Filter interviews by
Action filters are attributes that can be applied to controller actions to modify the way they behave.
Action filters are used to perform tasks before or after an action method executes.
They can be used to modify the result of an action method.
Examples include authentication filters, caching filters, and exception filters.
Attribute handling refers to the management and manipulation of attributes in software development.
Attributes are characteristics or properties of an object or entity.
Attribute handling involves defining, accessing, modifying, and deleting attributes.
Attributes can be used to store data, control behavior, or provide metadata.
Examples of attribute handling include setting the color of a button, retrieving the size of a ...
Errors in MVC can be handled using try-catch blocks, custom error pages, and logging.
Use try-catch blocks to catch exceptions and handle them appropriately
Create custom error pages to display user-friendly error messages
Implement logging to track errors and debug issues
Use ModelState.IsValid to validate user input and prevent errors
Use global error handling filters to handle errors across the application
Server side validation is the process of validating user input on the server before processing it.
It ensures that the data received from the client is valid and secure.
It prevents malicious attacks and data breaches.
It reduces the load on the client-side and improves performance.
Examples include checking for required fields, data type, length, and format.
It is an essential part of web application security.
The code segment that starts jquery execution is $(document).ready(function(){...});
$() is a shorthand for jQuery() function
document refers to the HTML document object
ready() method waits for the document to be fully loaded
function(){} is the code block that executes when the document is ready
Serialization is the process of converting an object into a format that can be stored or transmitted.
Serialization is used to save the state of an object and recreate it later.
It is commonly used in network communication to transmit data between different systems.
Examples of serialization formats include JSON, XML, and binary formats like Protocol Buffers.
Serialization can also be used for caching and data persistence.
Web API is a set of protocols and tools for building software applications that communicate with each other through the internet.
Web API allows different software applications to communicate with each other over the internet.
It uses a set of protocols and tools to enable this communication.
Web API is commonly used in web development to allow web applications to interact with each other.
Examples of Web APIs include Goog
Media type formatters are used to serialize and deserialize data in Web API.
Media type formatters are responsible for converting data between CLR objects and their serialized representation.
They are used in Web API to format the response data based on the client's request.
Examples of media type formatters include JSON, XML, and BSON.
Developers can create custom media type formatters to support other data formats.
Selector method is used to select and manipulate elements in a web page using CSS selectors.
Selector method is a part of CSS (Cascading Style Sheets).
It is used to select and manipulate HTML elements based on their attributes, classes, and IDs.
Examples of selector methods include getElementById(), getElementsByClassName(), and querySelectorAll().
Application pool is a container for applications hosted on IIS.
It provides a separate process and memory space for each application.
It helps in isolating applications from each other.
It allows for better resource management and application availability.
It can be configured with different settings like .NET framework version, identity, etc.
Security settings in IIS are configurations that help protect web applications from unauthorized access and attacks.
IIS Manager allows for configuring security settings for websites and applications
Authentication settings can be configured to control access to resources
IP and domain restrictions can be set to allow or deny access to specific clients
SSL/TLS settings can be configured to encrypt traffic between clients a...
Use a Set to remove duplicate numbers from an array of strings.
Create a Set from the array to automatically remove duplicates
Convert the Set back to an array if needed
var, let, and const are used to declare variables in JavaScript with different scopes and mutability.
var is function-scoped and can be redeclared and updated
let is block-scoped and can be updated but not redeclared
const is block-scoped and cannot be updated or redeclared
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There were 2 interview rounds.
I applied via Naukri.com
Cybage interview questions for popular designations
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by mocking dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Routings in MVC define how the application responds to client requests.
Routings map URLs to controller actions in MVC framework
Routes are defined in RouteConfig.cs file in ASP.NET MVC
Routes can include parameters and constraints
Example: routes.MapRoute('Default', '{controller}/{action}/{id}', new { controller = 'Home', action = 'Index', id = UrlParameter.Optional })
Garbage collection is an automatic memory management process used in programming languages to reclaim memory occupied by objects that are no longer in use.
Garbage collection automatically identifies and deletes objects in memory that are no longer needed by the program.
It helps prevent memory leaks and improves the efficiency of memory usage.
Examples of programming languages that use garbage collection include Java, C#
Secure WEB API in .NET by using authentication, authorization, HTTPS, and input validation.
Use authentication mechanisms like JWT tokens or OAuth for secure access.
Implement authorization to control which users have access to specific resources.
Enable HTTPS to encrypt data transmitted between client and server.
Implement input validation to prevent injection attacks like SQL injection or cross-site scripting.
Stored procedures are precompiled SQL queries stored in the database, while functions are reusable blocks of code that return a value.
Stored procedures are used for performing specific tasks or operations in the database.
Functions are used to encapsulate logic and can be called from within SQL queries or other functions.
Stored procedures can have input and output parameters, while functions always return a value.
Stored...
Get interview-ready with Top Cybage Interview Questions
Inbound calls are received by the company from customers, while outbound calls are made by the company to customers.
Inbound calls are initiated by customers seeking assistance or information.
Outbound calls are initiated by the company for sales, marketing, or follow-up purposes.
Inbound calls are typically toll-free for customers, while outbound calls may incur charges.
Examples: Inbound call - Customer calling a technic...
Serverless refers to a cloud computing model where the cloud provider manages the infrastructure and automatically allocates resources as needed.
Serverless computing allows developers to focus on writing code without worrying about managing servers or infrastructure.
Resources are dynamically allocated and scaled based on demand, leading to cost efficiency.
Examples of serverless platforms include AWS Lambda, Azure Funct
Azure Functions is a serverless compute service that allows you to run event-triggered code without managing infrastructure.
Azure Functions allows you to write small pieces of code that run in response to events.
It supports multiple programming languages like C#, JavaScript, Python, etc.
Functions can be triggered by various events like HTTP requests, timers, queues, etc.
Azure Functions automatically scales based on dem...
Microservices are a software development technique where applications are composed of small, independent services that communicate with each other.
Microservices break down applications into smaller, loosely coupled services
Each service is responsible for a specific function and can be developed, deployed, and scaled independently
Communication between services is typically done through APIs
Examples of companies using mi
Microservices are smaller, independent services that work together, while Monolithic is a single, large application.
Microservices are smaller, independent services that can be developed, deployed, and scaled independently.
Monolithic architecture is a single, large application where all components are tightly coupled.
Microservices promote flexibility, scalability, and fault isolation.
Monolithic applications are easier t...
OOPs concept focuses on objects and classes, while MVC architecture separates the application into Model, View, and Controller components.
OOPs concept involves encapsulation, inheritance, polymorphism, and abstraction.
MVC architecture separates the application logic into Model (data), View (presentation), and Controller (interaction) components.
Example of OOPs concept: Creating a class 'Car' with properties like 'color...
Top trending discussions
Some of the top questions asked at the Cybage interview -
The duration of Cybage interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 144 interviews
Interview experience
based on 1.9k reviews
Rating in categories
Software Engineer
3.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
2k
salaries
| ₹0 L/yr - ₹0 L/yr |
QA Engineer
1.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior QA Engineer
757
salaries
| ₹0 L/yr - ₹0 L/yr |
System Analyst
740
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
Tech Mahindra