i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Dec 2023. There was 1 interview round.
Security in microservices involves implementing authentication, authorization, encryption, and monitoring.
Implement authentication and authorization mechanisms to control access to microservices
Use encryption to secure communication between microservices
Implement monitoring and logging to detect and respond to security incidents
Consider using API gateways for centralized security control
Implement rate limiting and thro
Create an app with admin and user roles
Implement role-based access control (RBAC)
Admins have access to all features and can manage users
Users have limited access based on their role
Use authentication and authorization mechanisms
Consider using frameworks like Spring Security or Django's authentication system
I am excited about the innovative projects and collaborative team at your company.
Impressed by company's reputation in the industry
Excited about the opportunity to work on cutting-edge projects
Looking forward to collaborating with talented team members
Seeking new challenges and opportunities for growth.
Looking for opportunities to work on more complex projects
Interested in expanding my skill set and learning new technologies
Seeking a more collaborative and innovative work environment
I applied via Naukri.com and was interviewed in May 2021. There were 4 interview rounds.
posted on 15 Oct 2024
I was interviewed in Sep 2024.
Message related issues in Kubernetes can be handled by troubleshooting network configurations, checking pod logs, and monitoring resource usage.
Troubleshoot network configurations to ensure proper communication between pods
Check pod logs for any error messages or issues related to message passing
Monitor resource usage to identify any bottlenecks or performance issues affecting message delivery
I applied via Company Website and was interviewed in Jul 2023. There were 2 interview rounds.
I applied via campus placement at Aditya College of Engineering, Surampalem and was interviewed in May 2022. There were 3 interview rounds.
There will be around 20 questions
I applied via Recruitment Consultant and was interviewed in May 2021. There were 3 interview rounds.
3 Tier Architecture is a client-server architecture consisting of presentation, application, and data tiers.
Presentation tier: User interface layer that interacts with the user
Application tier: Business logic layer that processes user requests
Data tier: Database layer that stores and retrieves data
Each tier can be developed and maintained independently
Allows for scalability and flexibility
Example: Web application with
A Landing Zone is a secure and well-architected environment for hosting cloud workloads.
Define the scope and requirements of the Landing Zone
Create a multi-account structure with AWS Organizations
Implement security and compliance controls
Automate the deployment of resources using AWS CloudFormation
Use AWS Control Tower to simplify the setup process
Improve application performance by optimizing code, database, and server resources.
Identify and fix code bottlenecks
Optimize database queries and indexing
Use caching and load balancing
Upgrade server hardware and software
Implement performance monitoring and testing
Consider using a content delivery network (CDN)
The number of threads and how to handle them depends on the specific application and its requirements.
The number of threads should be determined based on the workload and available resources.
Threads can be handled using thread pools, which can limit the number of threads and manage their lifecycle.
Synchronization mechanisms such as locks and semaphores can be used to ensure thread safety.
Asynchronous programming can al...
Data loss prevention is a set of strategies and tools used to prevent sensitive data from being lost, stolen, or compromised.
It involves identifying and classifying sensitive data
Implementing policies and procedures to protect the data
Monitoring and detecting potential data breaches
Taking action to prevent or mitigate the impact of a breach
Examples include encryption, access controls, and data backup and recovery
End to end solution design involves creating a comprehensive plan for a project from start to finish.
Identify business requirements and goals
Design architecture and infrastructure
Select appropriate technologies and tools
Create detailed project plan and timeline
Collaborate with stakeholders and team members
Test and validate solution before implementation
I applied via Naukri.com and was interviewed before Mar 2022. There were 3 interview rounds.
Cloud is a network of remote servers that store, manage, and process data.
Cloud computing allows users to access data and applications from anywhere with an internet connection
Examples of cloud services include AWS, Azure, Google Cloud, and Dropbox
Cloud architecture involves designing and managing cloud infrastructure for optimal performance and security
Interview experience
based on 5 reviews
Rating in categories
Consultant
55.2k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
52k
salaries
| ₹2.9 L/yr - ₹11.8 L/yr |
Senior Consultant
46k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
20.7k
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Engineer
20k
salaries
| ₹3.5 L/yr - ₹12.1 L/yr |
Wipro
Accenture
Cognizant
TCS