Deloitte
40+ Atlassian Interview Questions and Answers
Q1. How do you do reports, and how do you consolidate reports from different sources?
I use a standardized format for reports and consolidate data using tools like Excel or Tableau.
I use a consistent format for all reports to ensure clarity and ease of understanding.
I gather data from various sources and use tools like Excel or Tableau to consolidate it.
I ensure that all data is accurate and up-to-date before consolidating it.
I create visualizations to help convey the data in a clear and concise manner.
I collaborate with team members to ensure that all necessa...read more
Q2. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?
Establish a niche and focus on personalized service to differentiate from the larger company.
Identify a specific area of knowledge management where the larger company may not be as strong
Offer personalized service and tailored solutions to clients
Leverage technology to streamline processes and improve efficiency
Build a strong online presence through social media and content marketing
Partner with other smaller companies to offer a wider range of services
Q3. Are you open to new technology and business processes??
Yes, I am open to new technology and business processes.
I believe that staying up-to-date with the latest technology and business processes is crucial for success in any industry.
I am always eager to learn and adapt to new tools and techniques that can improve efficiency and productivity.
For example, I recently completed a course on data analytics to enhance my skills in this area and stay current with industry trends.
I am also open to exploring new business processes that ca...read more
Q4. How do you provide residual risk ratings?
Residual risk ratings are provided by assessing the likelihood and impact of potential risks after implementing controls.
Assess the likelihood and impact of potential risks
Identify and implement controls to mitigate risks
Reassess the likelihood and impact of risks after controls are in place
Assign a residual risk rating based on the remaining level of risk
Communicate the residual risk rating to stakeholders
Q5. How would an organisation which is dealing with thousands of transactions daily implement iso27001
An organisation dealing with thousands of transactions daily can implement ISO27001 by following a structured approach to information security management.
Conduct a thorough risk assessment to identify potential security threats and vulnerabilities in the organization's systems and processes.
Develop and implement information security policies and procedures based on the requirements of ISO27001 standards.
Provide regular training and awareness programs to educate employees abou...read more
Q6. Explain following vulnerabilities 1. IDOR 2. Types of XSS 3. SQLi
IDOR is Insecure Direct Object Reference, XSS is Cross-Site Scripting, and SQLi is SQL Injection.
IDOR occurs when an application allows direct access to internal objects without proper authorization.
XSS refers to injecting malicious scripts into web pages viewed by other users, compromising their security.
SQLi is a technique where an attacker inserts malicious SQL code into a query, manipulating the database.
Example of IDOR: Accessing another user's private data by modifying ...read more
Q7. what is SMTP and what is the name space for that
SMTP stands for Simple Mail Transfer Protocol, used for sending emails.
SMTP is a protocol used for sending emails over the internet
It works by using a series of commands between the email client and the email server
The namespace for SMTP is defined by RFC 5321
Examples of SMTP servers include Gmail's smtp.gmail.com and Outlook's smtp.live.com
Q8. How you control the USB access ( Device control in client environment)
USB access in client environment can be controlled through device control policies and software solutions.
Implement device control policies to restrict unauthorized USB devices
Use endpoint security solutions to monitor and manage USB access
Educate employees on the risks of using unapproved USB devices
Regularly update security measures to adapt to new threats
Q9. Find vulnerabilities in a simulated network and prepare a VAPT report.
To find vulnerabilities in a simulated network and prepare a VAPT report.
Conduct a vulnerability assessment using tools like Nessus, OpenVAS, etc.
Identify vulnerabilities and their severity levels
Prepare a detailed report with recommendations for remediation
Include an executive summary for non-technical stakeholders
Q10. how do you deploy tags in Jenkins and UCD
Tags can be deployed in Jenkins using the Git plugin and in UCD using the version control system integration.
In Jenkins, tags can be deployed by configuring the Git plugin to fetch tags from the repository.
In UCD, tags can be deployed by integrating with the version control system and selecting the specific tag to deploy.
Tags can be used to mark specific versions of code for deployment and tracking purposes.
Q11. how can you delete the duplicate values in a table
Duplicate values in a table can be deleted by using the DELETE statement with a subquery.
Use the DELETE statement with a subquery to remove duplicate values.
Identify the duplicate values using a SELECT statement with GROUP BY and HAVING clauses.
Ensure to keep at least one unique record for each duplicate value.
Q12. How do you provide Security to your WEB API
Securing a WEB API involves using authentication, authorization, encryption, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys to verify the identity of clients accessing the API.
Use authorization to control access to different parts of the API based on roles and permissions.
Encrypt sensitive data transmitted between clients and the API using HTTPS or TLS.
Implement rate limiting, input validation, and monitoring to protect against attacks like...read more
Q13. difference between group by and having/ union and union all
Group by is used to group rows that have the same values into summary rows, while having is used to filter groups based on a specified condition. Union combines the result sets of two or more SELECT statements, while Union All includes duplicates.
Group by is used with aggregate functions to group rows based on one or more columns.
Having is used to filter groups based on a specified condition after the group by operation.
Union combines the result sets of two or more SELECT sta...read more
Q14. Why WEB API is crucial over Web Services
Web API allows for more flexibility, scalability, and ease of use compared to traditional web services.
Web API supports multiple data formats like JSON, XML, etc., making it easier to work with different clients.
Web API is more lightweight and faster compared to SOAP-based web services.
Web API allows for better security through the use of tokens and authentication mechanisms.
Web API is easier to integrate with modern web technologies like RESTful services and microservices ar...read more
Q15. What is difference between JSON and XML
JSON is lightweight, easy to read, and primarily used for web APIs. XML is more verbose, structured, and commonly used for data storage and configuration.
JSON stands for JavaScript Object Notation, while XML stands for eXtensible Markup Language.
JSON is more lightweight and easier to read compared to XML.
JSON is commonly used for web APIs, while XML is often used for data storage and configuration files.
JSON uses key-value pairs, while XML uses tags and attributes to define d...read more
Q16. How an application Interact with API
An application interacts with an API by sending requests and receiving responses containing data or actions.
The application sends a request to the API specifying the desired action or data
The API processes the request and sends back a response containing the requested information
The application then uses the data or performs the action based on the response received
Examples: a weather app fetching current weather data from a weather API, a social media app posting a new statu...read more
Q17. Diff b/w authorisation and authentication
Authorization is the process of granting access to a resource, while authentication is the process of verifying the identity of a user.
Authorization determines what a user can do with a resource, while authentication verifies who the user is.
Authorization is based on permissions and roles, while authentication is based on credentials such as username and password.
Examples of authorization include granting access to a file or database, while examples of authentication include ...read more
Q18. What is risk management?
Risk management is the process of identifying, assessing, and controlling potential risks that could affect an organization's objectives.
Identifying potential risks
Assessing the likelihood and impact of each risk
Developing strategies to control or mitigate risks
Monitoring and reviewing risk management processes
Examples include financial risk, operational risk, and reputational risk
Q19. mention few name spaces you have used in your code
I have used namespaces such as std, boost, and Eigen in my code.
std
boost
Eigen
Q20. Page life cycle of ASP.NET and explanation
ASP.NET page life cycle is a series of events that occur when a page is requested, processed, and rendered.
Page request is received by the server
Page is initialized, controls are created and properties are set
Page is loaded with data and events are handled
Page is rendered to HTML and sent to the client
Page is unloaded and resources are released
Q21. Query to select last 5 records in a table
Use SQL query with ORDER BY and LIMIT to select last 5 records in a table
Use SELECT statement to retrieve data from the table
Use ORDER BY clause to sort the records in descending order based on a column
Use LIMIT clause to limit the number of records returned to 5
Q22. What is Authentication and Authorization
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the identity of a user through credentials like passwords, biometrics, or security tokens.
Authorization controls access to resources based on the authenticated user's permissions.
Examples include logging into a website with a username and password (authentication) and then accessing specific features based on user roles (authorization...read more
Q23. have you ever worked on devops
Yes, I have experience working on devops.
Implemented CI/CD pipelines using tools like Jenkins and GitLab
Automated infrastructure provisioning with tools like Terraform
Managed containerized applications with Docker and Kubernetes
Q24. Difference between stored proc and functions?
Stored procedures are precompiled and stored in the database, while functions are compiled and executed at runtime.
Stored procedures are used to perform a set of operations and can return multiple values, while functions are used to compute a single value.
Stored procedures can contain DML and DDL statements, while functions can only contain DML statements.
Stored procedures can call functions, but functions cannot call stored procedures.
Stored procedures can be used to encapsu...read more
Q25. Difference between abstract class and interface?
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructors, fields, and methods, while interface cannot have any implementation.
A class can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes are used to define a common behavior for subclasses, while interfaces are used to define a contract for classes to implement.
Example: Abstract class 'Animal' w...read more
Q26. What do you know about BCP/DR
BCP/DR stands for Business Continuity Planning/Disaster Recovery. It involves creating strategies to ensure a company can continue operating during and after a disaster.
BCP focuses on preventing and minimizing the impact of disruptions to business operations.
DR focuses on restoring operations after a disaster has occurred.
Examples of BCP/DR strategies include data backup and recovery plans, emergency response procedures, and alternate work locations.
Regular testing and updati...read more
Q27. what is .Net Framework
The .NET Framework is a software framework developed by Microsoft that provides a large library of pre-coded solutions to common programming problems.
Developed by Microsoft
Provides a large library of pre-coded solutions
Supports multiple programming languages like C#, VB.NET, F#
Used for building Windows applications, web applications, and services
Q28. What is Routing in MVC
Routing in MVC is the process of mapping URLs to controller actions in order to handle incoming requests.
Routing determines which controller and action should handle a request based on the URL
Routes are defined in the RouteConfig.cs file in ASP.NET MVC applications
Routes can include parameters that are passed to the controller action
Routing can be used to create user-friendly URLs
Q29. How you approach the sprint planning
I approach sprint planning by collaborating with the team to prioritize tasks, estimate effort, and create a realistic plan.
Collaborate with team members to understand their capacity and availability
Prioritize tasks based on business value and dependencies
Estimate effort for each task using techniques like story points or time-based estimates
Create a realistic plan considering team velocity and potential risks
Review and adjust the plan as needed during the sprint
Q30. Diff b/w encryption and hashing
Encryption is reversible while hashing is irreversible.
Encryption is the process of converting plain text into cipher text using an algorithm and a key.
Hashing is the process of converting plain text into a fixed-length string of characters using a hash function.
Encryption can be decrypted using a key while hashing cannot be reversed.
Encryption is used to protect data while hashing is used to verify data integrity.
Examples of encryption include AES, RSA, and DES while example...read more
Q31. OOPS Concept and Encapsulation Example
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and only exposing the necessary functionalities.
It allows for better control over the data by preventing direct access from outside the class.
Example: A class 'Car' encapsulating variables like 'model', 'year', and methods like 'startEngine()', 'accelerate()'.
Q32. what is WEB API
Web API is a set of rules and protocols that allow different software applications to communicate with each other over the internet.
Web API allows different software applications to interact with each other over the internet
It defines the methods and data formats that applications can use to request and exchange information
Examples include RESTful APIs like Twitter API, Google Maps API, etc.
Q33. What is MVC
MVC stands for Model-View-Controller, a software design pattern used for organizing code in a structured way.
MVC separates the application into three main components: Model (data), View (UI), and Controller (logic).
Model represents the data and business logic, View displays the data to the user, and Controller handles user input and updates the Model.
MVC helps in achieving separation of concerns, making code more modular and easier to maintain.
Example: In a web application, t...read more
Q34. What is HTTP
HTTP stands for Hypertext Transfer Protocol, a protocol used for transmitting data over the internet.
HTTP is the foundation of data communication on the World Wide Web.
It is a request-response protocol, where a client sends a request to a server and the server responds with the requested data.
HTTP uses TCP/IP as the underlying transport protocol.
Common HTTP methods include GET (retrieve data), POST (submit data), PUT (update data), and DELETE (remove data).
Q35. what is the Expected CTC
The Expected CTC is negotiable based on the candidate's experience, skills, and the company's budget.
Expected CTC depends on the candidate's level of experience and expertise.
Negotiation skills can play a crucial role in determining the final CTC.
Researching industry standards and company budget can help in setting a realistic expectation.
Providing examples of past compensation packages can give a clearer picture of the candidate's expectations.
Q36. Practices to prevent SQLi
Practices to prevent SQLi
Use parameterized queries or prepared statements
Implement input validation and sanitization
Apply least privilege principle for database access
Regularly update and patch database software
Implement a web application firewall (WAF)
Perform security testing and code reviews
Q37. what is provider in SSIS
In SSIS, a provider is a software component that allows SSIS to connect to different types of data sources.
Providers are used to establish connections to databases, files, and other data sources in SSIS.
Examples of providers include OLE DB provider, ODBC provider, and ADO.NET provider.
Providers are selected in SSIS connection managers when setting up connections to data sources.
Q38. what is c#
C# is a programming language developed by Microsoft for building a wide range of applications on the .NET framework.
Developed by Microsoft
Used for building applications on the .NET framework
Object-oriented language
Supports modern programming features like generics, LINQ, and async/await
Similar to Java and C++
Q39. Explain partial classes?
Partial classes allow a class's members to be split into multiple files.
Partial classes are used in C# to split a class's definition into multiple files.
Each part of the partial class must use the 'partial' keyword.
All parts of the partial class must be in the same namespace and assembly.
Partial classes are commonly used in large projects to organize and manage code more effectively.
Q40. Explain solid principles?
SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
Inter...read more
Q41. Filters in MVC
Filters in MVC are used to perform logic before or after an action method is executed.
Filters can be used for authorization, logging, caching, error handling, etc.
They can be applied globally, at controller level, or at action level.
Examples include Authorize filter for authentication, OutputCache filter for caching.
Filters can be created by implementing specific filter interfaces or by inheriting from FilterAttribute class.
Q42. Architecture of API
API architecture refers to the design and structure of the application programming interface.
API architecture defines how different components of the API interact with each other
It includes the endpoints, data formats, authentication methods, and communication protocols used
Well-designed API architecture ensures scalability, security, and ease of use
Examples of API architectures include REST, SOAP, and GraphQL
Q43. Explain about MITRE framework
MITRE framework is a cybersecurity framework used to organize and prioritize cybersecurity risks.
MITRE framework provides a structured approach to identifying, assessing, and mitigating cybersecurity risks.
It includes a list of common attack techniques, tactics, and procedures used by threat actors.
MITRE framework helps organizations prioritize their cybersecurity efforts based on real-world threats.
It is widely used in the cybersecurity industry to improve overall security p...read more
Q44. Explain about OSI model
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred between devices in a network.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers for data communication.
For example, w...read more
Q45. Clause in sql , joins
SQL clauses and joins are used to manipulate and combine data from multiple tables.
SQL clauses are used to filter, sort, and group data in a query.
Joins are used to combine data from multiple tables based on a common column.
Types of joins include inner join, left join, right join, and full outer join.
Joins can be used with clauses to further refine the data being retrieved.
Q46. Conatiners in SSIS
Containers in SSIS are objects that allow you to group and manage tasks and workflows in a package.
Containers help organize and control the flow of tasks in SSIS packages.
Common types of containers include Sequence Container, For Loop Container, and Foreach Loop Container.
Containers can be nested within each other to create complex workflows.
They can be used to handle errors, transactions, and looping logic.
Example: Using a Sequence Container to group related tasks and set th...read more
More about working at Deloitte
Top HR Questions asked in Atlassian
Interview Process at Atlassian
Top Senior Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month