i
Deutsche Telekom Digital Labs
Filter interviews by
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
Static is used to define class-level variables and methods, while final is used to define constants that cannot be changed.
Static variables belong to the class itself, while final variables are constants that cannot be modified.
Static methods can be called without creating an instance of the class, while final methods cannot be overridden.
Static variables are shared among all instances of a class, while final variables...
ArrayList is better for random access, LinkedList is better for frequent insertions/deletions.
ArrayList uses dynamic array to store elements, LinkedList uses doubly linked list.
ArrayList provides fast random access to elements using index, LinkedList provides fast insertion/deletion at any position.
Example: ArrayList is suitable for scenarios where random access is required like searching, LinkedList is suitable for sc...
Java8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow you to write code in a more concise and readable way.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Streams provide a way to work with collections of objects in a functional style.
Default methods allow inte...
Using streams in Java 8 to filter and map a list of numbers
Create a list of numbers
Use stream to filter out even numbers
Use map to square each number
Collect the results into a new list
Program to print even and odd numbers from 1 to 20 using 2 threads alternately.
Create two threads, one for printing even numbers and one for printing odd numbers.
Use wait(), notify(), and notifyAll() to ensure alternate printing.
Ensure synchronization between the two threads to avoid race conditions.
Example: Thread 1 prints even numbers (2, 4, 6, ...) and Thread 2 prints odd numbers (1, 3, 5, ...).
Strings are immutable to ensure data integrity and security.
Immutable strings prevent accidental changes to data
Immutable strings allow for safe sharing of data between different parts of a program
Immutable strings help prevent security vulnerabilities like SQL injection attacks
Default methods in Java 8 allow interfaces to have method implementations, enabling backward compatibility and reducing code duplication.
Default methods were introduced in Java 8 to provide a way to add new methods to interfaces without breaking existing implementations.
They allow interfaces to have method implementations, which was not possible before Java 8.
Default methods can be overridden in implementing classes to...
Using Java8 streams to solve a problem
Use stream() method to convert a collection into a stream
Use filter() method to filter elements based on a condition
Use map() method to transform elements
Use collect() method to collect the elements into a new collection
Checked exceptions are exceptions that must be either caught or declared in the method signature.
Checked exceptions are subclasses of Exception (excluding RuntimeException and its subclasses)
Checked exceptions must be either caught using try-catch block or declared in the method signature using 'throws' keyword
Examples of checked exceptions in Java include IOException, SQLException, and ClassNotFoundException
Annotation used to mark a class as a Spring Boot application
Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations
Used to bootstrap and launch a Spring application
Automatically scans for Spring components in the package and sub-packages
Annotation used in Spring to specify which bean to autowire
Used to disambiguate when multiple beans of the same type are present
Can be used with @Autowired to specify which bean to inject
Helps in resolving dependencies when multiple beans of the same type are available
Microservices are a software development technique where an application is composed of small, independent services that communicate with each other.
Microservices are designed to be small, focused on specific tasks, and independently deployable.
Each microservice typically runs its own process and communicates with other services through APIs.
Microservices allow for easier scalability, flexibility, and maintenance compar...
Microservices communicate with each other through APIs, messaging queues, or service meshes.
APIs: Microservices can communicate with each other by exposing APIs that allow them to send and receive data.
Messaging queues: Microservices can use messaging queues like RabbitMQ or Kafka to send messages to each other asynchronously.
Service meshes: Microservices can communicate through a service mesh like Istio, which handles...
The project involves creating a web-based platform for online shopping with features like user registration, product browsing, shopping cart, and payment processing.
User registers on the platform with personal information
User browses products by category or search
User adds products to the shopping cart
User proceeds to checkout and makes payment
Order is confirmed and user receives a confirmation email
I was interviewed in Aug 2024.
I have over 5 years of experience in cybersecurity, conducting risk assessments, implementing security measures, and responding to incidents.
Conducted risk assessments to identify vulnerabilities and recommend security measures
Implemented security measures such as firewalls, intrusion detection systems, and encryption protocols
Responded to security incidents by investigating, containing, and mitigating the impact
Collab...
Yes, I have experience in cloud security with a focus on securing data and applications in cloud environments.
Implemented security measures to protect data stored in cloud services
Configured and monitored security controls in cloud platforms like AWS and Azure
Performed regular security assessments and audits to identify vulnerabilities
Developed incident response plans for cloud security breaches
Stayed updated on indust...
I have extensive experience in CyberArk and EntraId, including implementation, configuration, and troubleshooting.
Implemented and configured CyberArk Privileged Access Security solution to manage and secure privileged accounts
Performed regular maintenance and troubleshooting of CyberArk components such as Vault, CPM, and PSM
Integrated CyberArk with EntraId for seamless access management and authentication
Provided train...
Yes, I am comfortable and eager to skill up and learn AWS security.
I have experience in cloud security and am familiar with AWS services.
I am proactive in seeking out training and certifications to enhance my skills.
I am excited about the opportunity to learn and grow in the field of AWS security.
I applied via LinkedIn and was interviewed in May 2024. There were 4 interview rounds.
Deutsche Telekom Digital Labs interview questions for popular designations
The current project involves developing a React JS frontend for a web application.
The project focuses on creating a user-friendly interface using React components.
Implementing state management with tools like Redux or Context API.
Integrating with backend APIs to fetch and display data on the frontend.
Optimizing performance by lazy loading components and using memoization techniques.
Culture fit and performance enhancement are crucial for success in the current project.
Creating a positive and inclusive work environment can improve culture fit.
Encouraging open communication and collaboration among team members.
Providing opportunities for professional development and growth.
Recognizing and rewarding individual and team achievements.
Regularly seeking feedback from team members to identify areas for im
Get interview-ready with Top Deutsche Telekom Digital Labs Interview Questions
I applied via campus placement at Motilal Nehru Institute National Institute of Technology (NIT), Allahabad and was interviewed in Aug 2024. There were 2 interview rounds.
I applied via Recruitment Consulltant
Find the minimum element in an array of strings
Iterate through the array and compare each element to find the minimum
Use built-in functions like Math.min() or sort() to find the minimum
Handle edge cases like empty array or array with only one element
Reverse a linked list by changing the next pointers of each node
Iterate through the linked list and change the next pointers to reverse the list
Use three pointers - prev, current, and next to keep track of nodes
Example: 1 -> 2 -> 3 -> 4 -> null, after reversing: 4 -> 3 -> 2 -> 1 -> null
I applied via Referral and was interviewed in Mar 2024. There were 2 interview rounds.
Check if two strings are anagrams by comparing the frequency of characters.
Create two arrays to store the frequency of characters for each string.
Compare the frequency arrays to check if they are anagrams.
Example: 'listen' and 'silent' are anagrams.
Previous project architecture involved microservices with Docker containers and Kubernetes for orchestration.
Utilized microservices architecture for scalability and flexibility
Deployed services in Docker containers for easy portability and consistency
Managed containerized applications with Kubernetes for automated scaling and orchestration
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
Services in k8s interact with each other through DNS-based service discovery and communication via network requests.
Services are assigned a DNS name which other services can use to communicate with them
Services can communicate with each other using the DNS name or IP address and port number
Communication between services can be within the same namespace or across namespaces
Services can also use Kubernetes Ingress to exp
Setting up a Jenkins master node involves installing Jenkins, configuring plugins, setting up security, and managing nodes.
Install Jenkins on a server
Configure necessary plugins for your project
Set up security measures such as user authentication and authorization
Manage nodes for distributing workload
Various AWS services are used in DevOps such as EC2, S3, RDS, Lambda, CloudFormation, and more.
EC2 - for scalable computing capacity
S3 - for object storage
RDS - for managed relational databases
Lambda - for serverless computing
CloudFormation - for infrastructure as code
Top trending discussions
Some of the top questions asked at the Deutsche Telekom Digital Labs interview -
The duration of Deutsche Telekom Digital Labs interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 26 interviews
Interview experience
based on 114 reviews
Rating in categories
2-5 Yrs
Not Disclosed
2-8 Yrs
Not Disclosed
6-10 Yrs
Not Disclosed
Software Engineer
223
salaries
| ₹10 L/yr - ₹26 L/yr |
Senior Software Engineer
106
salaries
| ₹19 L/yr - ₹40 L/yr |
Devops Engineer
61
salaries
| ₹8.5 L/yr - ₹25 L/yr |
Sdet Automation Test Engineer
41
salaries
| ₹10 L/yr - ₹24 L/yr |
Software Developer
35
salaries
| ₹8.1 L/yr - ₹27.5 L/yr |
TCS
Wipro
Infosys
HCLTech