Premium Employer

i

This company page is being actively managed by FIS Team. If you also belong to the team, you can get access from here

FIS Verified Tick Work with us arrow

Compare button icon Compare button icon Compare

Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards

zig zag pattern zig zag pattern

Filter interviews by

FIS Intern Interview Questions and Answers

Updated 13 Sep 2020

7 Interview questions

An Intern was asked
Q. What is the difference between MD5 and SHA2?
Ans. 

MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.

  • MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.

  • MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.

  • SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA...

An Intern was asked
Q. Which packets are used to perform a DOS attack?
Ans. 

Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.

  • SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.

  • UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.

  • ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.

  • Other types of p...

Intern Interview Questions Asked at Other Companies

asked in Accenture
Q1. There is a housing society “The wasteful society”. You collect al ... read more
Q2. Which programming language are you comfortable with?
asked in Accenture
Q3. A marketing strategy case: A perfume seller in Jaipur has unique ... read more
asked in Deloitte
Q4. Case : I am a US based company and I sell 3 products A, B, C (I d ... read more
Q5. Huffman Coding Challenge Given an array ARR of integers containin ... read more
An Intern was asked
Q. On which layer do switches and routers operate, and what are their types?
Ans. 

Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.

  • Switches work on layer 2 of the OSI model and routers work on layer 3.

  • Switches are used to connect devices within a network and forward data based on MAC addresses.

  • Types of switches include unmanaged, managed, and layer 3 switches.

  • Routers are used to connect different networks and forward data b...

An Intern was asked
Q. What is the difference between SSL and TLS?
Ans. 

SSL and TLS are both cryptographic protocols used to secure internet communications.

  • SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.

  • TLS stands for Transport Layer Security and is the successor to SSL.

  • TLS is more secure than SSL and offers better encryption algorithms.

  • TLS also supports newer protocols and ciphers, while SSL does not.

  • SSL is vulnerable to attacks suc...

An Intern was asked
Q. What do you understand by the three-way handshake?
Ans. 

Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.

  • Three way handshake involves three steps: SYN, SYN-ACK, and ACK.

  • The client sends a SYN packet to the server to initiate the connection.

  • The server responds with a SYN-ACK packet, acknowledging the client's request.

  • Finally, the client sends an ACK packet to the server, confirming the connection establ...

An Intern was asked
Q. CIA Triad and What will we lost in DOS attack ?
Ans. 

CIA Triad ensures data security. DOS attack can cause loss of availability.

  • CIA Triad stands for Confidentiality, Integrity, and Availability.

  • It ensures data security by protecting against unauthorized access, alteration, and destruction.

  • DOS attack can cause loss of availability by overwhelming a system with traffic or requests.

  • This can result in the system becoming unresponsive or crashing, making the data unavai...

An Intern was asked
Q. Cryptography and its types
Ans. 

Cryptography is the practice of secure communication in the presence of third parties.

  • Symmetric-key cryptography

  • Asymmetric-key cryptography

  • Hash functions

  • Encryption algorithms

  • Digital signatures

Are these interview questions helpful?

FIS Intern Interview Experiences

1 interview found

Intern Interview Questions & Answers

user image Vishu Gupta

posted on 13 Sep 2020

I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.

Interview Questionnaire 

7 Questions

  • Q1. What do you understand by Three way handshake ?
  • Ans. 

    Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.

    • Three way handshake involves three steps: SYN, SYN-ACK, and ACK.

    • The client sends a SYN packet to the server to initiate the connection.

    • The server responds with a SYN-ACK packet, acknowledging the client's request.

    • Finally, the client sends an ACK packet to the server, confirming the connection establishme...

  • Answered by AI
  • Q2. Difference between SSL and TLS
  • Ans. 

    SSL and TLS are both cryptographic protocols used to secure internet communications.

    • SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.

    • TLS stands for Transport Layer Security and is the successor to SSL.

    • TLS is more secure than SSL and offers better encryption algorithms.

    • TLS also supports newer protocols and ciphers, while SSL does not.

    • SSL is vulnerable to attacks such as ...

  • Answered by AI
  • Q3. On which layer switch and router work and their types ?
  • Ans. 

    Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.

    • Switches work on layer 2 of the OSI model and routers work on layer 3.

    • Switches are used to connect devices within a network and forward data based on MAC addresses.

    • Types of switches include unmanaged, managed, and layer 3 switches.

    • Routers are used to connect different networks and forward data based ...

  • Answered by AI
  • Q4. CIA Triad and What will we lost in DOS attack ?
  • Ans. 

    CIA Triad ensures data security. DOS attack can cause loss of availability.

    • CIA Triad stands for Confidentiality, Integrity, and Availability.

    • It ensures data security by protecting against unauthorized access, alteration, and destruction.

    • DOS attack can cause loss of availability by overwhelming a system with traffic or requests.

    • This can result in the system becoming unresponsive or crashing, making the data unavailable...

  • Answered by AI
  • Q5. Which packets are used to perform DOS attack?
  • Ans. 

    Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.

    • SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.

    • UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.

    • ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.

    • Other types of packet...

  • Answered by AI
  • Q6. Cryptography and its types
  • Ans. 

    Cryptography is the practice of secure communication in the presence of third parties.

    • Symmetric-key cryptography

    • Asymmetric-key cryptography

    • Hash functions

    • Encryption algorithms

    • Digital signatures

  • Answered by AI
  • Q7. Difference between MD5 and SHA 2
  • Ans. 

    MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.

    • MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.

    • MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.

    • SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Always focus to give answer in a well define manner. Don't give answer if you don't know. Read the basic questions from internet make a list of 1000 of interview question of the domain in which you wanna go.
Always find out more things about a topic like asked question to yourself like-
What is it ?
Why we use ?
What are the different types ?
Previous version of it if any and why it is not used now?
The latest version
Make a checklist of the attacks on the all common protocol.

Thanks I hope it will help you.

Skills evaluated in this interview

What people are saying about FIS

View All
favorablelily
Verified Icon
6d
works at
FIS
Renegotiation post offer acceptance
Got an offer from EY and accepted it without second thought. While I was serving NP, got better offer from another organisation however I am not very much interested to join this org. Can I renegotiate on my offer with EY team? Will EY accept my request and offer me more salary ? Please suggest.
Got a question about FIS?
Ask anonymously on communities.

Interview questions from similar companies

I applied via Campus Placement and was interviewed before Jun 2020. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Normal coding question medium level , approach focusing rounds actually how you get up to result

Interview Preparation Tips

Interview preparation tips for other job seekers - "GfG must do" should be solved properly alteast , otherwise go keep on practicing on any platform .

Intern Interview Questions Asked at Other Companies

asked in Accenture
Q1. There is a housing society “The wasteful society”. You collect al ... read more
Q2. Which programming language are you comfortable with?
asked in Accenture
Q3. A marketing strategy case: A perfume seller in Jaipur has unique ... read more
asked in Deloitte
Q4. Case : I am a US based company and I sell 3 products A, B, C (I d ... read more
Q5. Huffman Coding Challenge Given an array ARR of integers containin ... read more

I appeared for an interview before Sep 2020.

Round 1 - Coding Test 

(2 Questions)

Round duration - 90 Minutes
Round difficulty - Medium

The test was organized online on Amcat and there were 3 coding problems. There were no MCQs in this round.

  • Q1. 

    Ninja Technique Problem Statement

    Implement a function that determines whether a given numeric string contains any substring whose integer value equals the product of two consecutive integers. The functio...

  • Ans. 

    Implement a function to determine if a numeric string contains a substring whose value equals the product of two consecutive integers.

    • Iterate through all substrings of the input string and check if their integer value equals the product of two consecutive integers.

    • Use nested loops to generate all possible substrings efficiently.

    • Check if the product of two consecutive integers matches the integer value of the substring.

    • ...

  • Answered by AI
  • Q2. 

    Find Nodes at a Specific Distance from Target in a Binary Tree

    Given a binary tree, a target node within this tree, and an integer K, identify and return all nodes that are exactly K edges away from the t...

  • Ans. 

    Find nodes at a specific distance from a target node in a binary tree.

    • Traverse the binary tree to find the target node.

    • Perform a depth-first search to identify nodes at distance K from the target node.

    • Return the values of nodes found at distance K in an array.

  • Answered by AI
Round 2 - Video Call 

(1 Question)

Round duration - 50 Minutes
Round difficulty - Medium

This round was scheduled by the college Training and Placement team virtually. The interviewer asked me questions pertaining mainly to DSA and we discussed my projects.

  • Q1. 

    Segregate Even and Odd Nodes in a Linked List

    You are given the head node of a singly linked list head. Your task is to modify the linked list so that all the even-valued nodes appear before all the odd-v...

  • Ans. 

    Reorder a singly linked list so that all even-valued nodes appear before odd-valued nodes while preserving the original order.

    • Create two separate linked lists for even and odd nodes

    • Traverse the original list and move nodes to respective even or odd lists

    • Merge the even and odd lists while maintaining the original order

  • Answered by AI
Round 3 - Video Call 

(1 Question)

Round duration - 60 Minutes
Round difficulty - Easy

Again, the round was virtual. This was a Tech + Managerial round organized by the college T & P cell. The interviewer asked questions related to fundamental subjects such as Operating Systems, Object-oriented programming, and DBMS. There was one coding round at the end.

  • Q1. 

    Diagonal Traversal of a Binary Tree

    Given a binary tree of integers, find its diagonal traversal. Refer to the example for clarification on diagonal traversal.

    Example:

    Explanation:
    Consider lines at a...
  • Ans. 

    Diagonal traversal of a binary tree involves printing nodes at 135 degree angle in between lines.

    • Traverse the tree in a diagonal manner, starting from the root node.

    • Maintain a map to store nodes at each diagonal level.

    • Print the nodes at each diagonal level in the order of traversal.

  • Answered by AI
Round 4 - HR 

Round duration - 40 Minutes
Round difficulty - Easy

The round was virtual and was organized by the T & P cell of the college. The interviewer asked some behavioural and situation-based questions. There was one puzzle at the end.

Interview Preparation Tips

Professional and academic backgroundI applied for the job as Software Engineer in NoidaEligibility criteriaAbove 7 CGPAPaytm (One97 Communications Limited) interview preparation:Topics to prepare for the interview - Data Structures, Algorithms, Web Development, Operating Systems, Object-oriented Programming, PuzzlesTime required to prepare for the interview - 3 MonthsInterview preparation tips for other job seekers

Tip 1 : For a product-based company, the first important thing is to solve as many DSA problems as possible. I solved problems mainly on GeeksforGeeks, LeetCode, and Coding Ninjas.
Tip 2 : Prepare 2-3 good projects based on your technical skillset. Prepare it very well as there is a high chance that projects would be discussed in the interview.
Tip 3 : Prepare fundamental college subjects like Operating systems, Object-oriented Programming, Database Management.

Application resume tips for other job seekers

Tip 1 : Keep it short and concise
Tip 2 : Describe your projects very specifically

Final outcome of the interviewSelected

Skills evaluated in this interview

I appeared for an interview before Sep 2020.

Round 1 - Coding Test 

(3 Questions)

Round duration - 70 minutes
Round difficulty - Medium

It consisted of three coding questions varying from easy to medium.

  • Q1. 

    Distributing Coins in a Binary Tree

    You are provided with the root of a binary tree that consists of 'N' nodes. Each node in this tree contains coins, and the total number of coins across all nodes is equ...

  • Ans. 

    Determine the minimum number of moves required to distribute coins in a binary tree so that every node has exactly one coin.

    • Traverse the binary tree in a bottom-up manner to distribute coins efficiently.

    • Keep track of the excess or deficit of coins at each node to calculate the minimum moves required.

    • Transfer coins from nodes with excess coins to nodes with deficits to balance the distribution.

    • Example: For the input ROO...

  • Answered by AI
  • Q2. 

    Distinct Subsets Count

    Given an array arr of N integers that may include duplicates, determine the number of subsets of this array containing only distinct elements.

    The result should be returned modulo ...

  • Ans. 

    Count the number of distinct-element subsets in an array modulo 10^9+7.

    • Iterate through the array and keep track of distinct elements using a set.

    • Calculate the number of subsets using the formula 2^distinct_count - 1.

    • Return the result modulo 10^9+7 for each test case.

  • Answered by AI
  • Q3. 

    0-1 Knapsack Problem Statement

    A thief is robbing a store and can carry a maximal weight 'W' in his knapsack. There are 'N' items, where the i-th item has a weight 'wi' and value 'vi'. Consider the maximu...

  • Ans. 

    The 0-1 Knapsack Problem involves maximizing the value of items a thief can steal within a weight limit.

    • Use dynamic programming to solve the problem efficiently.

    • Create a 2D array to store the maximum value that can be achieved at each weight limit.

    • Iterate through the items and weights to fill the array with optimal values.

    • Return the maximum value achievable at the given weight limit.

  • Answered by AI
Round 2 - Video Call 

(2 Questions)

Round duration - 60 minutes
Round difficulty - Medium

The interview was focused on data structures as well as computer fundamentals along with puzzles.

  • Q1. 

    Sort an Array in Wave Form

    You are given an unsorted array ARR. Your task is to sort it so that it forms a wave-like array.

    Input:

    The first line contains an integer 'T', the number of test cases.
    For ea...
  • Ans. 

    Sort an array in wave form where each element is greater than or equal to its adjacent elements.

    • Iterate through the array and swap adjacent elements to form a wave pattern.

    • Ensure that the first element is greater than or equal to the second element.

    • There can be multiple valid wave arrays, so any valid wave array is acceptable.

  • Answered by AI
  • Q2. 

    Reverse a Linked List Problem Statement

    You are given a Singly Linked List of integers. Your task is to reverse the Linked List by changing the links between nodes.

    Input:

    The first line of input contai...
  • Ans. 

    Reverse a given singly linked list by changing the links between nodes.

    • Iterate through the linked list and reverse the links between nodes

    • Use three pointers to keep track of the current, previous, and next nodes

    • Update the links between nodes to reverse the list

    • Return the head of the reversed linked list

  • Answered by AI
Round 3 - Video Call 

(3 Questions)

Round duration - 90 minutes
Round difficulty - Easy

The Round was mainly focused on resume+ dsa + system design +computer fundamentals

  • Q1. 

    Running Median Problem

    Given a stream of integers, calculate and print the median after each new integer is added to the stream.

    Output only the integer part of the median.

    Example:

    Input:
    N = 5  
    Stre...
  • Ans. 

    Calculate and print the median after each new integer is added to the stream.

    • Use a min heap to store the larger half of the numbers and a max heap to store the smaller half.

    • Keep the two heaps balanced by ensuring the size difference is at most 1.

    • If the total number of elements is odd, the median is the top of the larger heap. If even, average the tops of both heaps.

  • Answered by AI
  • Q2. Can you explain the implementation of an LRU (Least Recently Used) Cache in a database management system?
  • Ans. 

    LRU cache in a database management system stores most recently used data and removes least recently used data when full.

    • LRU cache is implemented using a doubly linked list and a hash map.

    • Each node in the linked list represents a key-value pair.

    • When a key is accessed, it is moved to the front of the linked list.

    • If the cache is full, the least recently used node at the end of the list is removed.

    • Example: If cache size is...

  • Answered by AI
  • Q3. Design a stack that supports the getMin() operation in O(1) time and O(1) extra space.
  • Ans. 

    Use two stacks - one to store actual values and one to store minimum values.

    • Use two stacks - one to store actual values and one to store minimum values

    • When pushing a new value, check if it is smaller than the current minimum and push it to the min stack if so

    • When popping a value, check if it is the current minimum and pop from min stack if so

    • getMin() operation can be done by peeking at the top of the min stack

  • Answered by AI

Interview Preparation Tips

Professional and academic backgroundI applied for the job as Software Engineer in NoidaEligibility criteria10th /12 th-60 % Btech-7 CGPAPaytm (One97 Communications Limited) interview preparation:Topics to prepare for the interview - DSA, OOPs, Computer Networking, System Design ,OOPsTime required to prepare for the interview - 2 monthsInterview preparation tips for other job seekers

Tip 1 : Properly grasp over basic concepts
Tip 2 : Prepare good for DS & Algo as most companies have a separate round for it.
Tip 3 : Don't lie over your resume

Application resume tips for other job seekers

Tip 1 : Don't Lie over your resume
Tip 2 : Avoid unnecessary details like Hobbies, family details, declaration, date, signature, etc.

Final outcome of the interviewRejected

Skills evaluated in this interview

I appeared for an interview in Nov 2020.

Round 1 - Coding Test 

(2 Questions)

Round duration - 70 minutes
Round difficulty - Medium

  • Q1. 

    Subtree of Another Tree Problem Statement

    Given two binary trees, T and S, determine whether S is a subtree of T. The tree S should have the same structure and node values as a subtree of T.

    Explanation:

    ...
  • Ans. 

    Given two binary trees T and S, determine if S is a subtree of T with the same structure and node values.

    • Traverse through tree T and check if any subtree matches tree S

    • Use recursion to compare nodes of both trees

    • Handle edge cases like null nodes and empty trees

  • Answered by AI
  • Q2. 

    Generate Binary Strings with No Consecutive 1s

    Given an integer K, your task is to produce all binary strings of length 'K' that do not contain consecutive '1's.

    Input:

    The input begins with an integer ...
  • Ans. 

    Generate all binary strings of length 'K' with no consecutive '1's in lexicographically increasing order.

    • Use backtracking to generate all possible binary strings without consecutive '1's.

    • Start with an empty string and recursively add '0' or '1' based on the condition.

    • Keep track of the current string and its length to ensure no consecutive '1's are added.

    • Sort the generated strings in lexicographically increasing order b...

  • Answered by AI
Round 2 - Face to Face 

(2 Questions)

Round duration - 60 minutes
Round difficulty - Medium

This was a data structures round.

  • Q1. 

    Longest Consecutive Sequence Problem Statement

    You are provided with an unsorted array/list ARR of N integers. Your task is to determine the length of the longest consecutive sequence present in the array...

  • Ans. 

    The task is to find the length of the longest consecutive sequence in an unsorted array of integers.

    • Iterate through the array and store all elements in a set for constant time lookup.

    • For each element, check if it is the start of a sequence by looking for element-1 in the set.

    • If it is the start, keep incrementing the count until the next element is not found in the set.

  • Answered by AI
  • Q2. 

    Permutations Problem Statement

    Given an array of distinct integers, find all possible permutations of the array.

    Explanation:

    A permutation is a mathematical way of determining the number of possible ar...

  • Ans. 

    Find all possible permutations of an array of distinct integers.

    • Use backtracking to generate all possible permutations

    • Swap elements to create different permutations

    • Return the permutations as an array of arrays of integers

  • Answered by AI
Round 3 - Face to Face 

(2 Questions)

Round duration - 60 minutes
Round difficulty - Easy

This was a data structures round.

  • Q1. 

    Subsequence Determination Problem

    Your task is to verify if the given string STR1 is a subsequence of the string STR2. A subsequence means characters from STR2 are retained in their original order but som...

  • Ans. 

    Verify if a string is a subsequence of another string by checking if characters are retained in order.

    • Iterate through both strings simultaneously, checking if characters match in order.

    • If a character in STR1 matches a character in STR2, move to the next character in STR2.

    • If all characters in STR1 are found in STR2 in order, return True; otherwise, return False.

  • Answered by AI
  • Q2. 

    Minimum Falling Path Sum Problem Statement

    Given a square array VEC of integers with N rows and N columns, you need to determine the minimum sum of a falling path through this square array. The array has ...

  • Ans. 

    Find the minimum sum of a falling path through a square array by selecting one element from each row with constraints on column selection.

    • Iterate through the array from the second row, updating each element with the minimum sum of the element and its adjacent elements from the previous row.

    • The minimum sum path will end in the last row with the minimum value.

    • Use dynamic programming to efficiently calculate the minimum f...

  • Answered by AI
Round 4 - Face to Face 

Round duration - 25 minutes
Round difficulty - Easy

This round was all about OS/DBMS questions.

Interview Preparation Tips

Professional and academic backgroundI completed Computer Science Engineering from Birla Institute Of Technology. Eligibility criteriaAbove 7 CGPAPaytm (One97 Communications Limited) interview preparation:Topics to prepare for the interview - Data Structures, Algorithms, OOPS, Operating Systems, DBMS, Dynamic Programming, Tree, Linked List, Low level DesignTime required to prepare for the interview - 8 monthsInterview preparation tips for other job seekers

Tip 1 :  Practice atleast 100-150 Medium problems and 20-30 hard problems from leetcode
Tip 2 : Try to give a short contest maybe on leetcode, codeforces or codechef as it is beneficial to crack in Online Test.
Tip 3 : Do atleast 2 projects and ask find answers like why are you choosing this tech stack? why did not you choose its alternatives Know your project in and out because they might ask you an modification in your project.

Application resume tips for other job seekers

Tip 1 : Have some projects on resume.
Tip 2 : Do not put false things on resume.
Tip 3 : Try to keep a single page resume.
Tip 4 : If your CGPA is quite low do not mention it on the resume.
Tip 5 : In achievements sections only add relevant achievements. Putting achievements like "won painting competition" or "won dancing competition" wont help.

Final outcome of the interviewSelected

Skills evaluated in this interview

Software Engineer Interview Questions & Answers

Visa user image Pranali Yawalkar

posted on 14 Dec 2015

Interview Questionnaire 

7 Questions

  • Q1. Discussion on my internships and course projects.
  • Q2. My field of interest, how well have I fared in it.
  • Q3. Design a mvc controller system where given a url, I am able to invoke the right controller. Eg, given "xyz.com/a/b/c", I should be able to invoke c controller by going through a and b
  • Ans. 

    Design an MVC controller system to route URLs to the appropriate controllers based on the URL structure.

    • Define a routing mechanism that maps URLs to controller actions.

    • Use a hierarchical structure where each segment of the URL corresponds to a controller.

    • Example: For 'xyz.com/a/b/c', 'a' routes to 'AController', 'b' to 'BController', and 'c' to 'CController'.

    • Implement a method to parse the URL and invoke the correspond...

  • Answered by AI
  • Q4. Design autocomplete in IDEs
  • Ans. 

    Autocomplete in IDEs helps developers write code faster by suggesting code snippets and completing code as they type.

    • Autocomplete should suggest code snippets based on the context of the code being written

    • Autocomplete should prioritize suggestions based on frequency of use

    • Autocomplete should also suggest variable and function names

    • Autocomplete should be customizable to allow for user-defined snippets and suggestions

    • Exa...

  • Answered by AI
  • Q5. What is my weakness
  • Ans. 

    My weakness is public speaking.

    • I tend to get nervous when speaking in front of large groups.

    • I am working on improving my public speaking skills by practicing and seeking feedback.

    • I have taken courses and attended workshops to help me overcome my fear of public speaking.

  • Answered by AI
  • Q6. Given 2 game scenarios for basketball, and given p as the probability of making a basket in an attempt, I have to understand the condition where game1 would be preferable over game2. In first game, I have ...
  • Ans. 

    Comparing 2 basketball game scenarios with different number of trials and baskets required to win

    • Calculate the probability of winning in each game scenario using binomial distribution formula

    • Compare the probabilities to determine which game scenario is preferable

    • In game1, the probability of winning is p. In game2, the probability of winning is the sum of probabilities of making 2 or 3 baskets

    • If p is high, game1 is pref...

  • Answered by AI
  • Q7. Given a dictionary of words, I have to go from one word to another in least number of transitions where a transition is a defined as changing any letter of the current word such that the new word is also i...

Interview Preparation Tips

Round: Test
Experience: The test was on hackerrank.
Tips: * Fast coding and problem solving required
* Time crunch
* The test is valued a LOT in the hiring process
Duration: 120 minutes
Total Questions: 4

Round: Technical Interview
Experience: Question 1 : He tried to take the discussion to web based technologies to which I straightly told I don’t know. Not sure if that was a good decision. Nevertheless, he went over my resume a lot of times and asked about various projects.
Question 2 : Discussed the various projects related to it.
Question 3 : He asked this question because I had worked on django during my FB internship. I proposed a tree based structure. xyz.com/a/b/c ---> b is child of a, c is child of b.

Question 4 : Next he moved to a very interesting question. Given a simple text editor, I want to facilitate autocomplete feature. We discussed about syntactic methods using language specific keywords. I suggested a trie based implementation which he liked. Later he asked me to improve and redirected me to using scope of the variables, and grammar of the language. We discussed about all the steps I did in language translators lab (macrojava -> minijava -> typechecking -> miniIR -> microIR -> miniRA ->Mips) where we built a Java compiler in Java. We later hopped back to original question and I suggested that we can use grammar to to store multiple (nested kind of) tries for different scope. He asked me how would I define “scope”. He gave me a scenario which helped me come up with the nested trie structure
int a;
{
int b;
{
int c; //a b c can be used
}
{
int d; //a b d can be used
}
}
He then asked me details of how I would code. I said we could use the respective visitors and maintain the current trie root for scope. He liked it but I missed at 2 places :
1. He asked me about token generation used in a compiler and I said flex and bison. I was expected to elaborate a bit.
2. He asked me how the grammar is generated and how the visitors are invoked. I couldn’t explain properly because I was not thorough with it.
Tips: * Keep smiling in the interviews.
* My interviewer had hopped from Microsoft to Visa. We had a short detailed discussion on how the transition was and what drove him to do that.
* It’s always good to know about the company to pick up interesting discussions, read up latest articles and news
* The interviewers want to see if you are passionate about what they are building. Their PPT (Pre Placement Talk) was also focussed majorly on the technologies they are building.
* If you take a question in a direction, make sure you are very very thorough with it. I took it in the direction of compilers, but couldn't make the transition seamlessly because I wasn't thorough with a lot of things (like token generation, visitor invocation).
* Not sure if telling upfront that you don't know about web technologies when you are applying for a profile that might need it is a good idea or not.


Round: Technical Interview
Experience: I think he was a senior person and spoke very passionately about the work that is happening in visa Bangalore office.

Question 1 : I said maybe I should have learnt a little about web based technologies. I think he was looking for a more generic answer.
Question 2 : I went ahead with calculating the expected score where my score random variable = 1 with probability p, and 0 with probability (1-p). I conditioned that expected score of game1 > game2 which would give me the range of p. I goofed up the equations twice but he said he liked my approach and I was just there

Question 3 : I suggested building a graph where a node is a word and an edge means a transition, and then performing BFS. He said that was obvious and that he was more interested in knowing how I build the graph. I suggested a method to reduce the number of string comparisons by storing a count vector with each word. Count vector is a 26 length vector where count[i] = number of times that letter occurs in the word. I would do string comparison to identify neighbours only if the difference in count vectors in 2. Eg, cot = cat - a + o. String comparison is still needed because of false positives. Eg, oct = cat - a + o but cat -> oct is not a valid transition. He liked my approach and asked me to code, discussed the complexity.
Tips: * Don't be naive around a senior engineer. Be confident.
* Explain your approach before going ahead solving it. I missed that in Q1 and for a long time he didn't know what I was heading towards.
* Write clean code, practice coding on paper to make sure you write compilable code. Shabby code is a turn off.
* Show passion for the company you are applying for.

General Tips: * Be friendly and keep smiling.
* Know about the company, well in detail. Recent news, articles, acquisitions, organisational changes, new offices, new product, etc.
* Know about the volume the company handles, certain mind boggling figures, what the company *does not* do
* If you are introducing yourself as an expert in a certain field, be prepared for questions like "How will you contribute to our company with your expertise" type of questions.
* Be very very thorough with every single thing you write on your resume. A small point you weren't sure about might become the basis of your whole interview. Don't write things you are unsure of, or have worked very little on.
Skill Tips: * I think I didn’t take Visa very seriously. I was assuming they won’t take a undergrad and they won’t take me because I have 0 knowledge in web based technologies. I might have acted a little cocky.
* They had nice pie diagrams which shows that they had done thorough research about each and every candidate based on resume and the coding test.
* They value the coding test a lot.
* Be very thorough with the projects you write on resume. They will give you a problem which won't be straightforward and will map onto one of your course projects. You are expected to do the mapping seamlessly. Every bit of the discussion you have with the interviewer can be your next problem.
* Brush up on web based technologies if you can.
* There will be a HR round as well if you clear the technical interviews.

Skills: Maths(esp Probability), Design, Passion, Web Technologies, Technical Skill And Speaking Skill, Coding Skills
College Name: IIT Madras
Motivation: * Been the leader since more than half a century, been through the technological revolution.
* Revolutionising payments architecture. Building something of greatest need, so elegant and optimised, yet producing such consistent performance.
* Keeping up with the need of the generation by introducing features which are brand new. Eg, “all-purpose credit card”.
* Loved their PPT (Pre Placement Talk). Volume of the data and processing is IMMENSE. Billions of transactions in a year voluming up to trillions. More than 200 countries in the world --> these stats are HUGE.
* Fraud detection is a space I would have loved to work on given that I come from a Data Mining background.

Funny Moments: Chucked out before HR round :P

Skills evaluated in this interview

Interview Questionnaire 

2 Questions

  • Q1. Why would you like to join Visa and why?
  • Ans. 

    I want to join Visa to contribute to innovative payment solutions and be part of a global leader in financial technology.

    • Visa is at the forefront of digital payment innovation, allowing me to work on cutting-edge technologies.

    • The company's commitment to security aligns with my passion for developing secure software solutions.

    • Visa's global presence offers opportunities to collaborate with diverse teams and learn from di...

  • Answered by AI
  • Q2. Tell me about yourself
  • Ans. 

    I'm a passionate software engineer with a strong background in full-stack development and a love for problem-solving.

    • Graduated with a degree in Computer Science from XYZ University.

    • Worked at ABC Corp, where I developed a web application that improved user engagement by 30%.

    • Proficient in languages like JavaScript, Python, and Java, with experience in frameworks like React and Django.

    • Enjoy collaborating in agile teams an...

  • Answered by AI

Interview Preparation Tips

Round: Test
Experience: Coding Questions were fairly standard ones.
Duration: 75 minutes
Total Questions: 42

Round: Interview
Experience: Networks based questions, firewalls, TCP/IP and other OSI layers

Round: Interview
Experience: Coding questions. Asked to code on paper. Questions on Object Oriented Design.

Skills: Networks basics, OOPs basics, Coding Skills
College Name: IIT Guwahati
Motivation: Profiles offered, Package, Location
Are these interview questions helpful?

Interview Preparation Tips

Round: Test
Experience: Questions on
1. Programming: 10 Questions2. Machine Learning Hadoop MCQ: 6 Questions3. Networking MCQ: 6 Questions4. Operating System: 6 Questions5. Infrastructure: 6 Questions6. Application Security: 6 Questions
Tips: Questions were simple , except sections 2,5 unless you have a basic idea about it.
Duration: 75 minutes
Total Questions: 34+2

Round: Technical Interview
Experience: – Projects, Internship– Asymmetric and Symmetric encryption with some real world usage– Concepts behind Digital Signature and Digital Certificates– Detailed discussion on HTTPS– Basic OS concepts : Threads, Mutex , Semaphores– Basic OOPS concepts : Virtual functions , Function overloading and overriding , encapsulation.
Tips: Focus on Network Security concepts !

Round: Technical Interview
Experience: – Projects , Internship– Some discussion on Testing and how you would design a unit test case and a complete project test case. Discussion on Automated Testing.– How does a Web application work.– Software Development Models– Discussion on interpreted language and compiled language– Some DBMS basics for efficiency :- Indexing viz. B+trees , Hashing.– Some discussion on Apple Pay , VbV (Verified by Visa) (informal)

Round: HR Interview
Experience: Basic HR questions !

General Tips: Confidence is the key along with sufficient coding practice both on the IDE and pen-paper.
Skills: Network Security, Programming, Algorithms, Operating System
College Name: IIT ROORKEE

I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.

Interview Questionnaire 

7 Questions

  • Q1. Given an array, Implement Binary search tree
  • Ans. 

    Implement Binary Search Tree using given array of strings.

    • Sort the array in ascending order

    • Find the middle element and make it the root of the tree

    • Recursively create left and right subtrees using the left and right halves of the array

    • Repeat until all elements are added to the tree

  • Answered by AI
  • Q2. Given the above Binary search tree, print in ascending order
  • Ans. 

    Print the given Binary search tree in ascending order

    • Traverse the left subtree recursively

    • Print the root node

    • Traverse the right subtree recursively

  • Answered by AI
  • Q3. Given an array of stock prices, find where to buy and where to sell for maximum profit in O(n)
  • Q4. Resume based
  • Q5. What are three problems Chennai faces?
  • Ans. 

    Chennai faces problems related to water scarcity, traffic congestion, and pollution.

    • Water scarcity due to inadequate rainfall and poor management of water resources.

    • Traffic congestion due to the increasing number of vehicles and poor road infrastructure.

    • Pollution caused by industries, vehicular emissions, and improper waste disposal.

  • Answered by AI
  • Q6. Which one would you solve and how and why?
  • Ans. 

    Need more context on the question to provide an answer.

    • Please provide more information on the problem to be solved.

    • Without context, it is difficult to provide a solution.

    • Can you please provide more details on the problem statement?

  • Answered by AI
  • Q7. What is most interesting thing about Visa?

Interview Preparation Tips

Round: Test
Experience: 4 Coding questions on Hackerrank platform, one and half hour time. I am not going to reveal the questions here, but one was a basic binary tree implementation and the other three were algorithmic and mathematical problems. They were kinda hard to solve in an hour and half. I could do only 1 and half of the other one. I got 115/300 points on that. I was one of the 16 people selected for the interview.
Tips: It all depends on how well you can focus on the test day. Just practice a lot on hackerrank.
Duration: 1 hour 30 minutes
Total Questions: 4

Round: Technical Interview
Experience: The first two questions I was able to do fast enough. I was also asked a few questions on my resume and coding-related internship. The last one, I showed an O(n*n) algorithm first and then modified it to O(n). Around 45 minutes.
Tips: Be thorough on the coding part in your resume. Think out aloud!

Round: Technical + HR Interview
Experience: Just a few normal questions regarding my projects and my favorite course and it's application to Visa. 15 minutes.
Tips: Once again, be thorough on your resume.

Round: HR Interview
Experience: Once again a normal round, just random questions as to whether I am interested and good enough in communication. 15 minutes.
Tips: Don't get shaken. Be ready for all kinds of questions. Especially about Visa relation to what you do

Skills: Smart Coding
College Name: IIT Madras

Skills evaluated in this interview

I appeared for an interview before Apr 2021.

Round 1 - Face to Face 

(4 Questions)

Round duration - 45 minutes
Round difficulty - Easy

This was a technical interview round.

  • Q1. How does AJAX work?
  • Ans. 

    AJAX allows web pages to be updated asynchronously by exchanging data with a web server behind the scenes.

    • AJAX stands for Asynchronous JavaScript and XML.

    • It allows web pages to update content without reloading the entire page.

    • AJAX uses XMLHttpRequest object to send and receive data from a server.

    • Commonly used in web applications to provide a more responsive user experience.

  • Answered by AI
  • Q2. What is the difference between SOAP and REST?
  • Ans. 

    SOAP is a protocol, while REST is an architectural style for web services.

    • SOAP is a protocol that uses XML for message format and relies on a request-response model.

    • REST is an architectural style that uses standard HTTP methods like GET, POST, PUT, DELETE.

    • SOAP is more rigid and requires more bandwidth, while REST is lightweight and flexible.

    • SOAP has built-in security features like WS-Security, while REST relies on exte...

  • Answered by AI
  • Q3. What is the difference between GET and POST methods in APIs?
  • Ans. 

    GET is used to request data from a server, while POST is used to submit data to a server.

    • GET requests data from a specified resource, while POST submits data to be processed to a specified resource.

    • GET requests are cached by browsers, while POST requests are not.

    • GET requests can be bookmarked and shared, while POST requests cannot.

    • GET requests have length restrictions, while POST requests do not.

    • Example: Using GET to r...

  • Answered by AI
  • Q4. What is the Observer Pattern?
  • Ans. 

    The Observer Pattern is a behavioral design pattern where an object (subject) maintains a list of dependents (observers) that are notified of any state changes.

    • Allows for one-to-many dependency between objects

    • When the subject's state changes, all observers are automatically notified and updated

    • Commonly used in event handling systems and GUI frameworks

  • Answered by AI
Round 2 - Face to Face 

(4 Questions)

Round duration - 40 minutes
Round difficulty - Easy

This was the second technical interview round.

  • Q1. What is a singleton class?
  • Ans. 

    A singleton class is a class that can only have one instance created throughout the entire application.

    • Singleton classes have a private constructor to prevent multiple instances from being created.

    • They typically provide a static method to access the single instance.

    • Commonly used for logging, database connections, and configuration settings.

  • Answered by AI
  • Q2. What is meant by immutability in Java?
  • Ans. 

    Immutability in Java refers to the property of objects whose state cannot be changed once they are created.

    • Immutability ensures that once an object is created, its state cannot be modified.

    • Immutable objects are thread-safe and can be shared without the risk of data corruption.

    • String class in Java is an example of an immutable class.

    • To create an immutable class, make the class final, all fields private, and provide only...

  • Answered by AI
  • Q3. What is dependency injection?
  • Ans. 

    Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.

    • Allows for easier testing by providing mock dependencies

    • Promotes loose coupling between components

    • Improves code reusability and maintainability

    • Examples: Constructor injection, Setter injection, Interface injection

  • Answered by AI
  • Q4. How do you create an immutable class in Java?
  • Ans. 

    To create an immutable class in Java, make the class final, make all fields private and final, provide only getter methods, and do not provide any setter methods.

    • Make the class final to prevent inheritance.

    • Make all fields private and final to prevent modification.

    • Provide only getter methods to access the fields.

    • Do not provide any setter methods to modify the fields.

  • Answered by AI
Round 3 - HR 

Round duration - 30 minutes
Round difficulty - Easy

HR round with typical behavioral problems.

Interview Preparation Tips

Eligibility criteriaAbove 7 CGPAVisa interview preparation:Topics to prepare for the interview - Java, AJAX, Web Development, Node js, DSA, OOPSTime required to prepare for the interview - 5 monthsInterview preparation tips for other job seekers

Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.

Application resume tips for other job seekers

Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.

Final outcome of the interviewSelected

Skills evaluated in this interview

FIS Interview FAQs

How to prepare for FIS Intern interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at FIS. The most common topics and skills that interviewers at FIS expect are Customer Service, Communication Skills, customer support, international bpo and International Voice Process.
What are the top questions asked in FIS Intern interview?

Some of the top questions asked at the FIS Intern interview -

  1. What do you understand by Three way handshak...read more
  2. On which layer switch and router work and their type...read more
  3. CIA Triad and What will we lost in DOS attac...read more

Tell us how to improve this page.

Join FIS Advancing the way the world pays, banks and investments
FIS Intern Salary
based on 4 salaries
₹1 L/yr - ₹2 L/yr
62% less than the average Intern Salary in India
View more details

FIS Intern Reviews and Ratings

based on 7 reviews

4.1/5

Rating in categories

4.4

Skill development

3.5

Work-life balance

3.7

Salary

3.9

Job security

4.3

Company culture

3.2

Promotions

4.0

Work satisfaction

Explore 7 Reviews and Ratings
Senior Software Engineer
2.7k salaries
unlock blur

₹12.5 L/yr - ₹25.7 L/yr

Software Engineer
1.8k salaries
unlock blur

₹7.4 L/yr - ₹13 L/yr

Lead Engineer
742 salaries
unlock blur

₹12.5 L/yr - ₹20.8 L/yr

Senior Leader Engineer
714 salaries
unlock blur

₹17.1 L/yr - ₹28.7 L/yr

Team Member
610 salaries
unlock blur

₹1.8 L/yr - ₹5.5 L/yr

Explore more salaries
Compare FIS with

Paytm

3.2
Compare

PhonePe

4.0
Compare

Fiserv

2.9
Compare

KFintech

3.5
Compare
write
Share an Interview