country
Wind power projects with a capacity of 60 GW are being implemented
Hydroelectric power projects with a capacity of 60 GW are being developed
Kisan Urja Suraksha evam Utthaan Mahabhiyan (KUSUM) scheme for solar pumps and grid-connected solar power projects
Pradhan Mantri Kisan Urja...read more
Q85. SDLC vs STLC? write test cases? explain ur project and framework? so many questions on framework regarding? how to report bug? what is agile scrum?
Questions on SDLC, STLC, test cases, project framework, bug reporting, and Agile Scrum.
SDLC (Software Development Life Cycle) is the process of developing software from planning to deployment.
STLC (Software Testing Life Cycle) is the process of testing software from planning to deployment.
Test cases are written to ensure that software meets the requirements and functions as expected.
Project framework refers to the structure and organization of a project, including tools and p...read more
Q86. Why do you want to work in forensic audit? What do you know about Procurement fraud? Case study question
I want to work in forensic audit to utilize my analytical skills and attention to detail in uncovering financial fraud.
Interested in investigating financial discrepancies and uncovering fraudulent activities
Passionate about analyzing data and identifying patterns to detect fraud
Enjoy working in a challenging and dynamic environment where problem-solving skills are essential
Familiar with auditing procedures and regulations related to financial fraud detection
Possess strong com...read more
Q87. How many people travel by train in Inida in a year?
The exact number of people traveling by train in India in a year is not available.
The Indian Railways carries millions of passengers every year.
The number of train travelers in India is constantly increasing.
The train network in India is one of the largest in the world.
MCQs on Java .... Collection framework, Multi threading etc.
MCQs on swapping, thrashing, semaphores, paging, scheduling algorithms.
Some computer network questions were also there.
Q89. What are data structures?
Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.
Data structures can be linear or non-linear
Examples of linear data structures include arrays, linked lists, and stacks
Examples of non-linear data structures include trees and graphs
Choosing the right data structure is important for optimizing performance and memory usage
Q90. How to create a table in SQL and elements to it.
To create a table in SQL, use the CREATE TABLE statement and define its elements.
Use CREATE TABLE statement followed by table name
Define columns with data types and constraints
Add primary key constraint to uniquely identify each row
Example: CREATE TABLE customers (id INT PRIMARY KEY, name VARCHAR(50), email VARCHAR(50))
Q91. How to use pivot in Excel and data grouping, coding knowledge
Using pivot and data grouping in Excel requires coding knowledge.
Select the data range to be pivoted
Go to Insert tab and click on PivotTable
Drag and drop fields into Rows, Columns, and Values
To group data, select the cells and right-click to select Group
Coding knowledge can be used to automate pivot creation and data grouping
Q92. What would be my approach for conducting a research for a market?
To conduct research for a market, one should start by defining the research objectives, identifying the target audience, collecting relevant data, analyzing the data, and drawing conclusions.
Define the research objectives and goals
Identify the target audience and market segment
Collect primary and secondary data through surveys, interviews, and market reports
Analyze the collected data using statistical tools and techniques
Draw conclusions and make recommendations based on the ...read more
Q93. Have you worked with large dataset, if yes, which tools did you use?
Yes, I have worked with large datasets using tools like Python, SQL, and Tableau.
Utilized Python for data cleaning, manipulation, and analysis
Used SQL for querying databases and extracting relevant information
Created visualizations and dashboards using Tableau for data presentation
Q94. 2. What are different layers of TCP/IP model.
TCP/IP model has four layers: Application, Transport, Internet, and Network Access.
Application layer handles high-level protocols like HTTP, FTP, SMTP, etc.
Transport layer provides end-to-end communication between hosts using TCP or UDP protocols.
Internet layer handles the routing of data packets between networks using IP protocol.
Network Access layer deals with the physical transmission of data over the network.
Examples of protocols at each layer: HTTP (Application), TCP (Tr...read more
Q95. How do we remove partial-dependency in 2NF?
Partial dependency in 2NF can be removed by splitting the table into two separate tables.
Identify the attributes causing partial dependency in the table.
Create a new table with the partially dependent attributes along with the determinant attribute.
Link the new table to the original table using a foreign key.
Ensure each table now satisfies 2NF independently.
Q96. How many forms of normalization are there?
There are three forms of normalization in database design: 1NF, 2NF, and 3NF.
1NF (First Normal Form) - Ensures that each column in a table contains atomic values. No repeating groups of columns are allowed.
2NF (Second Normal Form) - Requires that the table is in 1NF and all non-key attributes are fully functional dependent on the primary key.
3NF (Third Normal Form) - Builds on 2NF by ensuring that there are no transitive dependencies between non-key attributes.
Q97. What is Abstraction? explain it with pseudocode
Abstraction is the process of hiding complex implementation details and showing only the necessary features of an object.
Abstraction allows us to focus on what an object does rather than how it does it.
It helps in reducing complexity and improving efficiency in software development.
Pseudocode example: abstract class Shape { abstract void draw(); }
In the example above, the Shape class is abstract and only defines the draw method without specifying how it should be implemented.
Q98. What is Encapsulation? explain it with pseudocode
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for better control over the data by preventing direct access from outside the class.
Encapsulation is achieved in object-oriented programming languages through the use of access specifiers like public, private, and protected.
Pseudocode example: class Car { private int speed; pu...read more
Q99. Which is regulatory authority of India (Banks)?
The regulatory authority of banks in India is the Reserve Bank of India (RBI).
Reserve Bank of India (RBI) is the central banking institution in India
RBI regulates the functioning of banks in India to ensure financial stability and prevent malpractices
It issues guidelines, policies, and regulations for banks to follow
Q100. What is severity and priority?
Severity and priority are terms used in issue management to indicate the impact and urgency of an issue.
Severity refers to the degree of impact an issue has on the system or business.
Priority refers to the urgency with which an issue needs to be addressed.
Issues with high severity and high priority should be addressed immediately.
Examples of high severity issues include system crashes or data loss.
Examples of high priority issues include critical business processes being affe...read more
Interview Questions of Similar Designations
Top Interview Questions for Associate Consultant Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month