Experian
10+ Interview Questions and Answers
Q1. How to make a class immutable
To make a class immutable, ensure that its state cannot be changed after instantiation.
Make all fields private and final
Do not provide setter methods
Ensure that any mutable objects within the class are also made immutable
Q2. Code singleton design pattern in java
Singleton design pattern ensures a class has only one instance and provides a global point of access to it.
Create a private static instance of the class
Provide a public static method to access the instance
Ensure the constructor is private to prevent instantiation of multiple objects
Q3. what is Angular Interceptor?
Angular Interceptor is a middleware that intercepts HTTP requests and responses.
It can be used to add headers, modify requests, handle errors, and more.
Interceptors can be global or specific to a certain request.
Example use cases include adding authentication tokens to requests or logging responses.
Interceptors are implemented using the HttpInterceptor interface in Angular.
Q4. What is cyclomacic complexity
Cyclomatic complexity is a software metric used to measure the complexity of a program.
It measures the number of linearly independent paths through a program's source code.
It helps in identifying complex code that may be difficult to maintain or test.
A higher cyclomatic complexity indicates a higher risk of errors and bugs in the code.
It is calculated using the formula: E - N + 2P, where E is the number of edges, N is the number of nodes, and P is the number of connected comp...read more
Q5. what is Microservice C#?
Microservice C# is a software architecture pattern where an application is built as a collection of small, independent services.
Each service is responsible for a specific task or feature
Services communicate with each other through APIs
Allows for scalability, flexibility, and easier maintenance
Examples include Netflix, Amazon, and Uber
Q6. How would you deal with developer push back for security issues?
Address concerns with empathy, provide education on security risks, offer solutions, collaborate on finding a compromise.
Listen to their concerns and understand their perspective.
Educate them on the potential security risks and consequences of not addressing the issues.
Offer alternative solutions or workarounds that meet both security and development needs.
Collaborate with the developers to find a compromise that ensures security without hindering productivity.
Q7. 2 sum in java
2 sum problem in Java involves finding two numbers in an array that add up to a specific target value.
Use a HashMap to store the difference between the target value and each element in the array.
Iterate through the array and check if the current element's complement exists in the HashMap.
Return the indices of the two numbers that add up to the target value.
Q8. Find duplicates in a string and count repeated letters
Find duplicates in a string and count repeated letters
Iterate through each character in the string
Use a hash map to store the count of each character
If a character is already present in the hash map, increment its count
After iterating through the string, filter the hash map to get the duplicate characters and their counts
Q9. How can you detect fraud in onboarding journey?
Fraud in onboarding journey can be detected through various methods such as background checks, verification processes, and monitoring of suspicious activities.
Implement thorough background checks on new employees or clients to verify their identity and credentials.
Utilize verification processes such as document verification, reference checks, and identity verification to ensure the authenticity of information provided.
Monitor for any suspicious activities such as unusual fina...read more
Q10. how will you integrate selenium framework with jenkins
Integrating Selenium framework with Jenkins involves setting up Jenkins job to run Selenium tests.
Install Jenkins on the server
Install necessary plugins like Selenium plugin
Create a Jenkins job for running Selenium tests
Configure the job to execute Selenium tests using the Selenium framework
Set up build triggers and post-build actions as needed
Q11. Full loan process with each and every step in the LOS.
Q12. best practices while integrating SAST in CI/CD?
Implementing SAST in CI/CD requires careful planning and integration to ensure security vulnerabilities are caught early in the development process.
Integrate SAST tools directly into the CI/CD pipeline to scan code automatically during the build process.
Set up alerts and notifications for developers to address security findings promptly.
Regularly update SAST tools and configurations to keep up with new vulnerabilities and best practices.
Collaborate with developers to prioriti...read more
Q13. How is underwriting done?
Underwriting involves assessing risk and determining the terms of insurance policies.
Underwriters evaluate the risk associated with insuring a particular individual or entity.
They analyze factors such as age, health, occupation, and lifestyle to determine the likelihood of a claim.
Underwriters also set the premium amount and coverage limits based on the risk assessment.
They may use actuarial tables, statistical models, and historical data to make informed decisions.
Underwriti...read more
Q14. Coding language in sql.
Q15. API AUTOMATION using rest assured
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month