Risk Investigator
Risk Investigator Interview Questions and Answers
Q1. What types of Frauds will happen in Uber (from driver end)
Frauds from driver end in Uber
Fake GPS location to increase fare
Accepting a ride and then cancelling it to collect cancellation fee
Using a stolen or fake identity to become a driver
Manipulating the surge pricing system
Taking longer routes to increase fare
Accepting cash payments and not reporting them to Uber
Using a fake car registration or insurance
Claiming false cleaning fees
Using a different car than the one registered with Uber
Sharing driver accounts with others
Q2. How to add data list in Excel and how to use v-look up function in Excel
Learn how to add data list and use v-lookup function in Excel
To add a data list, select the cells where you want to add the list and go to Data tab > Data Validation > Data Validation
In the Data Validation dialog box, select List in the Allow drop-down list and enter the items in the Source box separated by commas
To use v-lookup function, select the cell where you want to display the result and enter the formula =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup...read more
Q3. How do u analyze ur data and produce best results
I analyze data using statistical methods and software tools to produce accurate results.
I use statistical software like SPSS, SAS, or R to analyze data
I clean and preprocess data to ensure accuracy
I use descriptive and inferential statistics to analyze data
I visualize data using charts and graphs to identify patterns and trends
I interpret results and draw conclusions based on the data analysis
I validate results using hypothesis testing and confidence intervals
Q4. Do u know how to use Google sheets?
Yes, I am proficient in using Google Sheets.
I am able to create and edit spreadsheets
I can use formulas and functions to manipulate data
I am familiar with formatting and organizing data
I can collaborate with others in real-time using Google Sheets
Q5. Any situation where you used risk analysis approach
I used a risk analysis approach when evaluating potential security threats to a company's network.
Identified potential security threats by analyzing past incidents and vulnerabilities
Assessed the likelihood and impact of each threat on the network
Developed mitigation strategies based on the analysis results
Regularly reviewed and updated the risk analysis to adapt to new threats and changes in the network environment
Risk Investigator Jobs
Interview Questions of Similar Designations
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month