Add office photos
Premium Employer

Deloitte

3.8
based on 17.8k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

40+ Atlassian Interview Questions and Answers

Updated 22 Jan 2025
Popular Designations

Q1. How do you do reports, and how do you consolidate reports from different sources?

Ans.

I use a standardized format for reports and consolidate data using tools like Excel or Tableau.

  • I use a consistent format for all reports to ensure clarity and ease of understanding.

  • I gather data from various sources and use tools like Excel or Tableau to consolidate it.

  • I ensure that all data is accurate and up-to-date before consolidating it.

  • I create visualizations to help convey the data in a clear and concise manner.

  • I collaborate with team members to ensure that all necessa...read more

Add your answer

Q2. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?

Ans.

Establish a niche and focus on personalized service to differentiate from the larger company.

  • Identify a specific area of knowledge management where the larger company may not be as strong

  • Offer personalized service and tailored solutions to clients

  • Leverage technology to streamline processes and improve efficiency

  • Build a strong online presence through social media and content marketing

  • Partner with other smaller companies to offer a wider range of services

Add your answer

Q3. Are you open to new technology and business processes??

Ans.

Yes, I am open to new technology and business processes.

  • I believe that staying up-to-date with the latest technology and business processes is crucial for success in any industry.

  • I am always eager to learn and adapt to new tools and techniques that can improve efficiency and productivity.

  • For example, I recently completed a course on data analytics to enhance my skills in this area and stay current with industry trends.

  • I am also open to exploring new business processes that ca...read more

Add your answer

Q4. How do you provide residual risk ratings?

Ans.

Residual risk ratings are provided by assessing the likelihood and impact of potential risks after implementing controls.

  • Assess the likelihood and impact of potential risks

  • Identify and implement controls to mitigate risks

  • Reassess the likelihood and impact of risks after controls are in place

  • Assign a residual risk rating based on the remaining level of risk

  • Communicate the residual risk rating to stakeholders

Add your answer
Discover Atlassian interview dos and don'ts from real experiences

Q5. How would an organisation which is dealing with thousands of transactions daily implement iso27001

Ans.

An organisation dealing with thousands of transactions daily can implement ISO27001 by following a structured approach to information security management.

  • Conduct a thorough risk assessment to identify potential security threats and vulnerabilities in the organization's systems and processes.

  • Develop and implement information security policies and procedures based on the requirements of ISO27001 standards.

  • Provide regular training and awareness programs to educate employees abou...read more

Add your answer

Q6. Explain following vulnerabilities 1. IDOR 2. Types of XSS 3. SQLi

Ans.

IDOR is Insecure Direct Object Reference, XSS is Cross-Site Scripting, and SQLi is SQL Injection.

  • IDOR occurs when an application allows direct access to internal objects without proper authorization.

  • XSS refers to injecting malicious scripts into web pages viewed by other users, compromising their security.

  • SQLi is a technique where an attacker inserts malicious SQL code into a query, manipulating the database.

  • Example of IDOR: Accessing another user's private data by modifying ...read more

Add your answer
Are these interview questions helpful?

Q7. what is SMTP and what is the name space for that

Ans.

SMTP stands for Simple Mail Transfer Protocol, used for sending emails.

  • SMTP is a protocol used for sending emails over the internet

  • It works by using a series of commands between the email client and the email server

  • The namespace for SMTP is defined by RFC 5321

  • Examples of SMTP servers include Gmail's smtp.gmail.com and Outlook's smtp.live.com

Add your answer

Q8. How you control the USB access ( Device control in client environment)

Ans.

USB access in client environment can be controlled through device control policies and software solutions.

  • Implement device control policies to restrict unauthorized USB devices

  • Use endpoint security solutions to monitor and manage USB access

  • Educate employees on the risks of using unapproved USB devices

  • Regularly update security measures to adapt to new threats

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Find vulnerabilities in a simulated network and prepare a VAPT report.

Ans.

To find vulnerabilities in a simulated network and prepare a VAPT report.

  • Conduct a vulnerability assessment using tools like Nessus, OpenVAS, etc.

  • Identify vulnerabilities and their severity levels

  • Prepare a detailed report with recommendations for remediation

  • Include an executive summary for non-technical stakeholders

Add your answer

Q10. how do you deploy tags in Jenkins and UCD

Ans.

Tags can be deployed in Jenkins using the Git plugin and in UCD using the version control system integration.

  • In Jenkins, tags can be deployed by configuring the Git plugin to fetch tags from the repository.

  • In UCD, tags can be deployed by integrating with the version control system and selecting the specific tag to deploy.

  • Tags can be used to mark specific versions of code for deployment and tracking purposes.

Add your answer

Q11. how can you delete the duplicate values in a table

Ans.

Duplicate values in a table can be deleted by using the DELETE statement with a subquery.

  • Use the DELETE statement with a subquery to remove duplicate values.

  • Identify the duplicate values using a SELECT statement with GROUP BY and HAVING clauses.

  • Ensure to keep at least one unique record for each duplicate value.

Add your answer

Q12. How do you provide Security to your WEB API

Ans.

Securing a WEB API involves using authentication, authorization, encryption, and monitoring.

  • Implement authentication mechanisms such as OAuth, JWT, or API keys to verify the identity of clients accessing the API.

  • Use authorization to control access to different parts of the API based on roles and permissions.

  • Encrypt sensitive data transmitted between clients and the API using HTTPS or TLS.

  • Implement rate limiting, input validation, and monitoring to protect against attacks like...read more

Add your answer

Q13. difference between group by and having/ union and union all

Ans.

Group by is used to group rows that have the same values into summary rows, while having is used to filter groups based on a specified condition. Union combines the result sets of two or more SELECT statements, while Union All includes duplicates.

  • Group by is used with aggregate functions to group rows based on one or more columns.

  • Having is used to filter groups based on a specified condition after the group by operation.

  • Union combines the result sets of two or more SELECT sta...read more

Add your answer

Q14. Why WEB API is crucial over Web Services

Ans.

Web API allows for more flexibility, scalability, and ease of use compared to traditional web services.

  • Web API supports multiple data formats like JSON, XML, etc., making it easier to work with different clients.

  • Web API is more lightweight and faster compared to SOAP-based web services.

  • Web API allows for better security through the use of tokens and authentication mechanisms.

  • Web API is easier to integrate with modern web technologies like RESTful services and microservices ar...read more

Add your answer

Q15. What is difference between JSON and XML

Ans.

JSON is lightweight, easy to read, and primarily used for web APIs. XML is more verbose, structured, and commonly used for data storage and configuration.

  • JSON stands for JavaScript Object Notation, while XML stands for eXtensible Markup Language.

  • JSON is more lightweight and easier to read compared to XML.

  • JSON is commonly used for web APIs, while XML is often used for data storage and configuration files.

  • JSON uses key-value pairs, while XML uses tags and attributes to define d...read more

Add your answer

Q16. How an application Interact with API

Ans.

An application interacts with an API by sending requests and receiving responses containing data or actions.

  • The application sends a request to the API specifying the desired action or data

  • The API processes the request and sends back a response containing the requested information

  • The application then uses the data or performs the action based on the response received

  • Examples: a weather app fetching current weather data from a weather API, a social media app posting a new statu...read more

Add your answer

Q17. Diff b/w authorisation and authentication

Ans.

Authorization is the process of granting access to a resource, while authentication is the process of verifying the identity of a user.

  • Authorization determines what a user can do with a resource, while authentication verifies who the user is.

  • Authorization is based on permissions and roles, while authentication is based on credentials such as username and password.

  • Examples of authorization include granting access to a file or database, while examples of authentication include ...read more

Add your answer

Q18. What is risk management?

Ans.

Risk management is the process of identifying, assessing, and controlling potential risks that could affect an organization's objectives.

  • Identifying potential risks

  • Assessing the likelihood and impact of each risk

  • Developing strategies to control or mitigate risks

  • Monitoring and reviewing risk management processes

  • Examples include financial risk, operational risk, and reputational risk

Add your answer

Q19. mention few name spaces you have used in your code

Ans.

I have used namespaces such as std, boost, and Eigen in my code.

  • std

  • boost

  • Eigen

Add your answer

Q20. Page life cycle of ASP.NET and explanation

Ans.

ASP.NET page life cycle is a series of events that occur when a page is requested, processed, and rendered.

  • Page request is received by the server

  • Page is initialized, controls are created and properties are set

  • Page is loaded with data and events are handled

  • Page is rendered to HTML and sent to the client

  • Page is unloaded and resources are released

Add your answer

Q21. Query to select last 5 records in a table

Ans.

Use SQL query with ORDER BY and LIMIT to select last 5 records in a table

  • Use SELECT statement to retrieve data from the table

  • Use ORDER BY clause to sort the records in descending order based on a column

  • Use LIMIT clause to limit the number of records returned to 5

Add your answer

Q22. What is Authentication and Authorization

Ans.

Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.

  • Authentication confirms the identity of a user through credentials like passwords, biometrics, or security tokens.

  • Authorization controls access to resources based on the authenticated user's permissions.

  • Examples include logging into a website with a username and password (authentication) and then accessing specific features based on user roles (authorization...read more

Add your answer

Q23. have you ever worked on devops

Ans.

Yes, I have experience working on devops.

  • Implemented CI/CD pipelines using tools like Jenkins and GitLab

  • Automated infrastructure provisioning with tools like Terraform

  • Managed containerized applications with Docker and Kubernetes

Add your answer

Q24. Difference between stored proc and functions?

Ans.

Stored procedures are precompiled and stored in the database, while functions are compiled and executed at runtime.

  • Stored procedures are used to perform a set of operations and can return multiple values, while functions are used to compute a single value.

  • Stored procedures can contain DML and DDL statements, while functions can only contain DML statements.

  • Stored procedures can call functions, but functions cannot call stored procedures.

  • Stored procedures can be used to encapsu...read more

Add your answer

Q25. Difference between abstract class and interface?

Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructors, fields, and methods, while interface cannot have any implementation.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes are used to define a common behavior for subclasses, while interfaces are used to define a contract for classes to implement.

  • Example: Abstract class 'Animal' w...read more

Add your answer

Q26. What do you know about BCP/DR

Ans.

BCP/DR stands for Business Continuity Planning/Disaster Recovery. It involves creating strategies to ensure a company can continue operating during and after a disaster.

  • BCP focuses on preventing and minimizing the impact of disruptions to business operations.

  • DR focuses on restoring operations after a disaster has occurred.

  • Examples of BCP/DR strategies include data backup and recovery plans, emergency response procedures, and alternate work locations.

  • Regular testing and updati...read more

Add your answer

Q27. what is .Net Framework

Ans.

The .NET Framework is a software framework developed by Microsoft that provides a large library of pre-coded solutions to common programming problems.

  • Developed by Microsoft

  • Provides a large library of pre-coded solutions

  • Supports multiple programming languages like C#, VB.NET, F#

  • Used for building Windows applications, web applications, and services

Add your answer

Q28. What is Routing in MVC

Ans.

Routing in MVC is the process of mapping URLs to controller actions in order to handle incoming requests.

  • Routing determines which controller and action should handle a request based on the URL

  • Routes are defined in the RouteConfig.cs file in ASP.NET MVC applications

  • Routes can include parameters that are passed to the controller action

  • Routing can be used to create user-friendly URLs

Add your answer

Q29. How you approach the sprint planning

Ans.

I approach sprint planning by collaborating with the team to prioritize tasks, estimate effort, and create a realistic plan.

  • Collaborate with team members to understand their capacity and availability

  • Prioritize tasks based on business value and dependencies

  • Estimate effort for each task using techniques like story points or time-based estimates

  • Create a realistic plan considering team velocity and potential risks

  • Review and adjust the plan as needed during the sprint

Add your answer

Q30. Diff b/w encryption and hashing

Ans.

Encryption is reversible while hashing is irreversible.

  • Encryption is the process of converting plain text into cipher text using an algorithm and a key.

  • Hashing is the process of converting plain text into a fixed-length string of characters using a hash function.

  • Encryption can be decrypted using a key while hashing cannot be reversed.

  • Encryption is used to protect data while hashing is used to verify data integrity.

  • Examples of encryption include AES, RSA, and DES while example...read more

Add your answer

Q31. OOPS Concept and Encapsulation Example

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and only exposing the necessary functionalities.

  • It allows for better control over the data by preventing direct access from outside the class.

  • Example: A class 'Car' encapsulating variables like 'model', 'year', and methods like 'startEngine()', 'accelerate()'.

Add your answer

Q32. what is WEB API

Ans.

Web API is a set of rules and protocols that allow different software applications to communicate with each other over the internet.

  • Web API allows different software applications to interact with each other over the internet

  • It defines the methods and data formats that applications can use to request and exchange information

  • Examples include RESTful APIs like Twitter API, Google Maps API, etc.

Add your answer

Q33. What is MVC

Ans.

MVC stands for Model-View-Controller, a software design pattern used for organizing code in a structured way.

  • MVC separates the application into three main components: Model (data), View (UI), and Controller (logic).

  • Model represents the data and business logic, View displays the data to the user, and Controller handles user input and updates the Model.

  • MVC helps in achieving separation of concerns, making code more modular and easier to maintain.

  • Example: In a web application, t...read more

Add your answer

Q34. What is HTTP

Ans.

HTTP stands for Hypertext Transfer Protocol, a protocol used for transmitting data over the internet.

  • HTTP is the foundation of data communication on the World Wide Web.

  • It is a request-response protocol, where a client sends a request to a server and the server responds with the requested data.

  • HTTP uses TCP/IP as the underlying transport protocol.

  • Common HTTP methods include GET (retrieve data), POST (submit data), PUT (update data), and DELETE (remove data).

Add your answer

Q35. what is the Expected CTC

Ans.

The Expected CTC is negotiable based on the candidate's experience, skills, and the company's budget.

  • Expected CTC depends on the candidate's level of experience and expertise.

  • Negotiation skills can play a crucial role in determining the final CTC.

  • Researching industry standards and company budget can help in setting a realistic expectation.

  • Providing examples of past compensation packages can give a clearer picture of the candidate's expectations.

Add your answer

Q36. Practices to prevent SQLi

Ans.

Practices to prevent SQLi

  • Use parameterized queries or prepared statements

  • Implement input validation and sanitization

  • Apply least privilege principle for database access

  • Regularly update and patch database software

  • Implement a web application firewall (WAF)

  • Perform security testing and code reviews

Add your answer

Q37. what is provider in SSIS

Ans.

In SSIS, a provider is a software component that allows SSIS to connect to different types of data sources.

  • Providers are used to establish connections to databases, files, and other data sources in SSIS.

  • Examples of providers include OLE DB provider, ODBC provider, and ADO.NET provider.

  • Providers are selected in SSIS connection managers when setting up connections to data sources.

Add your answer

Q38. what is c#

Ans.

C# is a programming language developed by Microsoft for building a wide range of applications on the .NET framework.

  • Developed by Microsoft

  • Used for building applications on the .NET framework

  • Object-oriented language

  • Supports modern programming features like generics, LINQ, and async/await

  • Similar to Java and C++

Add your answer

Q39. Explain partial classes?

Ans.

Partial classes allow a class's members to be split into multiple files.

  • Partial classes are used in C# to split a class's definition into multiple files.

  • Each part of the partial class must use the 'partial' keyword.

  • All parts of the partial class must be in the same namespace and assembly.

  • Partial classes are commonly used in large projects to organize and manage code more effectively.

Add your answer

Q40. Explain solid principles?

Ans.

SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.

  • Single Responsibility Principle (SRP) - A class should have only one reason to change.

  • Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.

  • Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • Inter...read more

Add your answer

Q41. Filters in MVC

Ans.

Filters in MVC are used to perform logic before or after an action method is executed.

  • Filters can be used for authorization, logging, caching, error handling, etc.

  • They can be applied globally, at controller level, or at action level.

  • Examples include Authorize filter for authentication, OutputCache filter for caching.

  • Filters can be created by implementing specific filter interfaces or by inheriting from FilterAttribute class.

Add your answer

Q42. Architecture of API

Ans.

API architecture refers to the design and structure of the application programming interface.

  • API architecture defines how different components of the API interact with each other

  • It includes the endpoints, data formats, authentication methods, and communication protocols used

  • Well-designed API architecture ensures scalability, security, and ease of use

  • Examples of API architectures include REST, SOAP, and GraphQL

Add your answer

Q43. Explain about MITRE framework

Ans.

MITRE framework is a cybersecurity framework used to organize and prioritize cybersecurity risks.

  • MITRE framework provides a structured approach to identifying, assessing, and mitigating cybersecurity risks.

  • It includes a list of common attack techniques, tactics, and procedures used by threat actors.

  • MITRE framework helps organizations prioritize their cybersecurity efforts based on real-world threats.

  • It is widely used in the cybersecurity industry to improve overall security p...read more

Add your answer

Q44. Explain about OSI model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It helps in understanding how data is transferred between devices in a network.

  • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and interacts with adjacent layers for data communication.

  • For example, w...read more

Add your answer

Q45. Clause in sql , joins

Ans.

SQL clauses and joins are used to manipulate and combine data from multiple tables.

  • SQL clauses are used to filter, sort, and group data in a query.

  • Joins are used to combine data from multiple tables based on a common column.

  • Types of joins include inner join, left join, right join, and full outer join.

  • Joins can be used with clauses to further refine the data being retrieved.

Add your answer

Q46. Conatiners in SSIS

Ans.

Containers in SSIS are objects that allow you to group and manage tasks and workflows in a package.

  • Containers help organize and control the flow of tasks in SSIS packages.

  • Common types of containers include Sequence Container, For Loop Container, and Foreach Loop Container.

  • Containers can be nested within each other to create complex workflows.

  • They can be used to handle errors, transactions, and looping logic.

  • Example: Using a Sequence Container to group related tasks and set th...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Atlassian

based on 33 interviews
4 Interview rounds
Technical Round - 1
Technical Round - 2
Assignment Round
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Analyst Interview Questions from Similar Companies

3.7
 • 79 Interview Questions
3.8
 • 54 Interview Questions
3.3
 • 46 Interview Questions
3.7
 • 24 Interview Questions
4.0
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter