Add office photos
Employer?
Claim Account for FREE

Experian

3.8
based on 107 Reviews
Filter interviews by

10+ Ranush Engineering Company Interview Questions and Answers

Updated 5 Nov 2024

Q1. How to make a class immutable

Ans.

To make a class immutable, ensure that its state cannot be changed after instantiation.

  • Make all fields private and final

  • Do not provide setter methods

  • Ensure that any mutable objects within the class are also made immutable

Add your answer

Q2. what is Angular Interceptor?

Ans.

Angular Interceptor is a middleware that intercepts HTTP requests and responses.

  • It can be used to add headers, modify requests, handle errors, and more.

  • Interceptors can be global or specific to a certain request.

  • Example use cases include adding authentication tokens to requests or logging responses.

  • Interceptors are implemented using the HttpInterceptor interface in Angular.

View 1 answer

Q3. Code singleton design pattern in java

Ans.

Singleton design pattern ensures a class has only one instance and provides a global point of access to it.

  • Create a private static instance of the class

  • Provide a public static method to access the instance

  • Ensure the constructor is private to prevent instantiation of multiple objects

Add your answer

Q4. What is cyclomacic complexity

Ans.

Cyclomatic complexity is a software metric used to measure the complexity of a program.

  • It measures the number of linearly independent paths through a program's source code.

  • It helps in identifying complex code that may be difficult to maintain or test.

  • A higher cyclomatic complexity indicates a higher risk of errors and bugs in the code.

  • It is calculated using the formula: E - N + 2P, where E is the number of edges, N is the number of nodes, and P is the number of connected comp...read more

Add your answer
Discover Ranush Engineering Company interview dos and don'ts from real experiences

Q5. what is Microservice C#?

Ans.

Microservice C# is a software architecture pattern where an application is built as a collection of small, independent services.

  • Each service is responsible for a specific task or feature

  • Services communicate with each other through APIs

  • Allows for scalability, flexibility, and easier maintenance

  • Examples include Netflix, Amazon, and Uber

View 1 answer

Q6. How would you deal with developer push back for security issues?

Ans.

Address concerns with empathy, provide education on security risks, offer solutions, collaborate on finding a compromise.

  • Listen to their concerns and understand their perspective.

  • Educate them on the potential security risks and consequences of not addressing the issues.

  • Offer alternative solutions or workarounds that meet both security and development needs.

  • Collaborate with the developers to find a compromise that ensures security without hindering productivity.

Add your answer
Are these interview questions helpful?

Q7. 2 sum in java

Ans.

2 sum problem in Java involves finding two numbers in an array that add up to a specific target value.

  • Use a HashMap to store the difference between the target value and each element in the array.

  • Iterate through the array and check if the current element's complement exists in the HashMap.

  • Return the indices of the two numbers that add up to the target value.

Add your answer

Q8. Find duplicates in a string and count repeated letters

Ans.

Find duplicates in a string and count repeated letters

  • Iterate through each character in the string

  • Use a hash map to store the count of each character

  • If a character is already present in the hash map, increment its count

  • After iterating through the string, filter the hash map to get the duplicate characters and their counts

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. How can you detect fraud in onboarding journey?

Ans.

Fraud in onboarding journey can be detected through various methods such as background checks, verification processes, and monitoring of suspicious activities.

  • Implement thorough background checks on new employees or clients to verify their identity and credentials.

  • Utilize verification processes such as document verification, reference checks, and identity verification to ensure the authenticity of information provided.

  • Monitor for any suspicious activities such as unusual fina...read more

Add your answer

Q10. how will you integrate selenium framework with jenkins

Ans.

Integrating Selenium framework with Jenkins involves setting up Jenkins job to run Selenium tests.

  • Install Jenkins on the server

  • Install necessary plugins like Selenium plugin

  • Create a Jenkins job for running Selenium tests

  • Configure the job to execute Selenium tests using the Selenium framework

  • Set up build triggers and post-build actions as needed

View 1 answer

Q11. Full loan process with each and every step in the LOS.

Ans.

The full loan process in a Loan Origination System (LOS) involves multiple steps from application to funding.

  • 1. Application submission by borrower

  • 2. Verification of borrower information and credit check

  • 3. Underwriting process to assess risk and determine loan terms

  • 4. Approval or denial of the loan

  • 5. Loan documentation and closing

  • 6. Funding of the loan

  • 7. Servicing of the loan including payments and account management

Add your answer

Q12. best practices while integrating SAST in CI/CD?

Ans.

Implementing SAST in CI/CD requires careful planning and integration to ensure security vulnerabilities are caught early in the development process.

  • Integrate SAST tools directly into the CI/CD pipeline to scan code automatically during the build process.

  • Set up alerts and notifications for developers to address security findings promptly.

  • Regularly update SAST tools and configurations to keep up with new vulnerabilities and best practices.

  • Collaborate with developers to prioriti...read more

Add your answer

Q13. How is underwriting done?

Ans.

Underwriting involves assessing risk and determining the terms of insurance policies.

  • Underwriters evaluate the risk associated with insuring a particular individual or entity.

  • They analyze factors such as age, health, occupation, and lifestyle to determine the likelihood of a claim.

  • Underwriters also set the premium amount and coverage limits based on the risk assessment.

  • They may use actuarial tables, statistical models, and historical data to make informed decisions.

  • Underwriti...read more

Add your answer

Q14. Coding language in sql.

Ans.

SQL is not a coding language, it is a query language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language

  • It is used for querying, updating, and managing databases

  • Common SQL commands include SELECT, INSERT, UPDATE, DELETE

  • SQL is not a programming language like Java or Python

Add your answer

Q15. API AUTOMATION using rest assured

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Ranush Engineering Company

based on 20 interviews
Interview experience
3.7
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 653 Interview Questions
3.9
 • 497 Interview Questions
3.8
 • 302 Interview Questions
4.1
 • 148 Interview Questions
3.7
 • 142 Interview Questions
View all
Top Experian Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter