Crowe Horwath
10+ Shubham EPC Interview Questions and Answers
Q1. Is java an object oriented programming language?
Yes, Java is an object-oriented programming language.
Java supports all the features of OOP such as encapsulation, inheritance, and polymorphism.
Objects are created from classes in Java.
Example: class Car { String make; int year; } Car myCar = new Car();
Java also has interfaces which allow for abstraction and multiple inheritance.
Q2. Different between list and array
Lists are dynamic and can hold different data types, while arrays are fixed in size and can only hold one data type.
Lists can be resized during runtime, while arrays cannot.
Lists are implemented as classes in most programming languages, while arrays are primitive data types.
Lists can hold different data types, while arrays can only hold one data type.
Lists are more flexible and easier to work with, while arrays are faster and more efficient for certain operations.
Example: Pyt...read more
Q3. SQL injection attacks and it's mitigation
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate databases. Mitigation involves input validation, parameterized queries, and using ORM frameworks.
Input validation: Validate and sanitize user input to prevent malicious SQL code from being executed.
Parameterized queries: Use parameterized queries to separate SQL code from user input, reducing the risk of SQL injection attacks.
ORM frameworks: Use Object-Relational Mappi...read more
Q4. Web application security testing methodology
Web application security testing involves assessing the security of web applications to identify vulnerabilities and weaknesses.
Identify potential security risks and threats in the web application
Conduct vulnerability assessments and penetration testing
Review code for security flaws and vulnerabilities
Test authentication and authorization mechanisms
Utilize tools like OWASP ZAP, Burp Suite, and Nmap for testing
Q5. What is your Expected ctc
My expected CTC is negotiable based on the job responsibilities and market standards.
My expected CTC is based on my experience, skills, and the job requirements.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that aligns with my expertise in security consulting.
Q6. Owasp top 10 explain and it's mitigation
OWASP Top 10 is a list of the top 10 most critical web application security risks and their mitigation strategies.
Injection: Use parameterized queries to prevent SQL injection.
Broken Authentication: Implement strong password policies and multi-factor authentication.
Sensitive Data Exposure: Encrypt sensitive data both at rest and in transit.
XML External Entities (XXE): Disable external entity references in XML parsers.
Security Misconfiguration: Regularly update and patch softw...read more
Q7. Types of leases? Can a contract be verbal ? what are the five step approach of revenue recognition ?
Types of leases include finance and operating leases. Verbal contracts are valid but harder to enforce. The five step approach of revenue recognition includes identification, separation, transaction price, allocation, and recognition.
Types of leases: finance lease (capital lease) and operating lease
Verbal contracts are valid but harder to enforce compared to written contracts
Five step approach of revenue recognition: identification of the contract, separation of performance o...read more
Q8. Explain oops concepts
OOPs concepts are the fundamental principles of object-oriented programming.
Encapsulation: bundling of data and methods that operate on that data
Inheritance: ability of a class to inherit properties and characteristics from its parent class
Polymorphism: ability of objects to take on multiple forms or behaviors
Abstraction: hiding of complex implementation details and showing only the necessary information
Q9. What do you know about ERP
ERP stands for Enterprise Resource Planning, a software system that helps organizations manage and integrate their important business processes.
ERP software typically includes modules for finance, human resources, supply chain management, and customer relationship management.
It helps streamline processes, improve efficiency, and provide real-time data for decision-making.
Examples of popular ERP systems include SAP, Oracle, and Microsoft Dynamics.
ERP implementation often invol...read more
Q10. Risk of material misstatement procedure
Risk of material misstatement procedure is a process to identify and assess the risk of errors or fraud in financial statements.
The procedure involves understanding the entity and its environment, including internal controls.
It also includes assessing the risks of material misstatement due to fraud or error.
The auditor then designs and performs audit procedures to address the identified risks.
Examples of procedures include testing of controls, substantive procedures, and anal...read more
Q11. What is ERP consulting
ERP consulting involves providing expertise and guidance on implementing and optimizing ERP systems for businesses.
Helping businesses select the right ERP system for their needs
Assisting with the implementation and customization of the ERP system
Providing training to employees on how to use the ERP system effectively
Offering ongoing support and maintenance for the ERP system
Analyzing business processes to identify areas for improvement through ERP utilization
Q12. Reverse an array?
To reverse an array of strings, iterate through the array and swap elements from start to end.
Iterate through the array using two pointers, one starting from the beginning and the other from the end.
Swap elements at the two pointers until they meet in the middle.
Repeat until all elements are swapped and the array is reversed.
Top HR Questions asked in Shubham EPC
Interview Process at Shubham EPC
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month