Upload Button Icon Add office photos

Cohesity

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

Cohesity Senior Customer Success Manager Interview Questions and Answers

Updated 29 Apr 2024

Cohesity Senior Customer Success Manager Interview Experiences

1 interview found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed before Apr 2023. There were 5 interview rounds.

Round 1 - HR 

(1 Question)

  • Q1. Basic HR questions
Round 2 - Technical 

(1 Question)

  • Q1. Data protection domian questions, Why CSM, some scenarios etc
Round 3 - One-on-one 

(1 Question)

  • Q1. Managerial round. Mostly case based and team fit check
Round 4 - Technical 

(1 Question)

  • Q1. With a country manager, mostly technical. SRE level questions.
Round 5 - HR 

(1 Question)

  • Q1. Final HR discussions on salary and everything else

Interview questions from similar companies

I was interviewed before Jan 2016.

Interview Questionnaire 

1 Question

  • Q1. Technical interview

Interview Preparation Tips

Round: Test
Experience: techincal questions from C,C++ . mostly pointers. few ques from DB, and OS.

Duration: 1 hour 30 minutes
Total Questions: 45

Round: Test
Experience: This is a rigourous 6-8 hours coding round where you are given a problem statement to solve .
The company people are there to guide you through the process .
Duration: 6 hours
Total Questions: 1

Round: Technical Interview
Experience: A panel of 2-3 members takes your inteview on basic fundamental c++, data structures questions.
duration is mostly 45 mins to 1hr.

Skills: C++, Coding Skills And Knowledge On Data Structures, Pointers In C, Logical Puzzles, Thinking Approach
College Name: Netaji Subhas Institute Of Technology, Delhi

Interview Preparation Tips

Round: Test
Experience: First round was a written test which had 20 MCQ's in the field of Databases, Theory of computation, Operating systems, Data Structures and Algorithms and one programming question. 7 students (4 B.Tech, 3 M.Tech) got through to the interviews. Most of the interviews were held in the Google Bangalore campus. There were a total of 5 rounds of interviews. All based on Data Structures and Algorithms. Each round had 2 questions for which we were usually supposed to explain the algorithm first and then write the code on a Google doc.  It was a really great experience. I got a chance to visit both Google Bangalore and Hyderabad campuses and taste their awesome food.
Total Questions: 20

General Tips: Practice your coding skills. Writing a neat code is very important. Interviewers not just look for a good algorithm but also your coding style (indentation, variable names, simplicity etc.)
College Name: NIT SURATHKAL

Software Developer Interview Questions & Answers

Google user image Sree Meghana Thotakuri

posted on 10 Mar 2015

Interview Preparation Tips

Round: Test
Experience: Google's APAC test is an online coding round. The test is for 3 hours and it has 4 coding questions.
Duration: 180 minutes

Round: Technical Interview
Experience: I had 3 technical interviews. The questions asked in them consisted of algorithmic coding and design questions. The approach was more stressed upon. The interviewers were very helpful and they were generous in throw hints whenever I was blocked.

Skills: Algorithmic coding , C++
College Name: IIT BOMBAY

Interview Questionnaire 

13 Questions

  • Q1. Given a source array of integers with possible duplicates and a target integer, write algorithm to find out 2 numbers in source array whose sum is equal to target integer
  • Ans. 

    Algorithm to find 2 numbers in an array whose sum is equal to a target integer

    • Use a hash table to store the difference between target and each element in the array

    • Iterate through the array and check if the current element exists in the hash table

    • Return the pair of elements that sum up to the target integer

  • Answered by AI
  • Q2. Say you have three tables WORK, USERS, MANAGERS WORK - work_id - user_id - how_much USERS - user_id - team MANAGERS - manager_id - team If I am a manager, write a select statement to retrieve the work o...
  • Ans. 

    Write a select statement to retrieve work of all users who belong to my team.

    • Join USERS and WORK tables on user_id

    • Join MANAGERS and USERS tables on team

    • Filter by manager_id

  • Answered by AI
  • Q3. In a Chrome extension, which file contains the most important information of the extension like version, pattern matches, etc
  • Ans. 

    The manifest.json file contains the most important information of a Chrome extension.

    • The manifest.json file includes the version number, permissions, content scripts, background scripts, and other important details.

    • It is located in the root directory of the extension.

    • It is required for all Chrome extensions.

    • Example: "manifest_version": 2, "version": "1.0", "permissions": ["tabs", "storage"]

  • Answered by AI
  • Q4. There are three rooms, and there are Princess, Flowers and Snake in those rooms. The doors of all the rooms have incorrect nameplates. i.e., the nameplate for the princess’ room is not Princess. Similarly,...
  • Q5. Which is faster: finding an item in a hashtable or in a sorted list? And Why?
  • Ans. 

    Hashtable is faster for finding an item than a sorted list.

    • Hashtable has constant time complexity O(1) for finding an item.

    • Sorted list has logarithmic time complexity O(log n) for finding an item.

    • Hashtable uses hashing to directly access the item's location.

    • Sorted list requires binary search to find the item's location.

    • Hashtable is ideal for large datasets with frequent lookups.

    • Sorted list is ideal for datasets that re

  • Answered by AI
  • Q6. What are some of the most popular Data interchange formats when using APIs
  • Ans. 

    JSON and XML are the most popular data interchange formats when using APIs.

    • JSON (JavaScript Object Notation) is a lightweight format that is easy to read and write. It is widely used in web APIs.

    • XML (Extensible Markup Language) is a more complex format that is also widely used in web APIs.

    • Other formats include CSV (Comma Separated Values), YAML (YAML Ain't Markup Language), and Protocol Buffers.

  • Answered by AI
  • Q7. Name some popular APIs for each of these Social Commerce service(llike a photo service etc)
  • Ans. 

    Popular APIs for Social Commerce services

    • Facebook Graph API for social media integration

    • Instagram API for photo sharing and tagging

    • Twitter API for real-time updates and customer engagement

    • Pinterest API for product discovery and sharing

    • Google Maps API for location-based services

    • PayPal API for secure payment processing

  • Answered by AI
  • Q8. How would you change the format of all the phone numbers in 1000 static html pages?
  • Ans. 

    Use a script to iterate through each HTML page, locate phone numbers, and update their format.

    • Write a script using a programming language like Python or JavaScript to iterate through each HTML page

    • Use regular expressions to locate phone numbers in the pages

    • Update the format of the phone numbers as needed (e.g. adding country code, changing separators)

    • Save the updated HTML pages with the new phone number format

  • Answered by AI
  • Q9. If you had an opportunity to design the Google Suggest system, please let us know how you would approach it and how you would execute the plan in terms of settings up systems like(data stores or databases,...
  • Ans. 

    Designing Google Suggest system

    • I would start by analyzing user search patterns and frequently searched keywords

    • Then, I would create a database of these keywords and their associated search results

    • I would use indexing services to quickly retrieve relevant results for each keyword

    • I would also implement machine learning algorithms to improve the accuracy of suggestions over time

  • Answered by AI
  • Q10. How do you find out if a number is a power of 2? And how do you know if it is an odd number? Write code in the language of your choice
  • Ans. 

    Check if a number is a power of 2 and odd.

    • To check if a number is a power of 2, use bitwise AND operator with the number and its predecessor. If the result is 0, it is a power of 2.

    • To check if a number is odd, use modulus operator with 2. If the result is 1, it is odd.

    • Example code in Python:

    • def is_power_of_two(num):

    • return num & (num - 1) == 0

    • def is_odd(num):

    • return num % 2 == 1

  • Answered by AI
  • Q11. How will improve the revenue of the cafeteria of the office.
  • Ans. 

    By introducing new menu items, optimizing pricing strategy, and improving the overall dining experience.

    • Conduct a survey to understand the preferences of employees

    • Introduce healthy and affordable meal options

    • Offer discounts for bulk orders or loyalty programs

    • Partner with local vendors to source fresh ingredients

    • Improve the ambiance and seating arrangements

    • Implement online ordering and delivery services

  • Answered by AI
  • Q12. [Actual question which i screwed up. Bad Time for me]Number of users in 2001 for adwords, chrome, gmail, android and picassa are in the ratio of 6:9:14:13:8, and in 2004 we add 3 lakh more users. New rati...
  • Q13. In google adwords there are about 30 million ads from 42 lanuages . What will I do review the ads and reject ads that do not comply with specific rules
  • Ans. 

    Reviewing 30 million ads from 42 languages in Google AdWords and rejecting non-compliant ads requires a systematic approach.

    • Create a set of specific rules and guidelines for ad compliance

    • Use automated tools to filter out ads that violate the rules

    • Assign a team of reviewers to manually check the remaining ads

    • Ensure that the reviewers are fluent in the languages of the ads they are reviewing

    • Regularly update the rules and...

  • Answered by AI

Interview Preparation Tips

Round: Test
Experience: I was asked to take the test at 8.30 pm. They fixed this test, a week back. Nobody will call you to remind you to take test. Nor the interviewer will call you. It is your responsibility to check ur mail without fail. On that day I was expecting a call from google from evening till 8.25 pm. None called me. I thought that they would have forgot that. I planned to do go out and have food. But suddenly my ipad gave a alert message and it was from gmail app [thanks for ipad, or else i would not have checked my mail in lap top]. It was from google recruiter. The mail stated that he has shared a doc with me and i must answer the questions in it. a google drive link was given. he mentioned that the test was for 2 hours. I was asked to type answers just below each of these questions.
Duration: 120 minutes

Round: Technical Interview
Experience: Since I had prepared for tech interviews like amazon, I was able to do it good.After a week I got a call from HR and informed that I cleared the first round. Then after two days I was told that i will have a telephonic interview with one of the google developers from adwords team . They scheduled a telephonic interview the next week

Round: Technical Interview
Experience: 1) How will improve the revenue of the cafeteria of the office. Lots of discussions went and i think, i really did that well.
2)[Actual question which i screwed up. Bad Time for me]
Number of users in 2001 for adwords, chrome, gmail, android and picassa are in the ratio of 6:9:14:13:8, and in 2004 we add 3 lakh more users. New ratio is 8:12:13:11:6. Number of picassa users in 2004= 1,44,000. Calculate number of adwords users in 2005.A basic math question that, even a school student can solve. But in that tension i was not able to do it. I took some time and finally gave him a answer. I myself knew that it would be wrong. But interviewer said great lets move on to next question[just to boost up me - good person].My actual job role revolves around developing tools for the the ad review team which will review the ad and reject illlegal ones. So third question was related to that .He told me that as I am from a tech background, I need to explain him technically wat will I do. He also said that he did not need the actual solution. They will just see the way I approach the problem. That an existing problem and they are open to suggestions.3)In google adwords there are about 30 million ads from 42 lanuages . What will I do review the ads and reject ads that do not comply with specific rules .Regarding the criteria under which google bans a ad as illegal – I discussed about different criteria .Out of the criteria’s i told , he asked me to consider only three criteria .
a) Link not working
b) Drug related ads
c) trademarks[trademark used by the companies]I gave lot of approaches like for link not workinga) designing a autobot which will automatically click ads link and check whether it is redirecting to correct page or not . Autobots are used by hackers to get money for the ads they posted . I suggested that by designing similar autobot we can validate the link.b) to check drug related ads -
To detect the language we can first check the geographic location from which the ad is getting posted and can narrow down to some less choices from which we can detect the language
i suggested him that we can create a trie which some specific keywords (like coccaine ) and do pattern matching with that and reject the add it contains any of the works in trie .The interviewer gave me another constraint wat if there comes a ad “coccaine rehabilitation center” we should reject those kind of ads na . thats for a good cause . So i suggested him that i can maintain another set of trie which can contain those set of keywords.Fist check trie1 if drug related keywords exist .
Next check trie 2 if other types of keyword exist.
– if keyword only present in trie1 [reject ad]
– if both tire return true [can reject . but its better that those ad's alone can be subjected to manual evaluation for rejection].I used trie as it can do the pattern matches faster .For trademarks also I discussed using similar datastructures and the interviewer was ok with my answer.

General Tips: I applied for a job in Google jobs page. I know that its very difficult that a resume gets noticed by google.Suddenly one fine day i got a call from Google HR saying that they are interested in my profile and asked me if, i was ready to go with the interview process[Come on! who will say no for Google]. I was surprised.I was asked to take a initial screen test [Online test].
Skills: data structure, Algorithm
College Name: na

Skills evaluated in this interview

Interview Questionnaire 

7 Questions

  • Q1. Image data structure: An image(square image) can be stored as a tree: A node is white if the image is white, is black if the image is black, and is mixed if it contains both. White and black nodes are leav...
  • Q2. There is a dictionary containing words in sorted order. These words consist of some alien alphabets. Using the dictionary, find out the ordering between the alphabets. For eg, if English was the alien lang...
  • Q3. A / b c / / d e f g Print the nodes in the following order: a, b, c, g, f, e, d, h, i, j, k, l ,m, n, o and so on. Which all data structures are used? Can we use just 1?
  • Ans. 

    Multiple data structures are used to print nodes in a specific order. One data structure cannot be used alone.

    • The given order suggests a depth-first search traversal of a tree-like structure.

    • A stack can be used to keep track of the nodes to be visited.

    • A queue can be used to store the children of a node in the order they are visited.

    • An array can be used to store the nodes in the required order.

    • A linked list can be used ...

  • Answered by AI
  • Q4. Given 2 strings like bangalore and blr, return whether one appears as a subsequence of the other. The above case returns true whereas bangalore and brl returns false
  • Q5. Given n pens and n tops, each pen (and each top) having a size different than the other and each pen fitting exactly one top, find the largest pen using minimum number of comparisons. A comparison involves...
  • Ans. 

    Find largest pen using minimum comparisons with tops.

    • Divide pens into two groups and compare largest pen from each group with largest top.

    • Repeat the process with the group containing the largest pen until only one pen is left.

    • The remaining pen is the largest pen.

    • Total number of comparisons required is 2n-3.

  • Answered by AI
  • Q6. Given n dice, each of 'a' sides and a sum b, return the number of ways in which the sum b can be obtained. How can you reduce the time complexity and space complexity?
  • Ans. 

    Given n dice with 'a' sides and sum b, return no. of ways to obtain b. Optimize time and space complexity.

    • Use dynamic programming to reduce time complexity

    • Create a 2D array to store the number of ways to obtain each sum for each number of dice

    • Use rolling arrays to optimize space complexity

    • Example: n=2, a=6, b=7 -> 6 ways to obtain sum 7

    • Example: n=3, a=4, b=8 -> 21 ways to obtain sum 8

  • Answered by AI
  • Q7. Given 2 machines, each having 64 GB RAM, containing all integers (8 byte), sort the entire 128 GB data. You may assume a small amount of additional RAM. Extend this to sort data stored in 1000 machines
  • Ans. 

    Sort 128 GB data on 2 machines with 64 GB RAM each. Extend to 1000 machines.

    • Use external sorting algorithm like merge sort or quick sort

    • Divide data into smaller chunks and sort them individually

    • Merge sorted chunks using additional RAM

    • For 1000 machines, use distributed sorting algorithms like MapReduce or Hadoop

    • Ensure data consistency and fault tolerance in distributed sorting

  • Answered by AI

Interview Preparation Tips

Round: Test
Experience: There was a preliminary test, wherein questions on discrete structures, data structures, algorithms, math (permutation, combinations, probability) and operating systems were asked. There was also a programming question to code (on paper). It took them around 3 weeks to shortlist students selected for interviews.

Round: Technical Interview
Experience: It took them about a month's time to announce results!

College Name: Veermata Jijabai Technological Institute, Mumbai [ VJTI ]

Skills evaluated in this interview

I was interviewed before Mar 2021.

Round 1 - Face to Face 

(4 Questions)

Round duration - 60 minutes
Round difficulty - Easy

This was the first technical round.

  • Q1. 

    Reverse Linked List Problem Statement

    Given a singly linked list of integers, return the head of the reversed linked list.

    Example:

    Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
    Reversed link...
  • Ans. 

    Reverse a singly linked list of integers and return the head of the reversed linked list.

    • Iterate through the linked list and reverse the pointers to point to the previous node instead of the next node.

    • Keep track of the previous, current, and next nodes while reversing the linked list.

    • Update the head of the reversed linked list as the last node encountered during reversal.

  • Answered by AI
  • Q2. 

    LCA of Binary Tree Problem Statement

    You are given a binary tree consisting of distinct integers and two nodes, X and Y. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...

  • Ans. 

    Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.

    • Traverse the binary tree to find the paths from the root to nodes X and Y.

    • Compare the paths to find the last common node, which is the LCA.

    • Handle cases where one node is an ancestor of the other.

    • Consider edge cases like when X or Y is the root node.

    • Implement a recursive or iterative solution to find the LCA efficiently.

  • Answered by AI
  • Q3. What is internal fragmentation?
  • Ans. 

    Internal fragmentation occurs when allocated memory is larger than the requested memory, leading to wasted space.

    • Internal fragmentation is common in memory management systems.

    • It occurs when a block of memory is allocated to a process, but the process does not use all of the allocated memory.

    • This results in wasted space within the allocated block.

    • For example, if a process requests 100 bytes of memory but is allocated a ...

  • Answered by AI
  • Q4. Which part of memory stores uninitialized static and global variables?
  • Ans. 

    BSS segment in memory stores uninitialized static and global variables.

    • BSS segment stands for 'Block Started by Symbol' and is a section of memory where uninitialized static and global variables are stored.

    • Variables declared with the 'static' keyword or as global variables without initialization are stored in the BSS segment.

    • For example, int a; or static int b; would be stored in the BSS segment.

  • Answered by AI
Round 2 - Face to Face 

(3 Questions)

Round duration - 60 minutes
Round difficulty - Easy

Technical Interview round with questions on DSA, OS, OOPS etc.

  • Q1. 

    Integer Square Root Calculation

    Given a positive integer 'N', compute its square root and return it. If 'N' is not a perfect square, then return the floor value of sqrt(N).

    Example:

    Input:
    N = 25
    N = 20
    N...
  • Ans. 

    Calculate the square root of a positive integer and return the floor value if not a perfect square.

    • Use the sqrt() function to calculate the square root of the given integer.

    • If the square root is not an integer, return the floor value using floor() function.

    • Handle constraints such as the range of 'N' and the number of test cases.

  • Answered by AI
  • Q2. Where does the returned value for the 'main' function go?
  • Ans. 

    The returned value for the 'main' function goes to the operating system.

    • The returned value is typically an integer representing the exit status of the program.

    • A return value of 0 usually indicates successful execution, while non-zero values indicate errors.

    • The operating system can use the return value to determine the success or failure of the program.

  • Answered by AI
  • Q3. What is a segmentation fault?
  • Ans. 

    A segmentation fault is a type of error that occurs when a program tries to access a memory location that it is not allowed to access.

    • Occurs when a program tries to access memory outside of its allocated space

    • Usually caused by bugs in the code such as accessing an uninitialized pointer or writing past the end of an array

    • Can lead to program crashes or unexpected behavior

    • Example: Accessing an element beyond the bounds of

  • Answered by AI
Round 3 - HR 

Round duration - 30 minutes
Round difficulty - Easy

This was a typical managerial round.

Interview Preparation Tips

Eligibility criteriaAbove 7 CGPANetApp India Pvt Ltd interview preparation:Topics to prepare for the interview - Data Structures, Algorithms, OS, DBMS, Networking, Aptitude, OOPSTime required to prepare for the interview - 5 monthsInterview preparation tips for other job seekers

Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.

Application resume tips for other job seekers

Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.

Final outcome of the interviewSelected

Skills evaluated in this interview

I was interviewed before Mar 2021.

Round 1 - Face to Face 

(5 Questions)

Round duration - 60 minutes
Round difficulty - Easy

Technical Interview round with questions on DSA, Programming and OOPS.

  • Q1. 

    Implement strstr() Function in C Problem Statement

    Given two strings A and B, find the index of the first occurrence of A in B. If A is not present in B, return -1.

    Example:

    Input:
    A = "bc", B = "abcdd...
  • Ans. 

    Implement the strstr() function in C to find the index of the first occurrence of one string in another.

    • Iterate through the main string and check if the substring matches at each position.

    • Return the index if a match is found, else return -1.

    • Handle edge cases like empty strings or when the substring is longer than the main string.

  • Answered by AI
  • Q2. What happens when we try to access a null pointer in C?
  • Ans. 

    Accessing a null pointer in C results in a segmentation fault, as the program tries to access memory at address 0.

    • Attempting to dereference a null pointer will result in a segmentation fault, as the program tries to access memory at address 0.

    • It is important to always check if a pointer is null before attempting to access its value.

    • Example: int *ptr = NULL; printf('%d', *ptr); // This will result in a segmentation faul

  • Answered by AI
  • Q3. What are the phases of a compiler?
  • Ans. 

    Phases of a compiler include lexical analysis, syntax analysis, semantic analysis, optimization, and code generation.

    • Lexical analysis: Converts source code into tokens.

    • Syntax analysis: Checks the syntax of the code using a grammar.

    • Semantic analysis: Checks the meaning of the code.

    • Optimization: Improves the code for efficiency.

    • Code generation: Generates machine code or intermediate code.

  • Answered by AI
  • Q4. What is a system stack?
  • Ans. 

    A system stack is a data structure that stores information about the active subroutines of a computer program.

    • A system stack typically consists of a stack of frames, each representing a subroutine call.

    • The stack grows and shrinks as subroutines are called and returned.

    • The top of the stack points to the currently executing subroutine.

    • Common operations on a system stack include push (adding a new frame) and pop (removing

  • Answered by AI
  • Q5. 

    Count Set Bits Problem Statement

    Given an integer N, for each integer from 0 through N, find and print the number of set bits (1s) present in its binary representation.

    Example:

    Input:
    N = 5
    Output:
    ...
  • Ans. 

    Count the number of set bits in binary representation of integers from 0 to N.

    • Iterate through integers from 0 to N and count the number of set bits in their binary representation.

    • Use bitwise operations to check if a bit is set in the binary representation.

    • Return the count of set bits for each integer in the range.

  • Answered by AI
Round 2 - Face to Face 

(4 Questions)

Round duration - 60 minutes
Round difficulty - Easy

Technical Interview round with questions on DSA, Programming and OOPS.

  • Q1. 

    Inorder Traversal of a Binary Tree Without Recursion

    You are provided with a binary tree consisting of 'N' nodes, where each node contains an integer value. Your task is to perform the In-Order traversal ...

  • Ans. 

    Perform In-Order traversal on a binary tree without recursion.

    • Use a stack to simulate the recursive process of In-Order traversal.

    • Start with the root node and keep traversing left until reaching a null node, pushing nodes onto the stack.

    • Pop nodes from the stack, print the value, and move to the right child if it exists.

    • Repeat until the stack is empty and all nodes have been visited.

  • Answered by AI
  • Q2. 

    Detect Loop in Singly Linked List

    Determine if a given singly linked list of integers contains a cycle.

    Explanation:

    A cycle in a linked list occurs when a node's next points back to a previous node in ...

  • Ans. 

    Detect if a singly linked list has a cycle by using Floyd's Cycle Detection Algorithm.

    • Use Floyd's Cycle Detection Algorithm to detect a cycle in a singly linked list.

    • Maintain two pointers, one moving at twice the speed of the other.

    • If there is a cycle, the two pointers will eventually meet.

    • If one of the pointers reaches the end of the list (null), there is no cycle.

  • Answered by AI
  • Q3. What is an interrupt?
  • Ans. 

    An interrupt is a signal sent to the CPU to alert it of an event that needs immediate attention.

    • Interrupts can be generated by hardware devices or software programs.

    • They can be used to handle events such as keyboard input, mouse clicks, or network activity.

    • Interrupts can be classified as hardware interrupts, software interrupts, or exceptions.

    • Examples of interrupts include the timer interrupt, which is used for multita...

  • Answered by AI
  • Q4. What is the CSMA protocol?
  • Ans. 

    CSMA stands for Carrier Sense Multiple Access. It is a protocol used in network communication to avoid collisions.

    • CSMA allows devices to listen to the network before transmitting data to avoid collisions.

    • If a device senses that the network is busy, it waits for a random amount of time before attempting to transmit.

    • CSMA/CD (Collision Detection) is a variant of CSMA used in Ethernet networks.

    • CSMA/CA (Collision Avoidance)

  • Answered by AI
Round 3 - HR 

Round duration - 30 minutes
Round difficulty - Easy

Typical Managerial round.

Interview Preparation Tips

Eligibility criteriaAbove 7 CGPANetApp India Pvt Ltd interview preparation:Topics to prepare for the interview - Data Structures, Algorithms, Networking, OS, DBMS, Aptitude, OOPSTime required to prepare for the interview - 5 monthsInterview preparation tips for other job seekers

Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.

Application resume tips for other job seekers

Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.

Final outcome of the interviewSelected

Skills evaluated in this interview

Interview Questionnaire 

18 Questions

  • Q1. UDP v TCP
  • Q2. Connection less vs connection oriented
  • Ans. 

    Connection-oriented protocols establish a dedicated end-to-end connection before data transmission, while connectionless protocols do not.

    • Connection-oriented protocols ensure reliable data transmission, while connectionless protocols do not guarantee reliability.

    • Connection-oriented protocols are used in applications such as file transfer and email, while connectionless protocols are used in applications such as video s...

  • Answered by AI
  • Q3. Some more basic questions related to networking
  • Q4. 6 people, 6 hats some black, others white, standing in a row, how many can identify the hats on their heads, if they can’t communicate, only make a strategy beforehand
  • Q5. Some more puzzles
  • Q6. Extracurricular activities
  • Q7. Basic questions like analyzing a pen, based on how deep you can think
  • Q8. About yourself?
  • Q9. Experience of the whole day?
  • Ans. 

    My experience of the whole day was productive and challenging.

    • Started the day with a team meeting to discuss project progress

    • Worked on coding and debugging for several hours

    • Collaborated with colleagues to solve complex problems

    • Attended a training session on new software development tools

    • Finished the day by reviewing and documenting my work

  • Answered by AI
  • Q10. Your role in NetApp?
  • Ans. 

    I am a software developer at NetApp.

    • Design and develop software applications

    • Collaborate with cross-functional teams

    • Write clean and efficient code

    • Participate in code reviews and testing

    • Stay up-to-date with emerging trends and technologies

  • Answered by AI
  • Q11. Extra curricular activities, fests etc.?
  • Q12. Questions, if any?
  • Q13. Topic of interest and why
  • Q14. Explain your internship
  • Q15. 8 ball puzzle, 7 have same weight 1 has diff
  • Q16. Same puzzle with 9 balls and optimize it
  • Q17. What does a QA do
  • Ans. 

    A QA (Quality Assurance) is responsible for ensuring that software products meet the required quality standards.

    • Develop and execute test plans and test cases

    • Identify and report defects and issues

    • Collaborate with developers to resolve issues

    • Ensure compliance with industry standards and regulations

    • Continuously improve testing processes and methodologies

  • Answered by AI
  • Q18. About netapp?

Interview Preparation Tips

Round: Test
Experience: First a written round was conducted. Written was based on Programming, Data structure, OS and Aptitude. There were 4 sections with a total of 50 questions to be done in 1 hour, with each section having individual cut-off.

Skills: Data structure, Algorithm, Java
College Name: NA

Skills evaluated in this interview

I applied via Referral

Interview Questionnaire 

34 Questions

  • Q1. Give a few technical differences between Windows and UNIX
  • Ans. 

    Windows and UNIX have several technical differences.

    • Windows has a graphical user interface (GUI) while UNIX is primarily command-line based.

    • Windows uses the NTFS file system while UNIX typically uses the ext4 file system.

    • Windows supports a wide range of software applications, while UNIX is known for its stability and security.

    • Windows has a larger user base and is more commonly used for personal computers, while UNIX is...

  • Answered by AI
  • Q2. Give a few differences between NTFS and FAT
  • Ans. 

    NTFS and FAT are file systems used in Windows operating systems with differences in features and capabilities.

    • NTFS supports file and folder permissions, while FAT does not.

    • NTFS has built-in support for file compression and encryption, while FAT does not.

    • NTFS has a journaling feature that helps in recovering from system crashes, while FAT does not.

    • NTFS supports larger file sizes and partition sizes compared to FAT.

    • NTFS ...

  • Answered by AI
  • Q3. Mention the layers in OSI stack
  • Ans. 

    The OSI stack consists of 7 layers that define the functions and protocols of network communication.

    • Physical layer: Deals with the physical transmission of data.

    • Data Link layer: Provides error-free transmission over a physical link.

    • Network layer: Handles routing and logical addressing.

    • Transport layer: Ensures reliable data delivery and manages end-to-end connections.

    • Session layer: Establishes, manages, and terminates s...

  • Answered by AI
  • Q4. Explain in detail the concept of NAT and DHCP
  • Ans. 

    NAT (Network Address Translation) is a technique used to translate private IP addresses to public IP addresses, allowing devices on a private network to communicate with the internet. DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration parameters to devices on a network.

    • NAT allows multiple devices on a private network to share a single...

  • Answered by AI
  • Q5. What is the difference between hub, switch, and router?
  • Ans. 

    A hub is a simple networking device that connects multiple devices in a network. A switch is a more advanced device that filters and forwards data packets. A router is a device that connects multiple networks and directs data packets between them.

    • A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer.

    • A hub broadcasts data to all connected devices, while a switch selectivel...

  • Answered by AI
  • Q6. What is collision domain? How does bridge segregate collision domains?
  • Ans. 

    Collision domain is a network segment where collisions can occur. Bridges segregate collision domains by creating separate segments.

    • Collision domain is a section of a network where network devices share the same bandwidth and can collide with each other.

    • Collisions occur when two or more devices transmit data simultaneously on a shared medium.

    • Bridges create separate collision domains by dividing a network into multiple ...

  • Answered by AI
  • Q7. Given a routine which sorts only positive numbers, write a wrapper around it to sort both positive and negative numbers
  • Q8. Suggest a suitable combination of array and hashmap to design the underlying data structures behind an educational institution’s website. The website supports selection of a particular department, a part...
  • Ans. 

    A combination of array and hashmap can be used to design the underlying data structures for an educational institution's website.

    • Use an array to store the departments available in the institution.

    • Each department can be represented as a key in the hashmap.

    • The value corresponding to each department key in the hashmap can be another hashmap.

    • This nested hashmap can store the courses available in the department.

    • The courses ...

  • Answered by AI
  • Q9. Give the design considerations for a client server system wherein the client gets a virtual operating system on the fly through the network from a server consisting of several such operating systems
  • Ans. 

    Design considerations for a client-server system with virtual operating systems on the fly

    • Scalability: Ensure the system can handle multiple clients requesting virtual operating systems simultaneously

    • Resource allocation: Manage resources efficiently to provide virtual operating systems to clients

    • Network bandwidth: Optimize network usage to deliver virtual operating systems quickly

    • Security: Implement measures to protect...

  • Answered by AI
  • Q10. What are the different types of virtualization?. I was asked to differentiate between system and process virtualization
  • Q11. Explain VMware’s virtualization on a multicore machine
  • Ans. 

    VMware's virtualization on a multicore machine allows for efficient utilization of resources and improved performance.

    • VMware's virtualization technology enables the creation of multiple virtual machines (VMs) on a single multicore machine.

    • Each VM can run its own operating system and applications, isolated from other VMs.

    • The hypervisor, such as VMware ESXi, manages the allocation of CPU, memory, and other resources to e...

  • Answered by AI
  • Q12. Pack 51 apples in minimum number of packets such that with the packets I have made, I should be able to give any number of apples between 1 and 51
  • Ans. 

    The minimum number of packets required to pack 51 apples such that any number of apples between 1 and 51 can be given.

    • The minimum number of packets required is 6.

    • Each packet should contain a power of 2 number of apples.

    • The packets should be of sizes: 1, 2, 4, 8, 16, and 20.

    • By combining these packets, any number of apples between 1 and 51 can be given.

  • Answered by AI
  • Q13. Write a program to implement strstr
  • Ans. 

    Program to implement strstr function in C++

    • Use two nested loops to compare each character of the haystack and needle

    • If a match is found, return the starting index of the substring

    • If no match is found, return -1

  • Answered by AI
  • Q14. From an incoming stream of numbers, construct a binary tree such that it is almost balanced
  • Ans. 

    To construct an almost balanced binary tree from an incoming stream of numbers.

    • Use a self-balancing binary search tree like AVL or Red-Black tree.

    • Insert the numbers from the stream into the tree.

    • Perform rotations or rebalancing operations as necessary to maintain balance.

    • Consider using a priority queue to handle the incoming stream efficiently.

  • Answered by AI
  • Q15. How would I implement the autocomplete feature for search queries?
  • Ans. 

    Implementing autocomplete feature for search queries

    • Use a trie data structure to store the search queries

    • As the user types, traverse the trie to find matching prefixes

    • Return the suggestions based on the matching prefixes

    • Consider using a ranking algorithm to prioritize suggestions

  • Answered by AI
  • Q16. What is a semaphore?
  • Ans. 

    A semaphore is a synchronization object that controls access to a shared resource through the use of a counter.

    • Semaphores can be used to limit the number of threads accessing a resource simultaneously.

    • They can be used to solve the critical section problem in concurrent programming.

    • Semaphores can have two types: counting semaphores and binary semaphores.

    • Counting semaphores allow a specified number of threads to access a...

  • Answered by AI
  • Q17. Code the P and V operations of a semaphore
  • Ans. 

    The P and V operations are used to control access to a shared resource using a semaphore.

    • P operation (wait operation) decreases the value of the semaphore by 1, blocking if the value is already 0.

    • V operation (signal operation) increases the value of the semaphore by 1, releasing a waiting process if any.

    • P and V operations are typically used in synchronization mechanisms to prevent race conditions and ensure mutual excl...

  • Answered by AI
  • Q18. Explain REST web service
  • Ans. 

    REST web service is an architectural style for designing networked applications that use HTTP as the communication protocol.

    • REST stands for Representational State Transfer

    • It is based on a client-server model

    • It uses standard HTTP methods like GET, POST, PUT, DELETE

    • Resources are identified by URIs

    • Responses are typically in JSON or XML format

  • Answered by AI
  • Q19. Is HTTP a stateless or stateful protocol?
  • Ans. 

    HTTP is a stateless protocol.

    • HTTP is stateless because it does not retain any information about previous requests or responses.

    • Each request is treated as an independent transaction, and the server does not maintain any knowledge of the client's state.

    • To maintain state, cookies or session management techniques can be used.

    • Statelessness allows for scalability and simplicity in web applications.

  • Answered by AI
  • Q20. What is shared memory?
  • Ans. 

    Shared memory is a memory space that can be accessed by multiple processes or threads simultaneously.

    • Shared memory allows processes or threads to communicate and share data efficiently.

    • It is typically used in inter-process communication (IPC) to avoid the overhead of copying data between processes.

    • Shared memory can be implemented using operating system mechanisms like memory-mapped files or system calls.

    • Example: Multip...

  • Answered by AI
  • Q21. What motivates me in life?
  • Q22. Explain the alignment issues in structures
  • Ans. 

    Alignment issues in structures occur due to memory padding and alignment requirements.

    • Structures may have unused memory space due to alignment requirements.

    • Padding is added to align structure members on memory boundaries.

    • Alignment issues can lead to wasted memory and decreased performance.

    • Compiler directives like #pragma pack can be used to control alignment.

    • Example: struct MyStruct { char a; int b; char c; };

  • Answered by AI
  • Q23. I am given two files viz. f1.c, f2.c, both having a call to malloc(). Can the address of the locations returned by these two be same?
  • Q24. Explain memory management unit
  • Ans. 

    Memory Management Unit (MMU) is a hardware component that manages memory access and translation between virtual and physical addresses.

    • MMU is responsible for translating virtual addresses used by programs into physical addresses in the computer's memory.

    • It provides memory protection by assigning access permissions to different memory regions.

    • MMU also handles memory allocation and deallocation, ensuring efficient use of...

  • Answered by AI
  • Q25. What is a socket?
  • Ans. 

    A socket is an endpoint for communication between two machines over a network.

    • A socket is a software abstraction that allows programs to send and receive data over a network.

    • It provides a mechanism for inter-process communication between applications running on different machines.

    • Sockets can be used for various network protocols such as TCP/IP, UDP, etc.

    • They are identified by an IP address and a port number.

    • Examples of...

  • Answered by AI
  • Q26. I was asked in detail the concept of type casting in C
  • Q27. Can I declare a structure called ‘a’ which contains a structure called ‘b’ and ‘b’ in turn contains ‘a’?
  • Ans. 

    Yes, it is possible to declare a structure 'a' that contains a structure 'b' and 'b' in turn contains 'a'.

    • To achieve this, we can use forward declaration of one of the structures.

    • By using a pointer or reference to the other structure inside the first structure, we can avoid recursive definition.

    • This allows us to create a nested structure hierarchy.

  • Answered by AI
  • Q28. How do I find the offset of a member of a structure object? How would I do the same if I am not allowed to create the object at all?
  • Ans. 

    To find the offset of a member of a structure object, use the 'offsetof' macro. If not allowed to create the object, use 'sizeof' and pointer arithmetic.

    • Use the 'offsetof' macro to find the offset of a member within a structure object

    • If not allowed to create the object, use 'sizeof' to get the size of the structure and perform pointer arithmetic

  • Answered by AI
  • Q29. I was asked to tell something about me that was not in my resume?
  • Q30. What are my strengths?
  • Q31. What do I know about Netapp?
  • Ans. 

    Netapp is a multinational storage and data management company.

    • Netapp specializes in providing storage solutions for businesses and organizations.

    • They offer a wide range of products and services including storage systems, software, and cloud services.

    • Netapp's solutions help organizations manage and protect their data, improve efficiency, and enable data-driven decision making.

    • They have a strong presence in the enterpris...

  • Answered by AI
  • Q32. What do I think about higher studies?
  • Q33. What is my family background? Do I have any siblings?
  • Ans. 

    I come from a close-knit family with two siblings, an older brother and a younger sister.

    • Close-knit family

    • Two siblings - older brother and younger sister

  • Answered by AI
  • Q34. My preferences regarding the various job profiles they had to offer?
  • Ans. 

    I am interested in job profiles that involve software development, problem-solving, and continuous learning.

    • I prefer job profiles that allow me to work on challenging projects and utilize my technical skills.

    • I am interested in roles that involve software development, coding, and debugging.

    • I enjoy problem-solving and would like a job that challenges me to think creatively and analytically.

    • I value continuous learning and

  • Answered by AI

Interview Preparation Tips

Skills:
College Name: NA

Skills evaluated in this interview

Contribute & help others!
anonymous
You can choose to be anonymous

Cohesity Interview FAQs

How many rounds are there in Cohesity Senior Customer Success Manager interview?
Cohesity interview process usually has 5 rounds. The most common rounds in the Cohesity interview process are HR, Technical and One-on-one Round.
What are the top questions asked in Cohesity Senior Customer Success Manager interview?

Some of the top questions asked at the Cohesity Senior Customer Success Manager interview -

  1. Data protection domian questions, Why CSM, some scenarios ...read more
  2. Managerial round. Mostly case based and team fit ch...read more
  3. with a country manager, mostly technical. SRE level questio...read more

Recently Viewed

JOBS

Browse jobs

Discover jobs you love

COMPANY BENEFITS

KNR Constructions

20 benefits

COMPANY BENEFITS

IRB Infrastructure

60 benefits

COMPANY BENEFITS

Dilip Buildcon

304 benefits

COMPANY BENEFITS

Dilip Buildcon

304 benefits

INTERVIEWS

CCTech

No Interviews

INTERVIEWS

OneBanc Technologies

No Interviews

INTERVIEWS

Cohesity

No Interviews

INTERVIEWS

CDM Smith

No Interviews

INTERVIEWS

CDM Smith

No Interviews

Tell us how to improve this page.

Cohesity Senior Customer Success Manager Interview Process

based on 1 interview

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

Oracle Interview Questions
3.7
 • 847 Interviews
Google Interview Questions
4.4
 • 825 Interviews
Amdocs Interview Questions
3.7
 • 514 Interviews
Adobe Interview Questions
3.9
 • 234 Interviews
Salesforce Interview Questions
4.0
 • 222 Interviews
24/7 Customer Interview Questions
3.5
 • 175 Interviews
Chetu Interview Questions
3.3
 • 172 Interviews
Dassault Systemes Interview Questions
4.0
 • 161 Interviews
View all

Cohesity Senior Customer Success Manager Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

3.0

Skill development

5.0

Work-life balance

4.0

Salary

4.0

Job security

2.0

Company culture

3.0

Promotions

4.0

Work satisfaction

Explore 1 Review and Rating
Software Engineer
432 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Software Engineer
289 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Technical Support Engineer
272 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Technical Support Engineer
139 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Principal Software Engineer
132 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Cohesity with

RUBRIK INDIA

3.6
Compare

Druva

3.7
Compare

Veeam Software

4.0
Compare

CommVault

3.9
Compare
Did you find this page helpful?
Yes No
write
Share an Interview