Skip to main content

Phone Interview


Phone Interview
电话面试一般是在onsite interview之前,online test之后。并不是所有公司都有这
个环节,一般前一轮之后的一周内就知道有没有phone interview,而phone interview
一周内就知道会不会有onsite interview。
内容
Phone interview一般是20分钟到1个小时,behavioral question是主流,也有公司在
phone interview里安插case,很少。所以准备的话,当做behavioral interview 来准
备就行了。常见问题如下
Why XX company?
Why this role?
Tell me about yourself
这些问题都可以提前准备,但是在电话面试的时候,一定要注意
找一个安静的环境
准备好纸笔在手边
讲话要有条理,用很清晰的结构回答问题,first,second,in a word,etc。答完之
后一定要简单总结一下你的答案,这一点很加分。而且,电话中,不要打断,不要插话
,在对方说完后可以停顿10秒左右,确认面试的人说完了再开始讲。还有,电话面试中
的交流要达到自信且清晰不容易,需要大量的锻炼口头表达能力。另外就是要准备5-10
个问题,一个是如果聊得不投机面试官没什么问的了,自己要多发问,找寻转机,多交
流,展现你对公司的了解,对position requirement的了解,证明你的确有兴趣,另外
,phone interview结束前面试官也一般会问你还有没有什么问题,这时候自己准备的
问题也能派上用场。

Phone interview之中要注意不要打断面试官,实在有point想补充,也要礼貌的说
excuse me,或者let me chime in really quick, just want to point out之类。电
话面试虽短,也应该问了邮箱之后发thank you letter。

个人经验,phone interview 有时候靠缘分,在电话里回答清楚问题,讲的有条理,很
投缘实在有点难,特别是自己还紧张的时候,很多时候不知道答没答到点上,能不能引
起面试官的共鸣都很难说。这里强调一点,面试的时间很重要,建议不要9点到10点,
人家刚上班,喝了咖啡人还没清醒,没什么兴趣和你多聊。10点到1130是上午的有效时
间,建议可能的话尽量约在这个时间,下午的2点到4点比较有效,同时,避开周一和周
四,这么说是因为周一情绪不佳,周末刚过完,状态还没调整好。周五一般大家情绪都
不错,要周末了,周四则比较累。同时呢,有时候答问题,答什么并不重要,重要的是
语气和你传达的信息,你对这个问题感不感兴趣,有没有曾经的经历引起共鸣,是否熟
悉相关领域,和是否自信其实都是通过语气,讲话的节奏,和音量来体现的。Phone
interview切忌照着读,虽然拿资料在手边面试官也看不见,但是读的话交流实际上就
中断了。有的phone interview比较长,持续40分钟左右,如果平时没有长时间英语表
达的训练,是很难胜任的。

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...