i
Deloitte
Filter interviews by
You can refer to other measures like ROC-AUC, precision-recall curve, F1 score, etc.
ROC-AUC: Receiver Operating Characteristic - Area Under the Curve
Precision-recall curve: Trade-off between precision and recall
F1 score: Harmonic mean of precision and recall
Assumptions of linear regression include linearity, independence, homoscedasticity, and normality.
Linearity: The relationship between the independent and dependent variables is linear.
Independence: The residuals are independent of each other.
Homoscedasticity: The variance of the residuals is constant across all levels of the independent variables.
Normality: The residuals are normally distributed.
Outliers and influ...
OWASP Top 10 attacks are common web application vulnerabilities.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
PKI Infrastructure is a system of digital certificates, public key encryption, and trusted authorities used to secure communication and verify identities.
PKI stands for Public Key Infrastructure.
It is a framework that enables secure communication over an insecure network.
PKI uses digital certificates to verify the authenticity of entities and establish trust.
It involves the use of public and private key pairs for ...
What people are saying about Deloitte
XXE Attack is an XML External Entity attack that exploits the vulnerability of parsing XML input.
XXE Attack is a type of attack that targets applications that parse XML input.
It allows an attacker to read files on the server, execute remote code, or perform denial of service attacks.
The attack occurs when an application processes XML input that contains a reference to an external entity.
By manipulating the externa...
Local and global variables are used in programming to store data values.
Local variables are declared within a function and can only be accessed within that function.
Global variables are declared outside of any function and can be accessed from any part of the program.
Local variables have a limited scope while global variables have a wider scope.
Example of local variable: int x = 5; Example of global variable: int ...
Multi VPCs can be connected using VPC peering or VPN connections.
VPC peering allows direct communication between VPCs using private IP addresses.
VPN connections can be established between VPCs using virtual private gateways.
Routing tables need to be updated to allow traffic flow between VPCs.
Security groups and network ACLs need to be configured to allow traffic between VPCs.
AWS Transit Gateway can also be used to...
ICMP does not have a port number.
ICMP is a protocol that operates at the network layer of the OSI model.
It is used for error reporting, network congestion control, and other purposes.
Unlike TCP and UDP, ICMP does not have a port number.
Instead, it uses message types and codes to communicate information.
Exploiting a JBoss based application
Exploit known vulnerabilities in JBoss and its components
Use brute force attacks to guess weak passwords
Perform SQL injection attacks to gain access to the database
Use cross-site scripting (XSS) attacks to inject malicious code
Exploit misconfigured security settings
Use social engineering to trick users into revealing sensitive information
Perform man-in-the-middle attacks to inte...
LFI, RFI, and Path Traversal are all types of web application vulnerabilities.
LFI (Local File Inclusion) is a vulnerability that allows an attacker to include files on a server through the web application.
RFI (Remote File Inclusion) is a vulnerability that allows an attacker to include files from a remote server through the web application.
Path Traversal is a vulnerability that allows an attacker to access files o...
Aptitude Test with 25 question in 30 Minutes
I faced challenges while implementing a new software system at my previous job.
The software system had compatibility issues with existing systems
There were resistance from some team members to adapt to the new system
I had to troubleshoot and find solutions to ensure smooth implementation
I appeared for an interview in Feb 2025, where I was asked the following questions.
I applied via Referral and was interviewed in May 2024. There was 1 interview round.
You can refer to other measures like ROC-AUC, precision-recall curve, F1 score, etc.
ROC-AUC: Receiver Operating Characteristic - Area Under the Curve
Precision-recall curve: Trade-off between precision and recall
F1 score: Harmonic mean of precision and recall
I applied via Naukri.com
SQL related questions
I appeared for an interview before May 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed before Aug 2023. There was 1 interview round.
I applied via LinkedIn and was interviewed before Feb 2023. There were 2 interview rounds.
OWASP Top 10 attacks are common web application vulnerabilities.
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
XXE Attack is an XML External Entity attack that exploits the vulnerability of parsing XML input.
XXE Attack is a type of attack that targets applications that parse XML input.
It allows an attacker to read files on the server, execute remote code, or perform denial of service attacks.
The attack occurs when an application processes XML input that contains a reference to an external entity.
By manipulating the external ent...
PKI Infrastructure is a system of digital certificates, public key encryption, and trusted authorities used to secure communication and verify identities.
PKI stands for Public Key Infrastructure.
It is a framework that enables secure communication over an insecure network.
PKI uses digital certificates to verify the authenticity of entities and establish trust.
It involves the use of public and private key pairs for encry...
I have extensive experience with AWS, utilizing its services for scalable cloud solutions and efficient resource management.
EC2 Instances: I have deployed and managed EC2 instances for hosting applications, ensuring optimal performance and cost-efficiency.
S3 Storage: I utilize S3 for scalable storage solutions, implementing lifecycle policies for data management and cost reduction.
Lambda Functions: I have developed ser...
I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.
Some of the top questions asked at the Deloitte Solution Advisor interview -
The duration of Deloitte Solution Advisor interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 15 interview experiences
Difficulty level
Duration
based on 159 reviews
Rating in categories
Consultant
41.5k
salaries
| ₹9.7 L/yr - ₹21.5 L/yr |
Senior Consultant
25.6k
salaries
| ₹16.4 L/yr - ₹33.6 L/yr |
Analyst
17k
salaries
| ₹5 L/yr - ₹12 L/yr |
Assistant Manager
11.5k
salaries
| ₹12.1 L/yr - ₹22.3 L/yr |
Manager
8.1k
salaries
| ₹24.6 L/yr - ₹44 L/yr |
Accenture
PwC
Ernst & Young
Cognizant