i
FIS
Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I was interviewed in Feb 2025.
Sort an array of strings containing both letters and numbers, with letters on the left and numbers on the right.
Create two separate arrays for letters and numbers
Iterate through the original array and separate letters and numbers into their respective arrays
Combine the two arrays with letters first and numbers next
High severity but low priority scenarios are those that have a significant impact but can be addressed at a later stage.
User interface issues that do not affect critical functionality
Minor spelling or grammar errors
Non-critical performance issues
Low impact cosmetic defects
Project frameworks are structures that provide guidelines and best practices for managing projects.
Waterfall model
Agile framework
Scrum methodology
Kanban method
Lean approach
We utilize various classes while coding to organize and structure our code.
Classes help in organizing code into logical units
Classes can be used for creating objects with properties and methods
Inheritance allows classes to inherit properties and methods from other classes
Examples: String, Integer, List, HashMap
Our framework is a hybrid framework combining data-driven and keyword-driven approaches for efficient and scalable testing.
Combines data-driven and keyword-driven testing
Allows for reusable test scripts and data separation
Supports automation of test cases with minimal coding
Enhances test coverage and scalability
Example: Using Excel sheets for test data and keywords for test actions
API testing is essential to ensure the functionality, reliability, performance, and security of APIs. Results should be reported clearly and comprehensively.
API testing involves testing the functionality, reliability, performance, and security of APIs by sending requests and validating responses.
Results of API testing should be reported in a clear and detailed manner, including information on test cases, test data, exp...
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
What people are saying about FIS
I applied via Referral and was interviewed in Sep 2024. There were 3 interview rounds.
Pronunciation and communication skills were checked
Experienced customer service professional with 5+ years in the industry. Skilled in handling customer inquiries and resolving issues efficiently.
5+ years of experience in customer service
Strong communication and problem-solving skills
Ability to handle customer inquiries and resolve issues efficiently
Proficient in using CRM systems and other customer service tools
Seeking new challenges and opportunities for growth.
Desire for career advancement
Seeking new challenges
Opportunity for professional growth
Relocation
Company downsizing
Childhood memories are filled with joy, innocence, and adventure.
Playing with neighborhood friends until the street lights came on
Family vacations to the beach or mountains
Celebrating birthdays with homemade cakes and games
Exploring the backyard or local park for hidden treasures
Learning to ride a bike or swim for the first time
FIS interview questions for popular designations
I applied via Campus Placement and was interviewed in Sep 2024. There were 2 interview rounds.
Round 1 had aptitude and technical questions.
Get interview-ready with Top FIS Interview Questions
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
Basic troubleshooting steps involve identifying the issue, gathering information, isolating the problem, testing solutions, and implementing fixes.
Identify the issue by gathering information from the user or system logs.
Isolate the problem by determining if it's a hardware or software issue.
Test solutions by trying different troubleshooting steps or tools.
Implement fixes by applying patches, updates, or configuration c...
I want to join this company because of its reputation for innovation and growth opportunities.
Impressed by company's track record of innovation
Excited about potential for growth and advancement
Align with company values and culture
In 5 years, I see myself as a Senior Analyst L3, leading a team and contributing to strategic decision-making.
Advancing to Senior Analyst L3 role
Leading a team of analysts
Contributing to strategic decision-making
Continuing professional development through certifications or further education
I reassigned before receiving an offer letter due to personal reasons and a better opportunity.
Received a better job offer with higher pay or better benefits
Personal reasons such as family relocation or health issues
Company restructuring or change in job role
I am passionate about utilizing my skills and experience to make a meaningful impact in this role.
I have a strong background in data analysis and problem-solving, which aligns well with the requirements of this position.
I am excited about the opportunity to work with a team of talented professionals and contribute to the success of the organization.
I am eager to take on new challenges and continue to grow and develop p
In my previous roles, I have been responsible for analyzing business processes, gathering requirements, and creating solutions to improve efficiency.
Analyzed current business processes to identify areas for improvement
Gathered requirements from stakeholders to understand their needs
Created solutions such as process improvements or new software implementations
Collaborated with cross-functional teams to ensure successful
I have experience working with a variety of technologies including SQL, Python, Tableau, and Jira.
SQL
Python
Tableau
Jira
I applied via LinkedIn and was interviewed in Dec 2024. There were 2 interview rounds.
Online Test having MCQs
Data points for underwriting include financial history, credit score, employment status, and insurance claims.
Financial history (income, assets, debts)
Credit score
Employment status
Insurance claims history
Some of the top questions asked at the FIS interview -
The duration of FIS interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 336 interviews
Interview experience
Senior Software Engineer
2.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
1.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Engineer
709
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Member
652
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Leader Engineer
649
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech