Filter interviews by
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
As a team lead, my daily tasks include overseeing project progress, assigning tasks, providing guidance and support to team members, and ensuring deadlines are met.
Overseeing project progress and ensuring tasks are completed on time
Assigning tasks to team members based on their strengths and workload
Providing guidance and support to team members to help them succeed
Communicating with stakeholders to provide updates on ...
Database credentials can be stored securely in cloud using encryption, environment variables, and key management services.
Use encryption to protect sensitive information such as passwords and keys.
Store credentials in environment variables rather than hardcoding them in code.
Utilize key management services provided by cloud providers for secure storage and access control.
Avoid storing credentials in plain text files or...
Database credentials can be stored in a secure external vault service like HashiCorp Vault or AWS Secrets Manager.
Store database credentials in a secure external vault service like HashiCorp Vault or AWS Secrets Manager.
Utilize Kubernetes secrets to store the access credentials for the external vault service.
Implement proper access controls and encryption mechanisms to ensure the security of the stored credentials.
Yes, I have experience with React.
I have worked on multiple projects using React for front-end development.
I am proficient in using React components, state management, and hooks.
I have integrated React with backend technologies like Node.js for full-stack development.
posted on 31 May 2024
I applied via Referral and was interviewed in May 2024. There was 1 interview round.
I applied via Referral and was interviewed in Apr 2022. There were 2 interview rounds.
To check logs, use log management tools or command line tools to access log files.
Use log management tools like Splunk, ELK stack, or Graylog to search and analyze logs.
Access log files directly using command line tools like grep, tail, or cat.
Check system logs, application logs, and error logs for troubleshooting and monitoring purposes.
Look for specific keywords, timestamps, or error codes in the logs to identify iss...
To check server status, use monitoring tools, command line utilities, and log files.
Use monitoring tools like Nagios, Zabbix, or Datadog to monitor server health and availability.
Use command line utilities like ping, traceroute, or telnet to check if the server is reachable.
Check server logs for any error messages or warnings that indicate issues with the server.
Monitor server resource usage, such as CPU, memory, and d...
I applied via Referral and was interviewed before Apr 2022. There were 4 interview rounds.
Everbridge interview questions for popular designations
Top trending discussions
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
Yes
Knowledge of network protocols and architectures
Understanding of data structures and algorithms
Experience with network troubleshooting and analysis
Familiarity with network security and encryption
Proficiency in network programming and socket programming
The test went well, I was able to complete all the tasks within the given time frame.
I prepared well for the test by reviewing relevant materials
I managed my time effectively during the test
I was able to solve all the problems and complete all the tasks
I double-checked my work to ensure accuracy
I applied via Referral
Program to print binary tree elements in spiral order
Use two stacks to keep track of nodes at odd and even levels
Push nodes from left to right in odd level stack and right to left in even level stack
Pop nodes from the stack alternatively and print them
Repeat until both stacks are empty
Entering a URL in the browser triggers a series of events to retrieve and display the requested webpage.
The browser checks the cache for a previously stored copy of the webpage
If not found, the browser sends a request to the DNS server to resolve the domain name to an IP address
The browser then sends a request to the web server at the IP address for the webpage
The web server responds with the requested webpage
The brows...
MAC addresses are required for identifying devices on a local network, while IP addresses are used for identifying devices on a global network.
MAC addresses are used for communication within a local network
IP addresses are used for communication across different networks
MAC addresses are assigned by the manufacturer and cannot be changed
IP addresses can be assigned dynamically or statically
MAC addresses are used in the...
Developed a web application for tracking inventory and sales data
Used React.js for front-end development
Implemented RESTful APIs using Node.js and Express for back-end
Utilized MongoDB for database management
Integrated authentication and authorization features for secure access
Designed user-friendly interface with responsive design
An ArrayList is a dynamic array in Java that can grow or shrink in size during runtime.
ArrayList is a class in Java's Collection framework.
It implements the List interface and allows duplicate elements.
Elements can be added or removed using methods like add(), remove(), etc.
It can also be sorted using the sort() method.
Example: ArrayList
names.add("John"); names.add("Mary"); names.remove(0);
ArrayList is a resizable array while LinkedList is a doubly linked list.
ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.
ArrayList uses contiguous memory while LinkedList uses non-contiguous memory.
ArrayList is better for random access while LinkedList is better for sequential access.
Example: ArrayList - List
Java is not a pure OO language due to primitive types not being objects.
Primitive types like int, boolean, etc. are not objects in Java
They do not have methods or inheritance like objects do
This violates the principle of everything being an object in pure OO languages
Wrapper classes like Integer, Boolean, etc. were introduced to provide object-like behavior for primitives
Object-oriented languages support inheritance and polymorphism, while object-based languages do not.
Object-oriented languages allow for the creation of classes and objects, and support inheritance and polymorphism.
Object-based languages only support objects, but do not have the concept of classes or inheritance.
Examples of object-oriented languages include Java, C++, and Python, while JavaScript is an example of an obj
Inheritance is a way to create new classes based on existing ones. Abstraction is a way to hide implementation details.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Abstraction allows a class to provide a simplified interface to its users while hiding its implementation details.
For example, a Car class can inherit properties and methods from a Vehicle class, while also implementing i...
based on 2 interviews
Interview experience
based on 19 reviews
Rating in categories
Senior Software Engineer 2
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Support Engineer 3
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Java Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Support Engineer 2
4
salaries
| ₹0 L/yr - ₹0 L/yr |
BlackBerry
Siemens
Honeywell Automation
Motorola Solutions