Filter interviews by
Be the first one to contribute and help others!
posted on 11 Jan 2025
I was interviewed in Jan 2025.
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
SAML flow is a process for exchanging authentication and authorization data between identity providers and service providers.
SAML flow involves the exchange of XML-based security assertions.
It typically includes steps such as authentication request, response, and validation.
SAML flow can be initiated by a user trying to access a service that requires authentication.
It helps establish trust between different systems by
Pinfedarte is a security mechanism used in computer systems to prevent unauthorized access.
Pinfedarte is a form of access control that restricts users from accessing certain resources or performing specific actions.
It typically involves the use of passwords, encryption, biometrics, or other authentication methods.
Pinfedarte helps protect sensitive information and prevent security breaches.
Examples of pinfedarte include...
OAUTH flows are different ways in which a client application can obtain authorization to access resources on behalf of a user.
Authorization Code Flow: Client exchanges an authorization code for an access token.
Implicit Flow: Client receives access token directly.
Client Credentials Flow: Client uses its own credentials to authenticate and receive access token.
Resource Owner Password Credentials Flow: Client collects use...
Yes, I am familiar with Dynatrace and Sumo Logic tools.
I have experience using Dynatrace for application performance monitoring and management.
I have used Sumo Logic for log management and analytics.
I am proficient in setting up alerts, dashboards, and troubleshooting issues using these tools.
I applied via campus placement at BRACT's Vishwakarma Institute of Information Technology, Pune and was interviewed in Oct 2024. There was 1 interview round.
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to be used for different data types or classes.
Examples include method overloading and method overriding in object-oriented programming.
Find missing number from nth number array.
Iterate through the array and calculate the sum of all numbers
Calculate the sum of numbers from 1 to n using the formula n*(n+1)/2
Subtract the sum of array from the sum of numbers from 1 to n to find the missing number
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows a class to reuse code from another class.
Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.
Example: Class B inherits from Class A, so Class B can access
Find 2nd max element from array of strings
Sort the array in descending order
Skip the first element (max element)
Return the second element
I applied via Approached by Company and was interviewed in Oct 2024. There were 5 interview rounds.
Various assignments.
Task included marketing strategies and planning for the company
Again assignment given
posted on 23 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There were 5 interview rounds.
Easy Level DS Questions - 30 mins
A comprehensive coding test which included job role simulation.
Advanced Cloud Services questions
I am a Senior Software Developer with 8 years of experience in full-stack development, specializing in Java and Angular.
8 years of experience in full-stack development
Specialize in Java and Angular
Strong problem-solving skills
Experience working in agile environments
posted on 14 Oct 2024
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There was 1 interview round.
Wifi AC is the 5th generation of wifi technology, while Wifi Ax is the 6th generation with improved speed and efficiency.
Wifi AC operates on the 5 GHz band, while Wifi Ax operates on both 2.4 GHz and 5 GHz bands.
Wifi Ax supports MU-MIMO (Multi-User, Multiple Input, Multiple Output) technology for better performance in crowded networks.
Wifi Ax offers higher data rates and improved efficiency compared to Wifi AC.
Wifi Ax ...
DTIM stands for Delivery Traffic Indication Message, used in Wi-Fi networks to inform clients about the presence of buffered broadcast and multicast frames.
DTIM is a parameter in the Wi-Fi beacon frame that indicates to clients how often they should wake up to receive broadcast and multicast traffic.
It helps in saving battery life for devices by allowing them to sleep for longer periods of time.
Clients can set their po...
2 coding questions were given , Running atleast one question with all test cases passing is mandatory.
I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.
JAM just introduce yourself or speak on sometime topic shared
English knowledge pen n paper
I applied via Naukri.com and was interviewed in Apr 2024. There were 4 interview rounds.
ABEC
Timezone Entertainment
Adlabs Imagica
IRIS Global Media