Billennium
Electrosteel Casting Interview Questions and Answers
Q1. Browsing a sharepoint site ends in 404 error, how would you approach this ?
Check site URL, verify permissions, review site settings, check for broken links
Verify the site URL is correct and accessible
Check user permissions to ensure they have access to the site
Review site settings to see if any recent changes may have caused the error
Check for broken links within the site that may be causing the 404 error
Q2. How to fix 401 error, even when the user has read access to the site.
To fix 401 error with read access, check user permissions, clear browser cache, and verify authentication settings.
Check user permissions to ensure they have appropriate access levels
Clear browser cache and cookies to refresh authentication
Verify authentication settings in SharePoint to ensure proper configuration
Q3. migrating SharePoint custom solutions to new sharepoint version
Migrating custom solutions to new SharePoint version involves assessing compatibility, updating code, testing thoroughly, and deploying carefully.
Assess compatibility of custom solutions with new SharePoint version
Update code to align with changes in new version
Thoroughly test custom solutions after migration
Deploy custom solutions carefully to avoid disruptions
Consider using migration tools or services for smoother transition
Q4. Sharepoint search databases and their functions.
Sharepoint search databases store index and crawl data for efficient search functionality.
Search databases store crawled content and metadata for efficient search results
Index databases store indexed content for quick retrieval of search results
Property databases store metadata about crawled content
Usage databases store search analytics data for reporting and analysis
Q5. How to work with IIS logs
Working with IIS logs involves analyzing, monitoring, and troubleshooting web server activity.
Analyze log files using tools like Log Parser Studio or Microsoft Log Parser
Monitor logs for errors, performance issues, and security threats
Troubleshoot issues by identifying patterns in log data and making necessary adjustments
Regularly archive and backup log files to prevent data loss
Q6. Tools you have worked on?
I have worked on tools such as Microsoft Excel, Tableau, Jira, and SQL databases.
Microsoft Excel
Tableau
Jira
SQL databases
Q7. How to apply policy on API
API policies can be applied using API management tools like Apigee, Azure API Management, etc.
API policies can be defined in XML or JSON format
Policies can be applied globally or to specific APIs or operations
Policies can enforce security, rate limiting, caching, transformation, etc.
API management tools provide a user interface to manage policies
Examples of policies include OAuth2 authentication, CORS, IP filtering, etc.
Q8. what is client is enforcement
Client is enforcement refers to the process of enforcing policies and rules on the client side of an application.
It involves implementing security measures and restrictions on the client side to prevent unauthorized access or actions.
Examples include validating user input, restricting access to certain features or data, and enforcing password policies.
Client is enforcement is important for ensuring the security and integrity of an application and its data.
Top HR Questions asked in Electrosteel Casting
Interview Process at Electrosteel Casting
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month