Senior Analyst
80+ Senior Analyst Interview Questions and Answers for Freshers
Q1. If you have two ropes that burn in 60 seconds but not at the same rate. They burn unevenly. Given a match and the two ropes how would you figure out the 45 seconds mark?
Light both ropes at the same time, when the first rope burns out, light the other end of the second rope.
Light both ropes at the same time
When the first rope burns out, light the other end of the second rope
The 45 seconds mark is when the second rope burns out completely
Q2. Mention some specific instance of data breach loss suffered by any MNC and how did they recover from it.
MNCs have suffered data breaches, but recovery is possible.
In 2013, Target suffered a data breach that affected 40 million customers. They recovered by investing in cybersecurity and offering free credit monitoring to affected customers.
In 2017, Equifax suffered a data breach that exposed the personal information of 143 million customers. They recovered by offering free credit monitoring and identity theft protection to affected customers.
MNCs can recover from data breaches b...read more
Q3. Why is it suggested to utilise a database management system (DBMS)? List some of its primary advantages to explain.
A DBMS is suggested for efficient data management. It offers advantages like data security, scalability, and data integrity.
DBMS ensures data security by providing access control and authentication mechanisms.
It allows for efficient data retrieval and manipulation through indexing and query optimization.
DBMS offers scalability by allowing for easy addition of new data and users.
It ensures data integrity by enforcing constraints and providing backup and recovery mechanisms.
Exa...read more
Q4. If you are to estimate the number of cars in a country, how would you do it?
To estimate the number of cars in a country, various data sources and statistical methods can be used.
Collect data from vehicle registration authorities
Use surveys or sampling techniques to estimate car ownership
Analyze sales data from car manufacturers and dealerships
Consider factors like population, income levels, and urbanization
Utilize satellite imagery or aerial surveys to count cars in specific areas
Q5. In Search, in an almost sorted array problem, we have to find the index of an element in the array, The problem can be solved by using the binary search technique,
Binary search technique can be used to find the index of an element in an almost sorted array.
Binary search is efficient for large arrays.
The array must be sorted in ascending or descending order.
If the element is not found, return -1.
Example: [1, 3, 5, 7, 9], target = 5, output = 2
Q6. what is encryption-decryption ? what do you mean by cryptography? what is the difference between a switch and a router ?
Encryption-decryption is the process of converting plain text into a coded message and then back to plain text. Cryptography is the study of secure communication techniques.
Encryption is the process of converting plain text into a coded message using an algorithm and a key.
Decryption is the process of converting the coded message back to plain text using the same algorithm and key.
Cryptography involves techniques for secure communication, including encryption, decryption, and...read more
Share interview questions and help millions of jobseekers 🌟
Q7. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?
Establish a niche and focus on personalized service to differentiate from the larger company.
Identify a specific area of knowledge management where the larger company may not be as strong
Offer personalized service and tailored solutions to clients
Leverage technology to streamline processes and improve efficiency
Build a strong online presence through social media and content marketing
Partner with other smaller companies to offer a wider range of services
Q8. Which is the wealthiest country in the world?
The wealthiest country in the world is Qatar.
Qatar has the highest GDP per capita in the world.
It has a strong economy driven by oil and gas exports.
Qatar invests heavily in infrastructure and has a high standard of living.
Senior Analyst Jobs
Q9. What is the drawback of scanf() and how can it be avoided (if any)?
The drawback of scanf() is that it does not handle input validation well, leading to buffer overflow and security vulnerabilities.
scanf() does not limit the amount of input it reads, leading to buffer overflow if the input is larger than the buffer size.
scanf() does not handle invalid input well, leading to unexpected behavior or crashes.
To avoid these issues, input validation should be performed before using scanf(). Alternatively, fgets() and sscanf() can be used for safer ...read more
Q10. How do you arrive at the terminal growth rate while preparing a financial model?
The terminal growth rate is arrived at by considering the long-term growth prospects of the company.
Consider the industry growth rate and the company's historical growth rate
Analyze the company's competitive position and market share
Evaluate the company's future investment plans and potential for expansion
Take into account any regulatory or economic factors that may impact growth
Use a range of values to account for uncertainty and sensitivity analysis
Q11. What are the different parameters you would look at while doing a competitor intelligence?
Competitor intelligence involves analyzing various parameters to gain insights into the competition.
Market share
Pricing strategy
Product features and quality
Marketing and advertising tactics
Customer reviews and feedback
Distribution channels
Financial performance
Industry trends and regulations
Q12. explain Encapsulation and Polymorphism. Explain , what do you mean by cloud computing. Difference between Http and Https , also discuss about the 3-tier architecture.
Explanation of encapsulation, polymorphism, cloud computing, HTTP/HTTPS, and 3-tier architecture.
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Polymorphism is the ability of an object to take on many forms.
Cloud computing is the delivery of computing services over the internet.
HTTP is a protocol for transferring data over the internet, while HTTPS is a secure version of HTTP.
3-tier architecture is a client-server archite...read more
Q13. In Binomial Coefficient as the name suggests we are required to find out the binomial coefficient, i.eC(n,r).
Binomial coefficient is used to find the number of ways to choose r items from n items.
Binomial coefficient formula is C(n,r) = n! / (r! * (n-r)!)
It is used in probability and combinatorics
Example: C(5,2) = 10, which means there are 10 ways to choose 2 items from 5 items
Q14. On what basis is the wealth of a country measured?
The wealth of a country is measured based on various factors such as GDP, income per capita, natural resources, and human capital.
Gross Domestic Product (GDP) is a commonly used measure of a country's wealth. It represents the total value of all goods and services produced within a country's borders in a specific period.
Income per capita is another important indicator of a country's wealth. It measures the average income earned by each individual in a country.
The abundance an...read more
Q15. How to understand customer behaviour based on credit card transaction? What would be your approach?
To understand customer behaviour based on credit card transaction, I would analyze spending patterns, transaction frequency, and purchase categories.
Analyze spending patterns to identify high and low spenders
Analyze transaction frequency to identify regular and irregular customers
Analyze purchase categories to identify customer preferences and interests
Use data visualization tools to identify trends and patterns
Compare customer behavior to industry benchmarks and competitors
I...read more
Q16. When and how can countries print money?
Countries can print money when they need to stimulate the economy or pay off debts. However, excessive printing can lead to inflation.
Printing money is done by the central bank of a country
It is usually done to stimulate the economy or pay off debts
Excessive printing can lead to inflation and decrease the value of the currency
Printing money can also lead to a decrease in interest rates
Examples of countries that have printed money include Zimbabwe and Venezuela
Q17. What do you understand by loan servicing?
Loan servicing refers to the management of loans after they have been issued.
It involves collecting payments from borrowers, managing escrow accounts, and handling delinquencies and defaults.
Loan servicing can be done by the lender or a third-party servicer.
Servicers may also provide customer service and support to borrowers.
Examples of loan types that require servicing include mortgages, student loans, and auto loans.
Q18. 3. Data sourcing for SME's in Bangladesh- what ratio of women work in sme how has it changed over the years. Total number of sme's in Bangladesh
Ratio of women working in SMEs in Bangladesh and its change over the years, along with the total number of SMEs.
The ratio of women working in SMEs in Bangladesh has increased over the years.
According to a survey conducted by the International Finance Corporation, the percentage of women-owned SMEs in Bangladesh increased from 9% in 2013 to 20% in 2019.
The total number of SMEs in Bangladesh is estimated to be around 7 million.
Data sourcing for SMEs in Bangladesh can be done th...read more
Q19. Why are Java Strings immutable in nature?
Java Strings are immutable to ensure security, thread safety, and efficient memory usage.
Immutable Strings prevent malicious code from modifying the data.
Immutable Strings can be safely shared across multiple threads.
Immutable Strings allow for efficient memory usage by reusing existing objects.
Example: String s1 = "Hello"; s1.concat(" World"); // s1 remains "Hello"
Example: String s2 = "Java"; String s3 = s2.concat(" is awesome"); // s2 remains "Java", s3 is "Java is awesome"
Q20. What are different types of join? And how they differ from each other?
Different types of join include inner, outer, left, right, cross, and self join.
Inner join returns only the matching rows from both tables.
Outer join returns all rows from both tables and null values for non-matching rows.
Left join returns all rows from the left table and null values for non-matching rows from the right table.
Right join returns all rows from the right table and null values for non-matching rows from the left table.
Cross join returns the Cartesian product of b...read more
Q21. What is securitization?
Securitization is the process of converting illiquid assets into marketable securities.
Securitization involves pooling together assets such as mortgages, auto loans, or credit card debt.
These assets are then sold to a special purpose vehicle (SPV) which issues securities backed by the cash flows from the assets.
Investors can then buy these securities, which offer a return based on the cash flows from the underlying assets.
Securitization can help to increase liquidity in the m...read more
Q22. What are the sources to be referred while preparing a report?
Sources for preparing a report include primary research, secondary research, data analysis, expert opinions, and industry reports.
Primary research such as surveys, interviews, and observations
Secondary research from academic journals, books, and online databases
Data analysis using statistical tools and software
Expert opinions from industry professionals or consultants
Industry reports from market research firms or government agencies
Q23. What are the advantages of NumPy arrays over Python lists?
NumPy arrays are faster and more efficient than Python lists.
NumPy arrays are homogeneous and can only contain elements of the same data type.
NumPy arrays support vectorized operations, making them faster for mathematical operations.
NumPy arrays use less memory than Python lists.
NumPy arrays can be easily reshaped and transposed.
Example: calculating the dot product of two arrays is faster with NumPy than with Python lists.
Example: reshaping an array to a different size is eas...read more
Q24. What is the difference between getch() and getche()?
getch() reads a character from the console without echoing it, while getche() echoes the character.
getch() is used for password input where the characters should not be displayed on the screen.
getche() is used for input where the user needs to see the character they are typing.
Both functions are part of the conio.h header file in C.
getch() returns the ASCII value of the character read, while getche() returns the character itself.
Q25. Illustrate public static void main(String args[]) in Java.
Illustrating public static void main(String args[]) in Java
public: access modifier indicating that the method can be accessed from anywhere
static: keyword indicating that the method belongs to the class and not to an instance of the class
void: return type indicating that the method does not return any value
main: name of the method that is the entry point of the program
String args[]: parameter of the method that is an array of strings representing the command line arguments pa...read more
Q26. What is purchasing power parity?
Purchasing power parity (PPP) is an economic theory that compares the currencies of different countries based on their purchasing power.
PPP is used to determine the relative value of currencies by comparing the prices of goods and services in different countries.
It suggests that exchange rates should adjust to equalize the purchasing power of different currencies.
For example, if a Big Mac costs $5 in the United States and €4 in Europe, PPP would suggest that the exchange rate...read more
Q27. Explain few denials & how you can fix that.
Explanation of denials and their fixes
Denial: Lack of documentation. Fix: Ensure all necessary documentation is complete and accurate.
Denial: Coding errors. Fix: Review and correct any coding errors to ensure accurate billing.
Denial: Timely filing limit exceeded. Fix: Submit claims within the specified time frame.
Denial: Duplicate claims. Fix: Implement processes to prevent duplicate submissions.
Denial: Medical necessity not met. Fix: Provide additional documentation to suppo...read more
Q28. Explain indirect and offset functions in excel
Indirect and Offset are functions in Excel used to reference cells or ranges indirectly.
Indirect function is used to reference a cell or range using a text string that contains the cell or range address.
Offset function is used to reference a cell or range that is a specified number of rows and columns away from a given cell or range.
Both functions are useful for creating dynamic formulas that can be updated easily.
Example: =INDIRECT("A1") will reference the cell A1, while =OF...read more
Q29. Why is Linux preferred over Wi dows for Server
Linux is preferred over Windows for servers due to its stability, security, flexibility, and cost-effectiveness.
Linux is open-source, allowing for customization and flexibility in server configurations.
Linux is known for its stability and reliability, making it a popular choice for servers that require constant uptime.
Linux has a strong focus on security, with regular updates and a large community of developers actively working to address vulnerabilities.
Linux is cost-effecti...read more
Q30. Given a server, how would you conduct a recon
To conduct a recon on a server, one must gather information about the server and its network.
Start by identifying the IP address of the server
Use tools like Nmap to scan for open ports and services running on the server
Check for vulnerabilities and exploits that can be used to gain access to the server
Look for any publicly available information about the server and its network, such as domain names and email addresses
Check for any active connections to the server and monitor ...read more
Q31. What is the step for Report Writing and Company Profiling?
The steps for report writing and company profiling involve research, data collection, analysis, and presentation.
Research the company's background, industry, competitors, financials, and market trends.
Collect relevant data from various sources such as financial reports, news articles, and industry reports.
Analyze the data to identify key insights, trends, and opportunities.
Create a structured report outlining the company's profile, strengths, weaknesses, opportunities, and th...read more
Q32. What are different types of banking products?
Banking products include savings accounts, checking accounts, loans, credit cards, and investment accounts.
Savings accounts: earn interest on deposited funds
Checking accounts: used for daily transactions and bill payments
Loans: borrowed money with interest
Credit cards: allows purchases on credit with interest
Investment accounts: used to invest in stocks, bonds, and mutual funds
Q33. what is the work of analyst?
An analyst is responsible for collecting, analyzing, and interpreting data to provide insights and recommendations to improve business performance.
Collecting and organizing data from various sources
Analyzing data using statistical methods and software
Interpreting data to identify trends, patterns, and insights
Developing reports and presentations to communicate findings and recommendations
Collaborating with stakeholders to understand business needs and goals
Continuously monito...read more
Q34. Explain following vulnerabilities 1. IDOR 2. Types of XSS 3. SQLi
IDOR is Insecure Direct Object Reference, XSS is Cross-Site Scripting, and SQLi is SQL Injection.
IDOR occurs when an application allows direct access to internal objects without proper authorization.
XSS refers to injecting malicious scripts into web pages viewed by other users, compromising their security.
SQLi is a technique where an attacker inserts malicious SQL code into a query, manipulating the database.
Example of IDOR: Accessing another user's private data by modifying ...read more
Q35. How would do competitor intelligence?
Competitor intelligence involves gathering and analyzing information about competitors to gain a competitive advantage.
Identify key competitors and their strengths and weaknesses
Monitor their marketing and advertising strategies
Track their product development and pricing strategies
Analyze their financial performance and market share
Attend industry events and conferences to gather information
Utilize online tools and resources to gather data
Maintain a database of competitor inf...read more
Q36. Where do you rate your communication between 0 to 10?
I rate my communication skills at an 8 out of 10.
I am confident in my ability to clearly convey information to others.
I actively listen and ask clarifying questions to ensure understanding.
I have experience presenting complex data in a simple and understandable manner.
I am comfortable communicating with individuals at all levels of an organization.
Q37. Find vulnerabilities in a simulated network and prepare a VAPT report.
To find vulnerabilities in a simulated network and prepare a VAPT report.
Conduct a vulnerability assessment using tools like Nessus, OpenVAS, etc.
Identify vulnerabilities and their severity levels
Prepare a detailed report with recommendations for remediation
Include an executive summary for non-technical stakeholders
Q38. What’s the difference between item and inventory.
Items are individual products while inventory is the total stock of items.
An item is a single product that can be sold or purchased.
Inventory is the total stock of items that a business has on hand.
Items are tracked individually while inventory is tracked as a whole.
For example, a clothing store may have 100 items of clothing in inventory, but each item is tracked separately by size and color.
Q39. why joins are used in SQL?
Joins are used in SQL to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query.
They are used to combine data based on a related column or key.
There are different types of joins such as inner join, left join, right join, and full outer join.
Joins can be used to filter data based on specific conditions.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;
Q40. What is corporate action & what is devidend
Corporate action refers to any event initiated by a company that brings a change to its securities. Dividend is a payment made by a company to its shareholders.
Corporate action includes events like stock splits, mergers, acquisitions, spin-offs, etc.
Dividend is a portion of a company's profits paid to its shareholders as a reward for their investment.
Dividends can be paid in cash or in the form of additional shares.
Dividend yield is the percentage of the current stock price t...read more
Q41. What is financial derivatives & it's types
Financial derivatives are contracts between two parties that derive their value from an underlying asset or security.
Types of financial derivatives include futures, options, swaps, and forwards.
Futures contracts obligate the buyer to purchase an asset at a specific price and time in the future.
Options contracts give the buyer the right, but not the obligation, to buy or sell an asset at a specific price and time in the future.
Swaps involve exchanging cash flows based on diffe...read more
Q42. How do you calculate market size and share?
Market size is calculated by multiplying the total number of potential customers by the average price of the product. Market share is calculated by dividing a company's sales by the total market sales.
Market size = Total number of potential customers x Average price of the product
Market share = Company's sales / Total market sales
Data sources for market size and share include surveys, industry reports, and sales data
Market size and share can vary by geographic region, custome...read more
Q43. SWOT ANALYSIS and ability to gel up with the organisation
SWOT analysis and ability to gel up with the organization are crucial for success in the role of Senior Analyst.
I have experience in conducting SWOT analysis and have used it to identify areas of improvement and growth opportunities for the organization.
I am a team player and have the ability to work collaboratively with colleagues from different departments and levels of seniority.
I am adaptable and can quickly adjust to changes in the organization's goals and priorities.
I h...read more
Q44. What is GDP?
GDP stands for Gross Domestic Product. It is a measure of the total value of goods and services produced within a country in a specific time period.
GDP is used to assess the economic health and growth of a country.
It includes the value of all final goods and services produced within the country's borders.
GDP can be calculated using the expenditure approach, income approach, or production approach.
It is often used to compare the economic performance of different countries.
GDP ...read more
Q45. 1. What is fictitious assets 2. How does a transaction flows in the books of accounts from journal entry to final accounts
Fictitious assets are intangible assets with no physical existence. Transactions flow from journal entry to final accounts through various steps.
Fictitious assets are intangible assets that do not have a physical presence, such as goodwill or deferred revenue.
These assets are created due to accounting practices or transactions, but do not represent any tangible value.
In the books of accounts, transactions start with journal entries where the debit and credit sides are recorde...read more
Q46. What is mutual fund and it's types
A mutual fund is a type of investment vehicle that pools money from multiple investors to invest in stocks, bonds, or other assets.
Mutual funds are managed by professional fund managers.
Investors buy shares in the mutual fund and the value of their investment is determined by the performance of the underlying assets.
There are different types of mutual funds, including equity funds, bond funds, money market funds, and index funds.
Equity funds invest in stocks, bond funds inves...read more
Q47. How tech savy are you ? Do you know what is Microsoft authenticatie
Microsoft authentication is a security mechanism used to verify the identity of users accessing Microsoft services.
Microsoft authentication is used for accessing various Microsoft services such as Office 365, Azure, and Dynamics CRM.
It uses various authentication methods such as username and password, multi-factor authentication, and OAuth.
Microsoft authentication also supports integration with third-party identity providers such as Google and Facebook.
It provides a secure an...read more
Q48. what is eigrp , ospf, encapsulation, osi layer
EIGRP and OSPF are routing protocols used in computer networks. Encapsulation is a process of adding headers and trailers to data. OSI layer is a model for network communication.
EIGRP (Enhanced Interior Gateway Routing Protocol) and OSPF (Open Shortest Path First) are protocols used for routing data in computer networks.
Encapsulation is a process of adding headers and trailers to data as it moves through the network.
OSI (Open Systems Interconnection) layer is a model for netw...read more
Q49. What is linked list and what are its types
A linked list is a data structure where each element points to the next element in the sequence.
Types: Singly linked list, Doubly linked list, Circular linked list
In a singly linked list, each element points to the next element.
In a doubly linked list, each element points to both the next and previous elements.
In a circular linked list, the last element points back to the first element.
Q50. What is data validation What is delete and truncate Delete and drop
Data validation ensures data is accurate and useful. Delete removes specific records, truncate removes all records, drop removes entire table.
Data validation ensures data is accurate, complete, and useful for analysis
Delete removes specific records from a table based on a condition
Truncate removes all records from a table, but keeps the table structure
Drop removes an entire table from the database
Example: DELETE FROM table_name WHERE condition;
Example: TRUNCATE TABLE table_na...read more
Interview Questions of Similar Designations
Top Interview Questions for Senior Analyst Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month