Premium Employer

FIS

3.9
based on 5.5k Reviews
Filter interviews by

100+ ExpertLancing Research Services Interview Questions and Answers

Updated 1 Feb 2025
Popular Designations

Q101. Explain procedure of application deployment on Windows server.

Ans.

Application deployment on Windows server involves packaging the application, configuring the server, and deploying the application using tools like IIS or PowerShell.

  • Package the application into a deployable format such as a zip file or MSI installer

  • Configure the Windows server with necessary dependencies and settings for the application to run

  • Deploy the application using tools like Internet Information Services (IIS) or PowerShell scripts

  • Test the deployed application to ensu...read more

Add your answer

Q102. Explain lending.Origination and servicing

Ans.

Lending origination and servicing involves the process of granting loans and managing them throughout their lifecycle.

  • Lending origination refers to the process of evaluating loan applications, determining eligibility, and approving or rejecting loans.

  • Lending servicing involves managing the loan after it has been originated, including collecting payments, handling customer inquiries, and managing any changes or modifications to the loan terms.

  • Origination and servicing activiti...read more

View 1 answer

Q103. what is difference between tcp and udp

Ans.

TCP is a connection-oriented protocol while UDP is a connectionless protocol.

  • TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.

  • TCP is slower but more reliable while UDP is faster but less reliable.

  • TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.

  • Examples of TCP-based applications include email, file transfer, and web browsing w...read more

Add your answer

Q104. Explain SOLID principles

Ans.

SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more

Add your answer
Discover ExpertLancing Research Services interview dos and don'ts from real experiences

Q105. Different ways of loading routes

Ans.

Routes can be loaded using various methods depending on the framework used.

  • In Express.js, routes can be loaded using app.get(), app.post(), app.put(), app.delete() methods

  • In Laravel, routes can be loaded using Route::get(), Route::post(), Route::put(), Route::delete() methods

  • In Ruby on Rails, routes can be loaded using resources, get, post, put, patch, and delete methods

  • Routes can also be loaded dynamically using middleware or custom functions

Add your answer

Q106. What to do if swift msg is not received

Add your answer
Are these interview questions helpful?

Q107. What is java 8 features

Ans.

Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions enable functional programming in Java.

  • Streams provide a new way to process collections of data.

  • Default methods allow adding new methods to interfaces without breaking existing implementations.

Add your answer

Q108. Find the length of String and reverse string

Ans.

Find length and reverse of a string

  • Use the length() method to find the length of the string

  • Use StringBuilder class to reverse the string

  • Example: String str = 'hello'; int length = str.length(); StringBuilder reversed = new StringBuilder(str).reverse();

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Favorite go-to tool for security investigation.

Ans.

My favorite go-to tool for security investigation is Wireshark.

  • Wireshark is a powerful network protocol analyzer used for troubleshooting, analysis, development, and education.

  • It allows me to capture and interactively browse the traffic running on a computer network.

  • I can use Wireshark to analyze network traffic, identify security vulnerabilities, and troubleshoot network issues.

  • Wireshark supports hundreds of protocols and has features for deep inspection of hundreds of proto...read more

Add your answer

Q110. View child life cycle hooks

Ans.

Child life cycle hooks are methods that are called at specific points in the lifecycle of a child component in Angular.

  • ngOnChanges: called when an input property of the component changes

  • ngOnInit: called once the component is initialized

  • ngDoCheck: called during every change detection run

  • ngAfterContentInit: called after content (ng-content) has been projected into the component

  • ngAfterContentChecked: called after every check of the projected content

  • ngAfterViewInit: called after ...read more

Add your answer

Q111. How to handle negotiation in sales

Ans.

Negotiation in sales requires active listening, understanding needs, building rapport, and finding win-win solutions.

  • Listen actively to the client's needs and concerns

  • Understand the client's priorities and budget constraints

  • Build rapport and trust with the client to create a positive relationship

  • Focus on finding win-win solutions that benefit both parties

  • Be prepared to compromise but also know your bottom line

Add your answer

Q112. Speak for 2 mins about childhood memories

Ans.

Childhood memories are filled with joy, innocence, and adventure.

  • Playing with neighborhood friends until the street lights came on

  • Family vacations to the beach or mountains

  • Celebrating birthdays with homemade cakes and games

  • Exploring the backyard or local park for hidden treasures

  • Learning to ride a bike or swim for the first time

Add your answer

Q113. Do you know IIS?

Ans.

Yes, I know IIS.

  • I have experience in configuring and managing IIS servers.

  • I am familiar with setting up websites, application pools, and virtual directories.

  • I have worked with IIS versions 6, 7, and 8.

  • I am comfortable troubleshooting issues related to IIS.

  • I have used IIS to host various web applications, including ASP.NET and PHP applications.

Add your answer

Q114. Equals vs hashcode contract

Ans.

Equals method checks for object equality while hashcode method returns a unique integer for an object.

  • Equals method compares two objects for equality based on their contents

  • Hashcode method returns a unique integer value for an object based on its contents

  • Both methods are used in conjunction to ensure correct behavior in collections like HashMap

Add your answer

Q115. What is disposable income

Ans.

Disposable income is the amount of money a person or household has available to spend or save after taxes and essential expenses.

  • Disposable income is the net income or take-home pay after deducting taxes.

  • It represents the amount of money that can be used for discretionary spending or saving.

  • Disposable income is calculated by subtracting taxes and essential expenses, such as rent, utilities, and food, from the total income.

  • Examples of essential expenses include mortgage or ren...read more

View 1 answer

Q116. Wt r the jcl abends u r faced?

Ans.

I have faced JCL abends related to syntax errors, data set errors, and system errors.

  • Syntax errors such as missing or incorrect parameters in JCL statements

  • Data set errors such as incorrect allocation or access permissions

  • System errors such as resource unavailability or system crashes

  • Examples include S0C7, S322, and U4038 abends

Add your answer

Q117. How do you perform sprint planning

Ans.

Sprint planning involves prioritizing tasks, estimating effort, assigning responsibilities, and setting goals for the upcoming sprint.

  • Collaborate with the product owner to understand the requirements and priorities

  • Estimate the effort required for each task using techniques like story points or hours

  • Assign tasks to team members based on their skills and availability

  • Set achievable goals for the sprint based on team capacity and velocity

  • Review and adjust the sprint plan as neede...read more

Add your answer

Q118. How to configure rsyslog

Ans.

Rsyslog is configured by editing its configuration file, usually located at /etc/rsyslog.conf

  • Identify the log sources and their corresponding log files

  • Specify the log destination and format

  • Configure filters and rules to process and route logs

  • Restart the rsyslog service to apply changes

  • Use tools like logger and tail to test the configuration

Add your answer

Q119. How to configure a cluster

Ans.

Configuring a cluster involves setting up multiple servers to work together as a single system.

  • Choose a cluster management tool such as Kubernetes or Apache Mesos

  • Determine the number of nodes and their roles in the cluster

  • Configure network settings and communication protocols

  • Set up load balancing and failover mechanisms

  • Ensure data consistency and replication across nodes

Add your answer

Q120. What is cash reconciliation o

Ans.

Cash reconciliation is the process of comparing and adjusting the cash balance in an organization's accounting records with the actual cash balance.

  • It involves verifying the accuracy of cash transactions recorded in the accounting system

  • It helps identify discrepancies between the recorded cash balance and the actual cash balance

  • Adjustments are made to the accounting records to reflect the correct cash balance

  • It is an important control measure to prevent fraud and errors

  • Exampl...read more

Add your answer

Q121. Tell me the tools you are worked

Add your answer

Q122. What do you know about FIS

Ans.

FIS is a global financial services technology company.

  • FIS provides a wide range of financial services and solutions to clients worldwide.

  • The company offers banking and payment solutions, consulting services, and risk management tools.

  • FIS serves clients in over 130 countries and has over 55,000 employees.

  • FIS is a Fortune 500 company and is headquartered in Jacksonville, Florida.

Add your answer

Q123. What is general ledger?

Ans.

General ledger is a complete record of financial transactions of a company, organized by accounts.

  • It contains all debit and credit entries for each account in the company's chart of accounts.

  • It is used to prepare financial statements like the balance sheet and income statement.

  • Entries in the general ledger are usually recorded using double-entry accounting.

  • Examples of general ledger accounts include cash, accounts receivable, accounts payable, and expenses.

Add your answer

Q124. What do you understand by RSA?

Ans.

RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.

  • RSA is a public-key cryptosystem used for secure data transmission.

  • It involves generating a public key and a private key for encryption and decryption.

  • RSA encryption is based on the difficulty of factoring large prime numbers.

  • It is commonly used in secure communication protocols like HTTPS.

  • RSA can be used for digital signatures to verify the authenticity of messages.

Add your answer

Q125. Difference between xpath and css selectors

Ans.

XPath is a language for selecting nodes in an XML document, while CSS selectors are used to select HTML elements.

  • XPath is more powerful and flexible than CSS selectors

  • CSS selectors are faster and easier to write than XPath

  • XPath can traverse both upwards and downwards in the document tree, while CSS selectors can only traverse downwards

  • XPath can select elements based on their attributes, text content, and more, while CSS selectors are limited to selecting elements based on the...read more

Add your answer

Q126. how to add SSL to web site

Ans.

To add SSL to a website, obtain a SSL certificate and configure the web server to use it.

  • Obtain a SSL certificate from a trusted certificate authority

  • Install the SSL certificate on the web server

  • Configure the web server to use HTTPS instead of HTTP

  • Redirect HTTP traffic to HTTPS

  • Test the SSL certificate installation using an SSL checker tool

Add your answer

Q127. What is modified and Macaulay duration

Ans.

Modified and Macaulay duration are measures of bond price sensitivity to changes in interest rates.

  • Modified duration measures the percentage change in bond price for a 1% change in yield.

  • Macaulay duration is the weighted average time to receive all cash flows from a bond.

  • Both measures help investors assess interest rate risk and make informed investment decisions.

  • For example, a bond with a longer Macaulay duration will be more sensitive to changes in interest rates than a bon...read more

Add your answer

Q128. Risk threat and vulnerability differene

Ans.

Risk, threat, and vulnerability are different concepts in security.

  • Risk is the likelihood of a threat exploiting a vulnerability and causing harm.

  • Threat is a potential danger that can exploit a vulnerability.

  • Vulnerability is a weakness or gap in security that can be exploited by a threat.

  • Example: A vulnerability in a software system can be exploited by a hacker (threat) to cause a data breach (risk).

Add your answer

Q129. Components vs Directives

Ans.

Components are reusable building blocks while directives are used to manipulate the DOM.

  • Components are self-contained and can be used multiple times in an application

  • Directives are used to add behavior to an existing DOM element

  • Components have their own template while directives do not

  • Examples of components include buttons, forms, and menus

  • Examples of directives include ngIf, ngFor, and ngStyle

Add your answer

Q130. Change detection strategy

Ans.

Change detection strategy involves identifying and responding to changes in a system or process.

  • Define the scope of the system or process being monitored

  • Establish a baseline for normal behavior

  • Use monitoring tools to detect changes

  • Set thresholds for triggering alerts or actions

  • Implement a response plan for identified changes

Add your answer

Q131. javascript vs typescript

Ans.

TypeScript is a superset of JavaScript that adds static typing and other features.

  • TypeScript catches errors at compile time, while JavaScript only catches them at runtime.

  • TypeScript supports object-oriented programming concepts like classes and interfaces.

  • TypeScript can be transpiled into JavaScript, so it can run on any browser or platform that supports JavaScript.

  • JavaScript is easier to learn and use for small projects, while TypeScript is better for larger, more complex pr...read more

Add your answer

Q132. Route guards in angular

Ans.

Route guards are used in Angular to protect routes from unauthorized access.

  • Route guards can be used to check if a user is authenticated before allowing access to a route.

  • There are three types of route guards: CanActivate, CanActivateChild, and CanLoad.

  • CanActivate is used to protect individual routes, CanActivateChild is used to protect child routes, and CanLoad is used to protect lazy-loaded modules.

  • Route guards can be implemented using services or functions that return a bo...read more

Add your answer

Q133. Cryptography and its types

Ans.

Cryptography is the practice of secure communication in the presence of third parties.

  • Symmetric-key cryptography

  • Asymmetric-key cryptography

  • Hash functions

  • Encryption algorithms

  • Digital signatures

Add your answer

Q134. Oops concepts and implementation

Ans.

Oops concepts are fundamental principles of object-oriented programming used for designing and implementing software.

  • Encapsulation: bundling data and methods that operate on the data into a single unit

  • Inheritance: creating new classes using existing classes as blueprints

  • Polymorphism: ability of objects to take on multiple forms

  • Abstraction: hiding the complex implementation details and showing only the necessary features

Add your answer

Q135. What is Corporate action

Ans.

Corporate action refers to any event initiated by a publicly-traded company that affects its stakeholders and requires their approval.

  • Corporate actions can be voluntary or mandatory

  • Examples of corporate actions include stock splits, mergers and acquisitions, dividend payments, and spin-offs

  • Corporate actions can have a significant impact on the value of a company's stock and its shareholders

  • Shareholders are typically notified of corporate actions through official announcements...read more

Add your answer

Q136. What is caluleter?

Add your answer

Q137. Difference between SSL and TLS

Ans.

SSL and TLS are both cryptographic protocols used to secure internet communications.

  • SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.

  • TLS stands for Transport Layer Security and is the successor to SSL.

  • TLS is more secure than SSL and offers better encryption algorithms.

  • TLS also supports newer protocols and ciphers, while SSL does not.

  • SSL is vulnerable to attacks such as POODLE and BEAST, while TLS is not.

  • TLS is used for securin...read more

Add your answer

Q138. What is capital Market.

Ans.

Capital market is a financial market where long-term securities such as stocks, bonds, and other investments are traded.

  • Capital market is a platform for companies to raise funds for long-term investments.

  • It includes both primary and secondary markets.

  • Investors can buy and sell securities in the capital market.

  • Examples of capital market include stock exchanges, bond markets, and derivatives markets.

Add your answer

Q139. Behavior Subject vs SUbject

Ans.

Behavior Subject is a type of Subject in RxJS used for emitting values and managing subscriptions.

  • Behavior Subject is a type of Subject in RxJS.

  • It emits the most recent value to new subscribers.

  • It retains the last emitted value and emits it immediately upon subscription.

  • Example: const subject = new BehaviorSubject(0);

Add your answer

Q140. What are routing protocols?

Ans.

Routing protocols are sets of rules that determine how routers communicate with each other to forward data packets across networks.

  • Routing protocols are used to exchange routing information between routers.

  • They help routers determine the best path for forwarding data packets.

  • Examples of routing protocols include OSPF, BGP, and RIP.

  • Routing protocols can be classified as either interior gateway protocols (IGPs) or exterior gateway protocols (EGPs).

  • IGPs are used within a single ...read more

Add your answer

Q141. What is view? What is cte

Ans.

A view is a virtual table created by a query. CTE stands for Common Table Expression, which is a temporary result set.

  • View is a saved SQL query that acts as a virtual table

  • CTE is a temporary result set that can be referenced within a query

  • Views can be used to simplify complex queries and provide a layer of abstraction

  • CTEs are useful for recursive queries or when a result set needs to be referenced multiple times

Add your answer

Q142. JAVA CODES FOR BEGINNER

Ans.

Java codes for beginners include basic syntax, data types, control structures, and object-oriented programming concepts.

  • Learn basic syntax and data types such as int, double, and String.

  • Understand control structures like if-else statements and loops.

  • Familiarize yourself with object-oriented programming concepts like classes and objects.

  • Practice coding exercises and projects to reinforce your learning.

  • Utilize online resources and tutorials to supplement your learning.

  • Examples:...read more

Add your answer

Q143. NODE FUNCTIONS FOR BINARY

Ans.

Node functions for binary are used to manipulate binary data in Node.js.

  • The Buffer class is used to handle binary data in Node.js.

  • The `toString()` method can be used to convert binary data to a string.

  • The `write()` method can be used to write binary data to a buffer.

  • The `read()` method can be used to read binary data from a buffer.

  • The `slice()` method can be used to extract a portion of a buffer.

  • The `concat()` method can be used to concatenate multiple buffers.

  • The `compare()`...read more

Add your answer

Q144. Reverse a string

Ans.

Reverse a string by iterating through the characters and swapping them

  • Create an empty string to store the reversed string

  • Iterate through the characters of the original string from end to start

  • Append each character to the new string

  • Return the reversed string

Add your answer

Q145. What is standalone database

Ans.

A standalone database is a database that is independent and does not require connection to a network or other databases.

  • Standalone databases are typically used for small-scale applications or for testing purposes.

  • They do not rely on a network connection to function.

  • Examples of standalone databases include SQLite and Microsoft Access.

Add your answer

Q146. What is borrowing, pay down

Ans.

Borrowing is obtaining funds from a lender, while pay down is the act of reducing the amount owed on a loan.

  • Borrowing involves taking out a loan or using credit to obtain funds.

  • Pay down refers to making payments towards reducing the outstanding balance on a loan.

  • Borrowing increases debt while pay down decreases debt.

  • Examples: Borrowing money from a bank to purchase a car, and then making monthly payments to pay down the loan.

  • Examples: Using a credit card to make a purchase is...read more

Add your answer

Q147. Routing in angular ?

Ans.

Routing in Angular is used to navigate between different components of an application.

  • Angular Router is a powerful tool that allows you to define navigation paths and routes in your application.

  • It helps in creating Single Page Applications (SPAs) by loading different components based on the URL.

  • Routes can be defined using the RouterModule and ActivatedRoute modules.

  • Navigation can be done using routerLink directive or programmatically using Router service.

  • Guards can be used to...read more

Add your answer

Q148. OOPS pillers and explanation

Ans.

OOPS pillars are the four main principles of Object-Oriented Programming: Encapsulation, Inheritance, Polymorphism, and Abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Allowing a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q149. Assistant name is RBI?

Add your answer

Q150. How to configure IP address

Ans.

Configuring an IP address involves assigning a unique numerical label to a device connected to a network.

  • Access the network settings on the device

  • Choose the option to manually configure the IP address

  • Enter the desired IP address, subnet mask, default gateway, and DNS server

  • Save the settings and restart the device if necessary

Add your answer

Q151. What is dependancy Injection?

Ans.

Dependency Injection is a design pattern where the dependencies of a class are provided from the outside rather than created within the class itself.

  • Allows for easier testing by providing mock dependencies

  • Promotes loose coupling between classes

  • Improves code reusability and maintainability

  • Commonly implemented using frameworks like Spring in Java

Add your answer

Q152. What is UPS and transformer

Ans.

UPS stands for Uninterruptible Power Supply, a device that provides emergency power to a load when the input power source fails. A transformer is a device that transfers electrical energy between two or more circuits through electromagnetic induction.

  • UPS ensures continuous power supply during power outages or fluctuations

  • Transformers are used to step up or step down voltage levels in electrical circuits

  • UPS typically uses batteries to store energy for backup power

  • Transformers ...read more

Add your answer

Q153. What's is accrual & prepaid

Ans.

Accrual is recognizing revenue or expenses before cash is exchanged. Prepaid is recognizing payment before goods or services are received.

  • Accrual is a method of accounting that recognizes revenue or expenses before cash is exchanged.

  • Prepaid is a method of accounting that recognizes payment before goods or services are received.

  • Accruals are used to match revenue and expenses to the period in which they are earned or incurred.

  • Prepaid expenses are assets that represent payments ...read more

Add your answer

Q154. Sales documents vs Billing document

Ans.

Sales documents record the sale of goods or services, while billing documents are used to request payment for those goods or services.

  • Sales documents typically include details of the products or services sold, such as quantity, price, and customer information.

  • Billing documents are generated after the sale to request payment from the customer, and may include payment terms, due dates, and total amount due.

  • Sales documents are used to track revenue and sales performance, while b...read more

Add your answer

Q155. What is Accrual?

Ans.

Accrual is a method of accounting where revenues and expenses are recorded when they are earned or incurred, regardless of when cash is exchanged.

  • Accrual accounting recognizes revenue when it is earned, not when it is received.

  • Expenses are recognized when they are incurred, not when they are paid.

  • Accrual accounting provides a more accurate representation of a company's financial position and performance.

  • Examples include recognizing revenue from a sale when the goods are deliv...read more

Add your answer

Q156. Ssl nd tls difference

Ans.

SSL and TLS are both cryptographic protocols used to secure data transmission over the internet.

  • SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.

  • SSL is an older protocol and has been replaced by TLS.

  • TLS is more secure than SSL and has better encryption algorithms.

  • Both SSL and TLS use digital certificates to authenticate the server and establish a secure connection.

  • TLS is backwards compatible with SSL, meaning that TLS can be used to secure conne...read more

Add your answer

Q157. How does Bert embeddings work

Ans.

Bert embeddings is a language model that generates contextualized word embeddings.

  • Bert stands for Bidirectional Encoder Representations from Transformers.

  • It uses a transformer architecture to generate word embeddings that take into account the context of the word.

  • Bert embeddings are pre-trained on large amounts of text data and can be fine-tuned for specific NLP tasks.

  • They have been shown to outperform traditional word embeddings like Word2Vec and GloVe.

  • Example applications i...read more

Add your answer

Q158. Any certification?

Ans.

Yes, I have certifications in Java and AWS.

  • Certified in Java programming language

  • Certified in Amazon Web Services (AWS)

Add your answer

Q159. How to Handel difficult client

Add your answer

Q160. What is docker architecture?

Add your answer

Q161. Basic principles of security management?

Ans.

Basic principles of security management involve risk assessment, access control, incident response, and security awareness.

  • Risk assessment: Identifying and evaluating potential risks to the organization's security.

  • Access control: Implementing measures to control who has access to sensitive information or resources.

  • Incident response: Developing plans and procedures to respond to security incidents effectively.

  • Security awareness: Educating employees and users about security bes...read more

Add your answer

Q162. What is nat?

Ans.

NAT stands for Network Address Translation. It is a process of modifying IP address information in IP packet headers while in transit across a traffic routing device.

  • NAT is used to conserve IP addresses by allowing multiple devices to share a single public IP address.

  • It can also be used to provide security by hiding the internal IP addresses of a network from the public internet.

  • There are different types of NAT such as Static NAT, Dynamic NAT, and Port Address Translation (PA...read more

Add your answer

Q163. Diffrence Between tuple and list

Ans.

Tuple is immutable and fixed in size, while list is mutable and can change in size.

  • Tuple is defined using parentheses, while list is defined using square brackets.

  • Tuple elements can be accessed using index, while list elements can be modified using index.

  • Tuple is faster than list for iteration and accessing elements.

  • Example: tuple = (1, 2, 3), list = [1, 2, 3]

Add your answer

Q164. Procedures in Mainframe

Ans.

Procedures in Mainframe are sets of instructions that automate tasks and ensure consistency.

  • Procedures are written in JCL (Job Control Language) and can be executed manually or scheduled to run automatically.

  • They can be used for tasks such as backups, file transfers, and system maintenance.

  • Procedures can include condition codes to handle errors and exceptions.

  • They can also be nested within other procedures for more complex tasks.

  • Examples of procedures include IBM's DFSMSrmm f...read more

Add your answer

Q165. Necessity and process of analysis

Ans.

Analysis is necessary to understand the problem and find the best solution. It involves gathering data, identifying patterns, and making informed decisions.

  • Analysis helps to identify the root cause of a problem

  • It helps to gather relevant data and information

  • It involves identifying patterns and trends

  • Analysis helps to make informed decisions and find the best solution

  • Examples include market analysis, financial analysis, and data analysis

Add your answer

Q166. different security tools

Ans.

Security tools are software programs or hardware devices that help protect computer systems and networks from cyber threats.

  • Firewalls: monitor and control incoming and outgoing network traffic based on predetermined security rules.

  • Antivirus software: detects and removes malicious software, such as viruses, worms, and trojans.

  • Intrusion Detection Systems (IDS): monitor network traffic for suspicious activity and alert administrators.

  • Virtual Private Networks (VPNs): encrypt inte...read more

Add your answer

Q167. What is test automation

Add your answer

Q168. What is rollover

Ans.

Rollover is the process of reinvesting funds from a mature security or investment into a new security or investment.

  • Rollover typically occurs when an investor's current investment reaches maturity and they choose to reinvest the funds into a similar or different investment.

  • Common examples of rollover include rolling over a maturing certificate of deposit (CD) into a new CD or rolling over a 401(k) account into an Individual Retirement Account (IRA).

Add your answer

Q169. Challenges faced in fraud department

Ans.

Challenges in fraud department include evolving fraud tactics, high volume of transactions, and balancing fraud prevention with customer experience.

  • Evolving fraud tactics require constant monitoring and updating of fraud detection systems.

  • High volume of transactions increases the likelihood of fraudulent activity going unnoticed.

  • Balancing fraud prevention measures with providing a seamless customer experience can be challenging.

  • Collaborating with other departments such as IT ...read more

Add your answer

Q170. What is vMotion?

Ans.

vMotion is a feature in VMware that allows live migration of virtual machines between physical servers without downtime.

  • vMotion enables workload balancing, hardware maintenance, and data center consolidation.

  • It requires shared storage between the source and destination hosts.

  • vMotion can be initiated manually or automatically based on resource utilization.

  • It is a key feature in VMware's vSphere suite of virtualization products.

  • Example: Moving a virtual machine from one host to...read more

Add your answer

Q171. What is loan syndication

Ans.

Loan syndication is the process of involving multiple lenders to provide funds for a single borrower.

  • Involves multiple lenders

  • Used for large loan amounts

  • Helps spread risk among lenders

  • Common in project finance

  • Lead arranger coordinates the syndication

Add your answer

Q172. What is earthing

Ans.

Earthing is the process of connecting electrical systems to the ground to prevent electric shocks and ensure safety.

  • Earthing helps to protect against electrical faults and lightning strikes.

  • It provides a path for fault currents to flow safely into the ground.

  • Earthing is essential in electrical systems to prevent damage to equipment and ensure safety of individuals.

  • Examples of earthing include grounding rods, grounding wires, and grounding plates.

Add your answer

Q173. Amendment vs addendum

Ans.

An amendment is a change or alteration to an existing document, while an addendum is an additional document added to provide extra information.

  • Amendment modifies existing content in a document.

  • Addendum adds new information or details to a document.

  • Amendment requires all parties to agree to the changes.

  • Addendum can be added unilaterally by one party.

  • Example: An amendment to a contract changes the payment terms. An addendum to a report includes additional data.

Add your answer

Q174. Types of Mutual Funds

Ans.

Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of securities.

  • Mutual funds are managed by professional fund managers.

  • They offer investors the opportunity to invest in a wide range of assets, such as stocks, bonds, and commodities.

  • There are different types of mutual funds, including equity funds, bond funds, money market funds, and index funds.

  • Equity funds invest primarily in stocks, while bond funds invest in f...read more

Add your answer

Q175. Binary search tree program

Ans.

A binary search tree program is a data structure that allows efficient searching, insertion, and deletion of elements.

  • The left subtree of a node contains only nodes with keys lesser than the node's key

  • The right subtree of a node contains only nodes with keys greater than the node's key

  • The left and right subtree each must also be a binary search tree

  • Example: Inserting elements 5, 3, 7, 1, 9, 4, and 6 in a binary search tree

  • Example: Searching for element 4 in the binary search ...read more

Add your answer

Q176. Your family back ground

Ans.

My family background is diverse and multicultural.

  • My parents are from different countries and cultures.

  • I grew up speaking multiple languages at home.

  • My family values education and hard work.

  • We enjoy learning about different cultures and trying new foods.

  • Family gatherings are always lively and full of laughter.

Add your answer

Q177. Technologies you’ve worked on

Ans.

I have experience working with a variety of technologies including SQL, Python, Tableau, and Jira.

  • SQL

  • Python

  • Tableau

  • Jira

Add your answer

Q178. Basic troubleshooting steps

Ans.

Basic troubleshooting steps involve identifying the issue, gathering information, isolating the problem, testing solutions, and implementing fixes.

  • Identify the issue by gathering information from the user or system logs.

  • Isolate the problem by determining if it's a hardware or software issue.

  • Test solutions by trying different troubleshooting steps or tools.

  • Implement fixes by applying patches, updates, or configuration changes.

  • Document the troubleshooting process for future ref...read more

Add your answer

Q179. Corporate Action meaning

Ans.

Corporate Action refers to an event initiated by a publicly traded company that impacts its shareholders or securities.

  • Corporate actions can include stock splits, dividends, mergers, acquisitions, spin-offs, and rights issues.

  • These actions can affect the value of the company's stock and the overall investment portfolio of shareholders.

  • Investors need to stay informed about corporate actions to make informed decisions about their investments.

Add your answer

Q180. Basic services in cloud?

Add your answer

Q181. Location of office

Ans.

Our office is located in the heart of downtown, easily accessible by public transportation.

  • Located in downtown area

  • Accessible by public transportation

  • Close to major landmarks and amenities

Add your answer

Q182. frequency of each character

Ans.

The frequency of each character in a given string is calculated and displayed.

  • Iterate through the string and count the occurrences of each character

  • Store the counts in a data structure like a hashmap or array

  • Return the frequency of each character

Add your answer

Q183. Explain ADDS Infrastructure

Ans.

ADDS Infrastructure is a set of services and tools provided by Microsoft to manage users, computers, and other resources in a network.

  • ADDS stands for Active Directory Domain Services

  • It provides centralized authentication and authorization for network resources

  • It allows for the creation of domains, forests, and trusts

  • It includes tools such as Active Directory Users and Computers, Group Policy Management, and DNS Manager

  • It can be used to manage Windows-based servers, workstatio...read more

Add your answer

Q184. OSI model layers details

Ans.

The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

  • The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and data representatio...read more

Add your answer

Q185. Credit Flow for Payments

Ans.

Credit flow for payments refers to the process of how funds are transferred from the payer to the payee.

  • Credit flow involves multiple parties such as banks, payment processors, and merchants.

  • The process typically starts with the payer initiating a payment through a payment gateway.

  • The payment gateway then sends the payment information to the acquiring bank, which processes the payment and sends it to the issuing bank.

  • The issuing bank then approves or declines the payment and ...read more

Add your answer

Q186. What is expected CTC

Ans.

Expected CTC should be based on industry standards, experience, and skills.

  • Expected CTC should be in line with industry standards for the position

  • Consider the candidate's level of experience and skills when determining the expected CTC

  • Factors such as location, company size, and benefits package can also impact the expected CTC

  • Provide a range rather than a specific number to allow for negotiation

Add your answer

Q187. Discuss about OWASP features

Ans.

OWASP features are security standards and best practices for web applications.

  • OWASP Top 10 is a list of the top 10 most critical web application security risks.

  • OWASP ZAP is a popular security tool for finding vulnerabilities in web applications.

  • OWASP ASVS provides a framework for building secure applications.

  • OWASP SAMM is a maturity model for software assurance that helps organizations assess and improve their security practices.

Add your answer

Q188. Troubleshooting techniques

Ans.

Troubleshooting techniques involve identifying, isolating, and resolving issues in a systematic manner.

  • Gather information about the issue from users or logs

  • Identify the root cause of the problem

  • Isolate the issue to determine the scope of impact

  • Develop a plan to resolve the issue

  • Implement the solution and test to ensure it is fixed

  • Document the troubleshooting process for future reference

Add your answer

Q189. Find duplicates in array

Ans.

Find duplicates in array of strings

  • Iterate through the array and store each element in a hash set

  • If an element is already in the hash set, it is a duplicate

  • Return a list of all duplicates found

Add your answer

Q190. Types of DR strategies

Add your answer

Q191. custom directive example

Ans.

Custom directives are used in AngularJS to extend the functionality of HTML elements.

  • Directives are defined using the directive() method

  • They can be used to create reusable components

  • Example:

Add your answer

Q192. Create a SQL Procedure.

Add your answer

Q193. Explain OSI reference model

Ans.

The OSI reference model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model

  • It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application

  • Each layer has specific functions and interacts with adjacent layers for data transmission

  • For example, the Physical layer deals with the physical c...read more

Add your answer

Q194. .Net Core difference

Ans.

.Net Core is a cross-platform, open-source framework for building modern applications.

  • Supports development on Windows, Linux, and macOS

  • Modular architecture allows for lightweight and efficient applications

  • Includes ASP.NET Core for building web applications

  • Provides improved performance and scalability compared to .NET Framework

  • Supports containerization and microservices architecture

  • Example: .NET Core is used to build applications like Microsoft Teams, Visual Studio Code, and A...read more

Add your answer

Q195. IndAS 115 Explain

Ans.

IndAS 115 is a new revenue recognition standard that impacts how revenue is recognized in financial statements.

  • IndAS 115 replaces the existing revenue recognition standards and provides a comprehensive framework for recognizing revenue from contracts with customers.

  • It focuses on identifying performance obligations in a contract, determining the transaction price, allocating the transaction price to the performance obligations, and recognizing revenue when the performance obli...read more

Add your answer

Q196. Life cycle of loan

Ans.

The life cycle of a loan involves several stages from application to repayment.

  • Application: Borrower submits application with necessary documents

  • Approval: Lender reviews application and approves or denies loan

  • Disbursement: Loan amount is disbursed to borrower

  • Repayment: Borrower makes regular payments to repay the loan

  • Closure: Loan is fully repaid and closed

  • Default: Borrower fails to repay loan leading to legal actions

Add your answer

Q197. Define bug cycle

Ans.

Bug cycle is the process of identifying, reporting, fixing, retesting, and closing bugs in software development.

  • Bug is identified by QA Engineer during testing phase

  • Bug is reported to development team for fixing

  • Development team fixes the bug

  • QA Engineer retests the bug to verify the fix

  • If bug is fixed, it is closed. If not, cycle repeats

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at ExpertLancing Research Services

based on 327 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 431 Interview Questions
4.4
 • 202 Interview Questions
4.0
 • 178 Interview Questions
3.1
 • 168 Interview Questions
3.9
 • 140 Interview Questions
3.7
 • 139 Interview Questions
View all
Top FIS Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter