Filter interviews by
Risk is the potential for loss or harm resulting from a particular action or decision.
Risk is inherent in all aspects of life and business.
It involves uncertainty and the possibility of negative outcomes.
Risk can be managed through strategies such as risk assessment, mitigation, and transfer.
Examples of risks include financial risk, operational risk, and reputational risk.
I will ensure the security of end points and applications by implementing strong access controls, regular security updates, and continuous monitoring.
Implementing strong access controls to restrict unauthorized access to end points and applications
Regularly updating security patches and software to protect against vulnerabilities
Implementing encryption to protect data in transit and at rest
Utilizing endpoint detec...
Confirming torquing involves verifying the accuracy of applied torque.
Confirming torquing is essential to ensure the proper tightening of fasteners.
It involves using torque wrenches or other torque measuring devices.
Verification can be done by comparing the applied torque with the specified torque value.
Visual inspection of fasteners can also help confirm torquing.
Regular calibration of torque tools is necessary f...
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to ensure the confidentiality, integrity, and availability of data.
Common standards in information security include ISO/IEC 27001, NIST Cybersecurity Framework, and PCI DSS.
Examples of information security measu...
Network security involves implementing measures to protect the organization's network from unauthorized access or attacks.
Implementing firewalls to monitor and control incoming and outgoing network traffic
Using encryption to secure data transmission over the network
Regularly updating software and systems to patch vulnerabilities
Implementing strong authentication methods such as multi-factor authentication
Conductin...
The question is asking about the sequence of psc I gider.
PSC stands for Primary Sclerosing Cholangitis, a chronic liver disease.
The question is likely asking about the order or progression of symptoms or events related to PSC.
Examples of possible pointers could include the stages of PSC, the diagnostic process, or the treatment options.
I applied via Newspaper Ad and was interviewed before Oct 2022. There were 2 interview rounds.
Network security involves implementing measures to protect the organization's network from unauthorized access or attacks.
Implementing firewalls to monitor and control incoming and outgoing network traffic
Using encryption to secure data transmission over the network
Regularly updating software and systems to patch vulnerabilities
Implementing strong authentication methods such as multi-factor authentication
Conducting reg...
Controls required to safeguard organizations from perimeter to end points include firewalls, antivirus software, encryption, access controls, and regular security audits.
Firewalls to monitor and control incoming and outgoing network traffic
Antivirus software to detect and remove malware
Encryption to protect sensitive data in transit and at rest
Access controls to limit user permissions and restrict unauthorized access
Re...
In my previous roles, I managed teams, drove strategic initiatives, and ensured operational excellence across various departments.
Led a team of 20 in the operations department, improving efficiency by 30% through process optimization.
Developed and implemented strategic plans that resulted in a 15% increase in revenue over two years.
Managed cross-functional projects, collaborating with marketing, finance, and HR to alig...
I will ensure the security of end points and applications by implementing strong access controls, regular security updates, and continuous monitoring.
Implementing strong access controls to restrict unauthorized access to end points and applications
Regularly updating security patches and software to protect against vulnerabilities
Implementing encryption to protect data in transit and at rest
Utilizing endpoint detection ...
Risk is the potential for loss or harm resulting from a particular action or decision.
Risk is inherent in all aspects of life and business.
It involves uncertainty and the possibility of negative outcomes.
Risk can be managed through strategies such as risk assessment, mitigation, and transfer.
Examples of risks include financial risk, operational risk, and reputational risk.
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to ensure the confidentiality, integrity, and availability of data.
Common standards in information security include ISO/IEC 27001, NIST Cybersecurity Framework, and PCI DSS.
Examples of information security measures i...
I applied via Company Website and was interviewed before Jun 2020. There were 4 interview rounds.
The well foundation executed was a caisson type and the sinking procedure involved controlled excavation and filling with concrete.
The well foundation executed was a caisson type.
The sinking procedure involved controlled excavation.
The well foundation was filled with concrete.
The sinking procedure ensured stability and proper alignment of the foundation.
The steel bridge executed was a cable-stayed bridge.
The bridge was constructed using steel cables to support the deck.
Cable-stayed bridges are known for their aesthetic appeal and structural efficiency.
Examples of famous cable-stayed bridges include the Millau Viaduct in France and the Russky Bridge in Russia.
Top trending discussions
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed in Jun 2021. There was 1 interview round.
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
posted on 17 Jul 2024
I applied via Walk-in and was interviewed before May 2023. There was 1 interview round.
posted on 30 May 2022
I applied via Referral and was interviewed in Nov 2021. There were 2 interview rounds.
The safety person's roles and responsibilities as per the BOCW act include ensuring safety measures are in place, conducting safety inspections, and providing safety training.
Ensuring safety measures are in place at the worksite
Conducting safety inspections to identify potential hazards
Providing safety training to workers and management
Maintaining records of safety inspections and incidents
Ensuring compliance with safe...
COS stands for Cost of Sales, which refers to the direct costs associated with producing goods or services.
COS includes costs such as raw materials, labor, and manufacturing overhead.
Stages involved in COS include identifying direct costs, calculating total COS, and analyzing COS to determine profitability.
Example: If a company sells a product for $100 and the direct costs to produce that product are $60, the COS would...
EOT stands for End of Transmission. It is a signal used to indicate the end of a transmission of data.
EOT is commonly used in telecommunications and computer networking to signify the end of a message or data transmission.
It is represented by the ASCII control character with the code 04.
EOT is often used in conjunction with other control characters like SOH (Start of Header) and ETX (End of Text) in communication proto...
A claim is a request made by an individual or entity for payment of benefits or services covered by an insurance policy.
A claim is typically submitted by a policyholder or healthcare provider to an insurance company.
It includes details such as the services provided, dates of service, and the amount billed.
The insurance company reviews the claim to determine if it meets the policy's coverage criteria.
Once approved, the ...
RFI stands for Request for Information, which is a formal process used to gather information from potential suppliers or vendors.
RFI is typically used in procurement processes to collect information about products, services, or suppliers before making a decision.
It helps organizations to understand the capabilities, pricing, and other details of potential suppliers.
RFIs are often used as a preliminary step before issui...
Estimates are calculated predictions of the cost, time, and resources required for a project.
Gather all relevant information and data related to the project
Break down the project into smaller tasks or components
Use historical data or industry benchmarks to estimate the time and cost for each task
Consider any potential risks or uncertainties that may impact the estimates
Document the estimates and communicate them clearl...
I applied via Approached by Company and was interviewed in Oct 2021. There were 3 interview rounds.
Consolidation of soil is the process of gradual reduction in volume of soil due to expulsion of water from its voids under static load.
Consolidation occurs when a load is applied to a soil mass causing the soil particles to rearrange themselves and expel water from the voids.
This process is time-dependent and can take years to complete.
Consolidation can cause settlement and deformation of structures built on top of the...
Some of the top questions asked at the RITES Deputy General Manager interview -
based on 1 interview experience
Difficulty level
Duration
based on 9 reviews
Rating in categories
Civil Engineer
145
salaries
| ₹3.7 L/yr - ₹8 L/yr |
Mechanical Engineer
113
salaries
| ₹3.3 L/yr - ₹6 L/yr |
Assistant Manager
107
salaries
| ₹6.6 L/yr - ₹13.4 L/yr |
Engineer
90
salaries
| ₹3.2 L/yr - ₹7.2 L/yr |
Inspection Engineer
81
salaries
| ₹3.3 L/yr - ₹8 L/yr |
L&T Construction
Simplex Infrastructures
L&T Energy Hydrocarbon
AECOM