Upload Button Icon Add office photos

CommVault

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

CommVault Sdet Engineer Interview Questions and Answers

Updated 5 Sep 2024

CommVault Sdet Engineer Interview Experiences

2 interviews found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

90 ques all basics of engineering

Round 2 - Coding Test 

3 questions but in python only .. very slow Compiler

Sdet Engineer Interview Questions & Answers

user image Anonymous

posted on 25 Feb 2024

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed before Feb 2023. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. In first round you will be asked about the projects and then followed by a debugging round where you have to find out the bugs in the given program
  • Q2. Given a program and its expected functionality asked to find the bugs in that program
Round 2 - Coding Test 

You will be given a coding problem and 1 hour of time to solve it end to end

Round 3 - HR 

(2 Questions)

  • Q1. Basic hr questions
  • Q2. Where do you see yourself in 5 years

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare dsa, and core cs subjects

Sdet Engineer Interview Questions Asked at Other Companies

asked in Nykaa
Q1. Tell me about the projects and knowledge on selenium api and etc?
asked in Witty Com
Q2. In this example, the internal data structure (std::vector) can be ... read more
asked in Info Edge
Q3. What do you mean by run time polymorphism and how is it achieved?
Q4. What reusable methods have been designed by you and their impact
asked in Info Edge
Q5. Explain each oops concept with clarity and write a class where yo ... read more

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Logical questions were asked

Round 2 - Coding Test 

Optimal solution expected

Interview Preparation Tips

Interview preparation tips for other job seekers - Learn to think in multiple ways

I applied via Walk-in and was interviewed before Jan 2021. There were 4 interview rounds.

Interview Questionnaire 

3 Questions

  • Q1. Basic oops question, sql question
  • Q2. Basic and advance php question
  • Q3. Some logical question( puzzle)

Interview Preparation Tips

Interview preparation tips for other job seekers - Clear your basic concepts of php before attending interview

Interview Questionnaire 

1 Question

  • Q1. Strings, arrays, dp

I applied via Referral

Interview Questionnaire 

34 Questions

  • Q1. Give a few technical differences between Windows and UNIX
  • Ans. 

    Windows and UNIX have several technical differences.

    • Windows has a graphical user interface (GUI) while UNIX is primarily command-line based.

    • Windows uses the NTFS file system while UNIX typically uses the ext4 file system.

    • Windows supports a wide range of software applications, while UNIX is known for its stability and security.

    • Windows has a larger user base and is more commonly used for personal computers, while UNIX is...

  • Answered by AI
  • Q2. Give a few differences between NTFS and FAT
  • Ans. 

    NTFS and FAT are file systems used in Windows operating systems with differences in features and capabilities.

    • NTFS supports file and folder permissions, while FAT does not.

    • NTFS has built-in support for file compression and encryption, while FAT does not.

    • NTFS has a journaling feature that helps in recovering from system crashes, while FAT does not.

    • NTFS supports larger file sizes and partition sizes compared to FAT.

    • NTFS ...

  • Answered by AI
  • Q3. Mention the layers in OSI stack
  • Ans. 

    The OSI stack consists of 7 layers that define the functions and protocols of network communication.

    • Physical layer: Deals with the physical transmission of data.

    • Data Link layer: Provides error-free transmission over a physical link.

    • Network layer: Handles routing and logical addressing.

    • Transport layer: Ensures reliable data delivery and manages end-to-end connections.

    • Session layer: Establishes, manages, and terminates s...

  • Answered by AI
  • Q4. Explain in detail the concept of NAT and DHCP
  • Ans. 

    NAT (Network Address Translation) is a technique used to translate private IP addresses to public IP addresses, allowing devices on a private network to communicate with the internet. DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration parameters to devices on a network.

    • NAT allows multiple devices on a private network to share a single...

  • Answered by AI
  • Q5. What is the difference between hub, switch, and router?
  • Ans. 

    A hub is a simple networking device that connects multiple devices in a network. A switch is a more advanced device that filters and forwards data packets. A router is a device that connects multiple networks and directs data packets between them.

    • A hub operates at the physical layer of the OSI model, while a switch operates at the data link layer.

    • A hub broadcasts data to all connected devices, while a switch selectivel...

  • Answered by AI
  • Q6. What is collision domain? How does bridge segregate collision domains?
  • Ans. 

    Collision domain is a network segment where collisions can occur. Bridges segregate collision domains by creating separate segments.

    • Collision domain is a section of a network where network devices share the same bandwidth and can collide with each other.

    • Collisions occur when two or more devices transmit data simultaneously on a shared medium.

    • Bridges create separate collision domains by dividing a network into multiple ...

  • Answered by AI
  • Q7. Given a routine which sorts only positive numbers, write a wrapper around it to sort both positive and negative numbers
  • Q8. Suggest a suitable combination of array and hashmap to design the underlying data structures behind an educational institution’s website. The website supports selection of a particular department, a part...
  • Ans. 

    A combination of array and hashmap can be used to design the underlying data structures for an educational institution's website.

    • Use an array to store the departments available in the institution.

    • Each department can be represented as a key in the hashmap.

    • The value corresponding to each department key in the hashmap can be another hashmap.

    • This nested hashmap can store the courses available in the department.

    • The courses ...

  • Answered by AI
  • Q9. Give the design considerations for a client server system wherein the client gets a virtual operating system on the fly through the network from a server consisting of several such operating systems
  • Ans. 

    Design considerations for a client-server system with virtual operating systems on the fly

    • Scalability: Ensure the system can handle multiple clients requesting virtual operating systems simultaneously

    • Resource allocation: Manage resources efficiently to provide virtual operating systems to clients

    • Network bandwidth: Optimize network usage to deliver virtual operating systems quickly

    • Security: Implement measures to protect...

  • Answered by AI
  • Q10. What are the different types of virtualization?. I was asked to differentiate between system and process virtualization
  • Q11. Explain VMware’s virtualization on a multicore machine
  • Ans. 

    VMware's virtualization on a multicore machine allows for efficient utilization of resources and improved performance.

    • VMware's virtualization technology enables the creation of multiple virtual machines (VMs) on a single multicore machine.

    • Each VM can run its own operating system and applications, isolated from other VMs.

    • The hypervisor, such as VMware ESXi, manages the allocation of CPU, memory, and other resources to e...

  • Answered by AI
  • Q12. Pack 51 apples in minimum number of packets such that with the packets I have made, I should be able to give any number of apples between 1 and 51
  • Ans. 

    The minimum number of packets required to pack 51 apples such that any number of apples between 1 and 51 can be given.

    • The minimum number of packets required is 6.

    • Each packet should contain a power of 2 number of apples.

    • The packets should be of sizes: 1, 2, 4, 8, 16, and 20.

    • By combining these packets, any number of apples between 1 and 51 can be given.

  • Answered by AI
  • Q13. Write a program to implement strstr
  • Ans. 

    Program to implement strstr function in C++

    • Use two nested loops to compare each character of the haystack and needle

    • If a match is found, return the starting index of the substring

    • If no match is found, return -1

  • Answered by AI
  • Q14. From an incoming stream of numbers, construct a binary tree such that it is almost balanced
  • Ans. 

    To construct an almost balanced binary tree from an incoming stream of numbers.

    • Use a self-balancing binary search tree like AVL or Red-Black tree.

    • Insert the numbers from the stream into the tree.

    • Perform rotations or rebalancing operations as necessary to maintain balance.

    • Consider using a priority queue to handle the incoming stream efficiently.

  • Answered by AI
  • Q15. How would I implement the autocomplete feature for search queries?
  • Ans. 

    Implementing autocomplete feature for search queries

    • Use a trie data structure to store the search queries

    • As the user types, traverse the trie to find matching prefixes

    • Return the suggestions based on the matching prefixes

    • Consider using a ranking algorithm to prioritize suggestions

  • Answered by AI
  • Q16. What is a semaphore?
  • Ans. 

    A semaphore is a synchronization object that controls access to a shared resource through the use of a counter.

    • Semaphores can be used to limit the number of threads accessing a resource simultaneously.

    • They can be used to solve the critical section problem in concurrent programming.

    • Semaphores can have two types: counting semaphores and binary semaphores.

    • Counting semaphores allow a specified number of threads to access a...

  • Answered by AI
  • Q17. Code the P and V operations of a semaphore
  • Ans. 

    The P and V operations are used to control access to a shared resource using a semaphore.

    • P operation (wait operation) decreases the value of the semaphore by 1, blocking if the value is already 0.

    • V operation (signal operation) increases the value of the semaphore by 1, releasing a waiting process if any.

    • P and V operations are typically used in synchronization mechanisms to prevent race conditions and ensure mutual excl...

  • Answered by AI
  • Q18. Explain REST web service
  • Ans. 

    REST web service is an architectural style for designing networked applications that use HTTP as the communication protocol.

    • REST stands for Representational State Transfer

    • It is based on a client-server model

    • It uses standard HTTP methods like GET, POST, PUT, DELETE

    • Resources are identified by URIs

    • Responses are typically in JSON or XML format

  • Answered by AI
  • Q19. Is HTTP a stateless or stateful protocol?
  • Ans. 

    HTTP is a stateless protocol.

    • HTTP is stateless because it does not retain any information about previous requests or responses.

    • Each request is treated as an independent transaction, and the server does not maintain any knowledge of the client's state.

    • To maintain state, cookies or session management techniques can be used.

    • Statelessness allows for scalability and simplicity in web applications.

  • Answered by AI
  • Q20. What is shared memory?
  • Ans. 

    Shared memory is a memory space that can be accessed by multiple processes or threads simultaneously.

    • Shared memory allows processes or threads to communicate and share data efficiently.

    • It is typically used in inter-process communication (IPC) to avoid the overhead of copying data between processes.

    • Shared memory can be implemented using operating system mechanisms like memory-mapped files or system calls.

    • Example: Multip...

  • Answered by AI
  • Q21. What motivates me in life?
  • Q22. Explain the alignment issues in structures
  • Ans. 

    Alignment issues in structures occur due to memory padding and alignment requirements.

    • Structures may have unused memory space due to alignment requirements.

    • Padding is added to align structure members on memory boundaries.

    • Alignment issues can lead to wasted memory and decreased performance.

    • Compiler directives like #pragma pack can be used to control alignment.

    • Example: struct MyStruct { char a; int b; char c; };

  • Answered by AI
  • Q23. I am given two files viz. f1.c, f2.c, both having a call to malloc(). Can the address of the locations returned by these two be same?
  • Q24. Explain memory management unit
  • Ans. 

    Memory Management Unit (MMU) is a hardware component that manages memory access and translation between virtual and physical addresses.

    • MMU is responsible for translating virtual addresses used by programs into physical addresses in the computer's memory.

    • It provides memory protection by assigning access permissions to different memory regions.

    • MMU also handles memory allocation and deallocation, ensuring efficient use of...

  • Answered by AI
  • Q25. What is a socket?
  • Ans. 

    A socket is an endpoint for communication between two machines over a network.

    • A socket is a software abstraction that allows programs to send and receive data over a network.

    • It provides a mechanism for inter-process communication between applications running on different machines.

    • Sockets can be used for various network protocols such as TCP/IP, UDP, etc.

    • They are identified by an IP address and a port number.

    • Examples of...

  • Answered by AI
  • Q26. I was asked in detail the concept of type casting in C
  • Q27. Can I declare a structure called ‘a’ which contains a structure called ‘b’ and ‘b’ in turn contains ‘a’?
  • Ans. 

    Yes, it is possible to declare a structure 'a' that contains a structure 'b' and 'b' in turn contains 'a'.

    • To achieve this, we can use forward declaration of one of the structures.

    • By using a pointer or reference to the other structure inside the first structure, we can avoid recursive definition.

    • This allows us to create a nested structure hierarchy.

  • Answered by AI
  • Q28. How do I find the offset of a member of a structure object? How would I do the same if I am not allowed to create the object at all?
  • Ans. 

    To find the offset of a member of a structure object, use the 'offsetof' macro. If not allowed to create the object, use 'sizeof' and pointer arithmetic.

    • Use the 'offsetof' macro to find the offset of a member within a structure object

    • If not allowed to create the object, use 'sizeof' to get the size of the structure and perform pointer arithmetic

  • Answered by AI
  • Q29. I was asked to tell something about me that was not in my resume?
  • Q30. What are my strengths?
  • Q31. What do I know about Netapp?
  • Ans. 

    Netapp is a multinational storage and data management company.

    • Netapp specializes in providing storage solutions for businesses and organizations.

    • They offer a wide range of products and services including storage systems, software, and cloud services.

    • Netapp's solutions help organizations manage and protect their data, improve efficiency, and enable data-driven decision making.

    • They have a strong presence in the enterpris...

  • Answered by AI
  • Q32. What do I think about higher studies?
  • Q33. What is my family background? Do I have any siblings?
  • Ans. 

    I come from a close-knit family with two siblings, an older brother and a younger sister.

    • Close-knit family

    • Two siblings - older brother and younger sister

  • Answered by AI
  • Q34. My preferences regarding the various job profiles they had to offer?
  • Ans. 

    I am interested in job profiles that involve software development, problem-solving, and continuous learning.

    • I prefer job profiles that allow me to work on challenging projects and utilize my technical skills.

    • I am interested in roles that involve software development, coding, and debugging.

    • I enjoy problem-solving and would like a job that challenges me to think creatively and analytically.

    • I value continuous learning and

  • Answered by AI

Interview Preparation Tips

Skills:
College Name: NA

Skills evaluated in this interview

Interview Questionnaire 

1 Question

  • Q1. Php oops concepts are their primary focus

I was interviewed in Dec 2016.

Interview Questionnaire 

7 Questions

  • Q1. Questions on linked list
  • Q2. Implement LRU
  • Ans. 

    LRU (Least Recently Used) is a caching algorithm that removes the least recently used item when the cache is full.

    • LRU uses a combination of a doubly linked list and a hash map.

    • The doubly linked list keeps track of the order of recently used items.

    • The hash map allows for efficient lookup of items in the cache.

    • When a new item is accessed, it is moved to the front of the list.

    • If the cache is full, the item at the end of t

  • Answered by AI
  • Q3. Questions on C, c++
  • Q4. Questions on DBMS
  • Q5. Questions on Operating Systems
  • Q6. Tell all things that happen inside a system when we press 'k' on the notepad.
  • Ans. 

    Pressing 'k' on Notepad triggers a series of events including key press event, character insertion, and potential text manipulation.

    • When 'k' is pressed, a key press event is triggered

    • The key press event is captured by the Notepad application

    • The character 'k' is inserted at the current cursor position

    • If any text is selected, it may be replaced by the character 'k'

    • The cursor position is updated to the next position

    • If aut

  • Answered by AI
  • Q7. Basic HR questions

Interview Preparation Tips

Round: Technical Interview
Tips: Prepare Data Structure and Algorithms well

Round: Technical Interview
Tips: Have decent knowledge of technical subjects.

Skills: Programming, Data Structures, Algorithm, Operating System Basics, Knowledge About Database Managements Systems
College Name: IIT Roorkee

Skills evaluated in this interview

Software Engineer Interview Questions & Answers

Druva user image Sohom Bhattacharjee

posted on 2 Oct 2024

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
Selected Selected
Round 1 - screening 

(2 Questions)

  • Q1. Details about career goals
  • Q2. Details about expectations (in terms of role)
Round 2 - Coding Test 

DSA and lagorithmic optimizations (this is based on team you are joining so questions vary a LOT)

Round 3 - HR 

(1 Question)

  • Q1. Salary expectation
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Sep 2022. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Coding Test 

Medium level leetcode questions and some apti very rare but.

Round 3 - Technical 

(3 Questions)

  • Q1. Good practice of ds algo and os
  • Ans. 

    Good practice of data structures, algorithms, and operating systems is essential for software engineers.

    • Regularly practice coding challenges to improve problem-solving skills

    • Understand the time and space complexity of algorithms

    • Learn about different data structures and when to use them

    • Familiarize yourself with operating system concepts like processes, threads, and memory management

  • Answered by AI
  • Q2. Is given tree bst or not?
  • Q3. Check whether cycle in linked list.
  • Ans. 

    Check for cycle in a linked list by using two pointers approach.

    • Use two pointers, one moving at double the speed of the other.

    • If there is a cycle, the two pointers will eventually meet.

    • Alternatively, use a hash set to keep track of visited nodes.

  • Answered by AI

Skills evaluated in this interview

Contribute & help others!
anonymous
You can choose to be anonymous

CommVault Interview FAQs

How many rounds are there in CommVault Sdet Engineer interview?
CommVault interview process usually has 2-3 rounds. The most common rounds in the CommVault interview process are Coding Test, HR and Aptitude Test.
What are the top questions asked in CommVault Sdet Engineer interview?

Some of the top questions asked at the CommVault Sdet Engineer interview -

  1. in first round you will be asked about the projects and then followed by a debu...read more
  2. given a program and its expected functionality asked to find the bugs in that p...read more

Recently Viewed

SALARIES

FieldAssist

INTERVIEWS

CommVault

10 top interview questions

DESIGNATION

SALARIES

NLC India Limited

INTERVIEWS

NLC India Limited

No Interviews

SALARIES

Unified Mentor

INTERVIEWS

NLC India Limited

No Interviews

INTERVIEWS

Unified Mentor

No Interviews

SALARIES

Unified Mentor

INTERVIEWS

NLC India Limited

No Interviews

Tell us how to improve this page.

CommVault Sdet Engineer Interview Process

based on 2 interviews

Interview experience

5
  
Excellent
View more

Interview Questions from Similar Companies

Zoho Interview Questions
4.3
 • 505 Interviews
NetApp Interview Questions
3.9
 • 64 Interviews
Veritas Interview Questions
4.0
 • 63 Interviews
Mobileum Interview Questions
3.3
 • 37 Interviews
Entrata Interview Questions
4.4
 • 34 Interviews
Druva Interview Questions
3.7
 • 25 Interviews
Twilio Interview Questions
3.9
 • 23 Interviews
View all

CommVault Sdet Engineer Reviews and Ratings

based on 1 review

4.0/5

Rating in categories

3.0

Skill development

4.0

Work-life balance

4.0

Salary

4.0

Job security

4.0

Company culture

3.0

Promotions

3.0

Work satisfaction

Explore 1 Review and Rating
Technical Specialist
67 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Software Engineer
48 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Engineer
36 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Engineer
25 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Software Engineer
21 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare CommVault with

Veeam Software

4.0
Compare

NetApp

3.9
Compare

Druva

3.7
Compare

RUBRIK INDIA

3.6
Compare
Did you find this page helpful?
Yes No
write
Share an Interview