Premium Employer

HCLTech

3.5
based on 36.3k Reviews
Filter interviews by

1000+ DSP Mutual Fund Interview Questions and Answers

Updated 3 Mar 2025
Popular Designations

Q1. What is IP address and how many classes are there in IPv4 addressing mode and what are there ranges?

Ans.

IP address is a unique identifier assigned to devices on a network. There are 4 classes in IPv4 addressing mode with different ranges.

  • IP address is a numerical label assigned to each device on a network

  • IPv4 addressing mode has 4 classes: A, B, C, and D

  • Class A ranges from 1.0.0.0 to 126.0.0.0

  • Class B ranges from 128.0.0.0 to 191.255.0.0

  • Class C ranges from 192.0.0.0 to 223.255.255.0

  • Class D is reserved for multicast addresses

View 6 more answers

Q2. Nth Fibonacci Number Problem Statement

Calculate the Nth term in the Fibonacci sequence, where the sequence is defined as follows: F(n) = F(n-1) + F(n-2), with initial conditions F(1) = F(2) = 1.

Input:

The inp...read more
Ans.

Calculate the Nth Fibonacci number efficiently using dynamic programming.

  • Use dynamic programming to store previously calculated Fibonacci numbers to avoid redundant calculations.

  • Start with base cases F(1) and F(2) as 1, then iterate to calculate subsequent Fibonacci numbers.

  • Return the Nth Fibonacci number as the final result.

View 1 answer

Q3. Reverse Array Elements

Given an array containing 'N' elements, the task is to reverse the order of all array elements and display the reversed array.

Explanation:

The elements of the given array need to be rear...read more

Ans.

Reverse the order of elements in an array and display the reversed array.

  • Create a function that takes an array as input

  • Use a loop to iterate through the array and swap elements at opposite ends

  • Return the reversed array

View 1 answer

Q4. Have you heard about OSI reference model? How many layers are there in OSI model? Explain any 3 layers.

Ans.

Answering about OSI reference model and its layers

  • OSI reference model has 7 layers

  • Physical layer deals with physical transmission of data

  • Data link layer provides error-free transfer of data

  • Network layer handles routing and logical addressing

View 5 more answers
Discover DSP Mutual Fund interview dos and don'ts from real experiences

Q5. What is the purpose of react and it's latest hooks?

Ans.

React is a JavaScript library for building user interfaces. React Hooks are a feature introduced in React 16.8 to manage state and lifecycle in functional components.

  • React is used for creating reusable UI components

  • React allows for efficient rendering and updating of components

  • React Hooks provide a way to use state and other React features in functional components

  • Hooks like useState and useEffect are commonly used in React applications

View 1 answer

Q6. Oops Difference between classes and interfaces, use of getter and setters, instance variable vs local variable, encapsulation, do multiple catch block exist, use of final keyword, stringbuffer vs stringbuilder,...

read more
Ans.

A software engineer interview question covering various Java concepts.

  • Classes are blueprints for objects, while interfaces define a set of methods that a class must implement.

  • Getter and setter methods are used to access and modify the values of instance variables.

  • Instance variables are declared within a class and are accessible throughout the class, while local variables are declared within a method and are only accessible within that method.

  • Encapsulation is the practice of h...read more

Add your answer
Are these interview questions helpful?

Q7. What is JDK JRE JVM ? Java8 features

Ans.

JDK is Java Development Kit, JRE is Java Runtime Environment, and JVM is Java Virtual Machine. Java8 features include lambda expressions, streams, and default methods.

  • JDK is a software development kit that provides tools for developing, debugging, and monitoring Java applications.

  • JRE is a runtime environment that allows running Java applications. It includes JVM and necessary libraries.

  • JVM is a virtual machine that executes Java bytecode. It provides platform independence and...read more

View 7 more answers

Q8. What is ITIL? What is difference between Incident and service request?

Ans.

ITIL is a framework for IT service management. Incident is an unplanned interruption while service request is a planned request.

  • ITIL stands for Information Technology Infrastructure Library

  • It is a framework for IT service management

  • It provides guidelines for delivering IT services efficiently and effectively

  • Incident is an unplanned interruption to an IT service or a reduction in the quality of an IT service

  • Service request is a formal request from a user for something to be pr...read more

View 2 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. Do you know what is BSOD and how to resolve it?

Ans.

BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a critical system error occurs.

  • BSOD is a stop error screen that appears when the Windows operating system encounters a fatal system error.

  • It is usually caused by hardware or driver issues, software conflicts, or system file corruption.

  • To resolve BSOD, one can try restarting the computer, updating drivers, running hardware diagnostics, or performing a system restore.

  • Examples...read more

View 1 answer

Q10. Which BGP path attributes are used to manipulate the ingress traffic and how traffic is transit from one AS to another AS via 3rd AS?

Ans.

BGP path attributes used to manipulate ingress traffic and transit via 3rd AS.

  • AS Path attribute is used to manipulate ingress traffic by adding or removing AS numbers.

  • Local Preference attribute is used to influence the path selection within the same AS.

  • MED (Multi-Exit Discriminator) attribute is used to influence the path selection between different ASes.

  • Communities attribute is used to tag routes and influence the path selection in a specific way.

  • Transit traffic via 3rd AS c...read more

View 1 answer

Q11. What is Active Directory and What are its uses?

Ans.

Active Directory is a directory service that stores information about network resources and enables centralized management.

  • Active Directory is used to manage and organize users, computers, and other network resources in a Windows domain.

  • It provides authentication and authorization services, allowing users to access resources based on their permissions.

  • Active Directory enables single sign-on, where users can log in once and access multiple resources without re-authentication.

  • I...read more

View 2 more answers

Q12. What is Active Directory? How do we manage role from active directory

Ans.

Active Directory is a Microsoft service that manages network resources and user access.

  • Active Directory is used to manage user accounts, computers, and other network resources.

  • It allows for centralized authentication and authorization for users and computers in a network.

  • Roles can be managed through Active Directory by assigning users to specific groups with corresponding permissions.

  • Examples of roles that can be managed through Active Directory include domain administrators,...read more

View 4 more answers

Q13. Spring boot: Various Annotations, Difference b/w @RestController vs @Controller , @Bean vs @Component, @RequestMapping vs @GetMapping,

Ans.

Explaining various Spring Boot annotations and their differences.

  • RestController vs Controller: RestController is used for RESTful web services while Controller is used for traditional web applications.

  • Bean vs Component: Bean is used to define a single object while Component is used to define a class as a Spring-managed component.

  • RequestMapping vs GetMapping: RequestMapping is used to map HTTP requests while GetMapping is used specifically for GET requests.

Add your answer

Q14. Do you know about ticketing tools?

Ans.

Yes, I am familiar with ticketing tools.

  • I have experience using ticketing tools such as ServiceNow and JIRA.

  • I understand how to create, update, and close tickets.

  • I am able to prioritize tickets based on urgency and impact.

  • I am familiar with using ticketing tools to track and report on service desk metrics.

View 2 more answers

Q15. What is Active Directory? Difference between MDM and MAM. What do you know about Microsoft Intune? How does Azure Active directory work? What is Exchange Active Sync

Ans.

Active Directory is a Microsoft service that manages user accounts and permissions. MDM and MAM are mobile device management and mobile application management. Microsoft Intune is a cloud-based MDM/MAM solution. Azure Active Directory is a cloud-based identity and access management service. Exchange Active Sync is a protocol used to synchronize email, contacts, and calendar data between servers and mobile devices.

  • Active Directory manages user accounts and permissions

  • MDM manag...read more

Add your answer

Q16. What are the features of Solar wind which you are aware of?

Ans.

Solar wind is a stream of charged particles released from the upper atmosphere of the Sun.

  • Solar wind is composed of electrons, protons, and alpha particles.

  • It can have speeds ranging from 250 to 800 km/s.

  • Solar wind can cause auroras and geomagnetic storms on Earth.

  • It can also affect satellite and spacecraft operations.

  • Solar wind is influenced by the Sun's magnetic field and can vary in intensity.

  • It is a key factor in space weather and space exploration.

View 3 more answers

Q17. String builder and string buffer When we create Arrays and when we create linked lists Treeset in Java Java 8 features Static keyword Dynamic method dispatch How to make a immutable class in Java Marker Interfa...

read more
Ans.

Questions related to Java programming language concepts and features.

  • StringBuilder and StringBuffer are used for efficient string manipulation.

  • Arrays are fixed in size while linked lists can grow dynamically.

  • TreeSet is a sorted set implementation in Java.

  • Java 8 introduced lambda expressions, streams, and functional interfaces.

  • Static keyword is used to create class-level variables and methods.

  • Dynamic method dispatch is the mechanism by which a call to an overridden method is r...read more

Add your answer

Q18. What is oops? Explain about oops? What is .net framework? What is page lifecycle? What is mvc?. Explain about mvc patterns?. Explain table, store procedure, views, functions in SQL?

Ans.

Questions related to software engineering concepts and SQL

  • OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects

  • .NET Framework is a software framework developed by Microsoft that provides a programming model for building applications

  • Page lifecycle refers to the stages that a web page goes through from creation to destruction

  • MVC stands for Model-View-Controller which is a software design pattern for developing web applicatio...read more

Add your answer

Q19. What is VTep? Explain the VLan data encapsulated with VXLAN header and fields used in it?

Ans.

VTep is a virtual tunnel endpoint used in VXLAN to extend Layer 2 networks over Layer 3 networks.

  • VTep is a software-based endpoint that terminates VXLAN tunnels.

  • It is used to extend Layer 2 networks over Layer 3 networks.

  • VXLAN header encapsulates the original Ethernet frame and adds a 24-bit VXLAN Network Identifier (VNI) to identify the virtual network.

  • The VLAN data is encapsulated with VXLAN header and fields like VNI, flags, and reserved bits are used in it.

Add your answer

Q20. what is difference between controller and rest controller?

Ans.

A controller is a component that handles incoming requests and returns a response, while a REST controller specifically handles RESTful requests.

  • A controller is responsible for handling various types of requests, such as HTTP, WebSocket, etc.

  • A REST controller is a type of controller that specifically handles RESTful requests, which follow the principles of Representational State Transfer (REST).

  • REST controllers typically use annotations like @RestController and @RequestMappin...read more

View 1 answer

Q21. Name and Explain types of Network?

Ans.

Types of networks include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.

  • LAN (Local Area Network) - a network that connects devices within a limited area

  • WAN (Wide Area Network) - a network that connects devices over a large geographical area

  • MAN (Metropolitan Area Network) - a network that connects devices within a city or metropolitan area

  • WLAN (Wireless Local Area Network) - a LAN that uses wireless connections

  • PAN (Personal Area Network) - a network that connects devices within ...read more

View 2 more answers

Q22. How would you design service layer for highly scalable application?

Ans.

Designing a service layer for a highly scalable application requires careful consideration of architecture and technology choices.

  • Use a microservices architecture to break down the application into smaller, more manageable components.

  • Implement load balancing and auto-scaling to ensure that the service layer can handle high traffic volumes.

  • Choose a technology stack that is well-suited to the specific needs of the application, such as high throughput or low latency.

  • Implement ca...read more

Add your answer

Q23. How SharePoint search is working and how we can define search architecture?

Ans.

SharePoint search is a powerful tool that allows users to find information within SharePoint sites.

  • SharePoint search uses a combination of crawling, indexing, and querying to retrieve search results.

  • The search architecture in SharePoint can be defined by configuring search components such as crawl components, content sources, and search scopes.

  • Crawling is the process of gathering information from content sources, such as SharePoint sites, file shares, or external websites.

  • Ind...read more

View 2 more answers

Q24. How we can find IP address of a system?

Ans.

To find the IP address of a system, use the command prompt or network settings.

  • Open command prompt and type 'ipconfig' to see the IP address

  • Go to network settings and click on 'Properties' to see the IP address

  • Use a network scanner tool to find IP addresses of all devices on the network

View 1 answer

Q25. In 5 programs without effecting one by one how can you debug a particular program and how can you know tha program is calling in debug

Ans.

To debug a particular program without affecting others, use breakpoints and step through the code.

  • Set a breakpoint in the program you want to debug

  • Step through the code using a debugger to identify the issue

  • Use logging statements to track the flow of the program

  • Check the call stack to see which functions are being called

  • Use conditional breakpoints to stop the program at specific points

Add your answer

Q26. what is second level cache?How to implement second level cache?How to optimize sql query?what are solid principles?

Ans.

Second level cache is a caching mechanism used to improve performance by storing frequently accessed data in memory.

  • Second level cache is implemented at the application level and can be configured using frameworks like Hibernate.

  • To optimize SQL queries, one can use indexes, avoid using SELECT *, and use JOINs instead of subqueries.

  • SOLID principles are a set of design principles for writing maintainable and scalable code.

  • SOLID stands for Single Responsibility, Open-Closed, Lis...read more

Add your answer

Q27. What is VSL in Vss, explain the mechanism and role in VSS?

Ans.

VSL is the voltage at which the substrate current becomes zero in VSS.

  • VSL is the voltage at which the substrate current becomes zero in VSS.

  • It is the minimum voltage required to maintain a zero substrate current.

  • VSL is important in VSS as it helps in reducing the leakage current.

  • It is achieved by applying a negative voltage to the substrate.

  • VSL is typically set to -0.5V or -1.0V in modern CMOS processes.

Add your answer

Q28. Do you how to create and manage Users and Groups?

Ans.

Yes, I know how to create and manage Users and Groups.

  • To create a user, use the appropriate command or tool provided by the operating system or directory service.

  • To manage users, you can modify their properties, reset passwords, enable or disable accounts, and assign permissions.

  • To create a group, use the command or tool provided by the operating system or directory service.

  • To manage groups, you can add or remove members, assign permissions, and modify group properties.

  • Exampl...read more

View 1 answer

Q29. What are the addon that can be added with spring boot ? What is the spring boot ? What are the ways of configuring a bean in spring? And core java realted stuff.

Ans.

Answering questions related to Spring Boot and core Java

  • Spring Boot addons include Spring Security, Spring Data, and Spring Cloud

  • Spring Boot is a framework for building standalone, production-grade Spring-based applications

  • Ways of configuring a bean in Spring include XML configuration, Java-based configuration, and annotation-based configuration

  • Core Java topics include OOP concepts, collections, multithreading, and exception handling

Add your answer

Q30. 5. In certain condition you are not able to achieve the target of your company within timeline for which project is getting planned what will you do?

Ans.

If unable to achieve company target within timeline, I will take corrective actions and communicate with stakeholders.

  • Analyze the reasons for not achieving the target

  • Identify the corrective actions required

  • Communicate with stakeholders about the situation and the plan of action

  • Re-plan the project timeline if necessary

  • Ensure that the revised plan is achievable and realistic

Add your answer

Q31. What was pointer to a pointer in C language?

Ans.

A pointer to a pointer is a variable that stores the memory address of another pointer variable.

  • It is used to modify the value of a pointer indirectly.

  • It is denoted by ** in C language.

  • It is commonly used in dynamic memory allocation.

  • Example: int **ptr; // pointer to a pointer to an integer

Add your answer

Q32. Which route will be priority ospf or ebgp? If we wish ospf as best route how can this achieved?

Ans.

OSPF should be priority over eBGP. Achieve this by manipulating administrative distance or metric.

  • OSPF should be preferred over eBGP as it is an interior gateway protocol while eBGP is an exterior gateway protocol

  • Manipulate administrative distance to make OSPF preferred over eBGP

  • Manipulate metric to make OSPF preferred over eBGP

  • Use route maps to manipulate the preference of OSPF over eBGP

  • Example: set the administrative distance of OSPF to a lower value than eBGP

  • Example: incre...read more

Add your answer

Q33. Issues faced in troubleshooting your applications and how you overcome it.

Ans.

Troubleshooting application issues requires thorough analysis, communication, and collaboration.

  • Identifying the root cause of the issue by analyzing logs, code, and system configurations.

  • Communicating effectively with team members to gather information and brainstorm solutions.

  • Collaborating with other teams such as DevOps or QA to investigate potential infrastructure or testing issues.

  • Utilizing debugging tools and techniques to isolate and fix the problem.

  • Documenting the trou...read more

View 1 answer

Q34. How to remove duplicate from excel data ?

Ans.

To remove duplicates from Excel data, use the Remove Duplicates feature under the Data tab.

  • Select the range of cells that contain the data you want to remove duplicates from.

  • Click on the Data tab and select Remove Duplicates.

  • Choose the columns that you want to check for duplicates and click OK.

  • The duplicates will be removed and a message will appear showing how many duplicates were removed.

  • You can also use the COUNTIF function to identify and remove duplicates.

  • Example: =IF(CO...read more

View 1 answer

Q35. What is the advantages of Data validation and why we use it?

Ans.

Data validation ensures accuracy and completeness of data. It helps in preventing errors and improving data quality.

  • Data validation ensures that the data entered is accurate and complete.

  • It helps in preventing errors and improving data quality.

  • It ensures that the data is consistent and conforms to predefined standards.

  • It helps in identifying and correcting errors before they cause problems.

  • Examples of data validation include checking for valid email addresses, phone numbers, ...read more

Add your answer

Q36. What is VDC? relationship between Supervisor and VDC?

Ans.

VDC stands for Virtual Design and Construction. Supervisor oversees VDC process.

  • VDC is a process of creating a digital model of a construction project before it is built.

  • It helps in identifying and resolving potential issues before construction begins.

  • Supervisor oversees the VDC process to ensure that the digital model is accurate and meets the project requirements.

  • VDC can also help in improving communication and collaboration among different stakeholders involved in the proj...read more

Add your answer

Q37. what is stored procedure, what are the web api http verbs

Ans.

Stored procedure is a precompiled SQL code, web API HTTP verbs are GET, POST, PUT, DELETE.

  • Stored procedure is a set of SQL statements that are precompiled and stored in the database for reuse.

  • Web API HTTP verbs are GET, POST, PUT, DELETE used for communication between client and server.

  • GET is used to retrieve data, POST is used to create data, PUT is used to update data, DELETE is used to delete data.

  • Examples of web API HTTP verbs are GET https://api.example.com/users, POST h...read more

Add your answer

Q38. How you can manage if someone say you to work for 24 hours in a day?

Ans.

I would explain the importance of work-life balance and propose alternative solutions.

  • Explain the importance of work-life balance and the negative effects of working excessively

  • Propose alternative solutions such as delegating tasks, setting priorities, and implementing efficient processes

  • Highlight the benefits of a well-rested and balanced support engineer, including improved productivity and customer satisfaction

View 2 more answers

Q39. 1) Java features 2) Access Modifiers 3) Arraylist 4) explain private and Default access modifiers 5) What is collection And explain Arraylist. 6) what is exception handling what it use in java. 7)Throw and thro...

read more
Ans.

Java features, access modifiers, ArrayList, exception handling, and throw/throws in Java.

  • Java features include platform independence, object-oriented programming, and automatic memory management.

  • Access modifiers in Java are public, private, protected, and default. They control the visibility and accessibility of classes, methods, and variables.

  • ArrayList is a dynamic array in Java that can grow or shrink in size. It is part of the Java Collections Framework.

  • Private access modi...read more

Add your answer

Q40. What happens if there is finally block inside an exception block?

Ans.

Finally block will always execute, even if an exception is thrown in the try or catch block.

  • Finally block is used to execute code that must always run, regardless of whether an exception was thrown or not.

  • If an exception is thrown in the try or catch block, the finally block will still execute.

  • Finally block is often used to release resources like file handles, database connections, etc.

Add your answer

Q41. Difference Between classic folder and Modern folder?

Ans.

Classic folders are traditional file storage structures, while modern folders are enhanced with additional features and capabilities.

  • Classic folders follow a hierarchical structure, with subfolders and files organized in a tree-like format.

  • Modern folders often include metadata, tags, and other attributes to enhance search and organization.

  • Classic folders rely on manual organization and navigation, while modern folders offer automated organization and intelligent search.

  • Modern...read more

View 9 more answers

Q42. Do you know how to configure Outlook?

Ans.

Yes, I know how to configure Outlook.

  • I am familiar with setting up email accounts in Outlook

  • I can configure email settings such as incoming and outgoing servers

  • I can troubleshoot common issues such as connection problems or syncing errors

  • I am knowledgeable about setting up rules and filters for organizing emails

  • I can assist users with importing and exporting data from Outlook

Add your answer

Q43. What os BGP community? What ips role of BGP communities?

Ans.

BGP community is a way to tag routes with additional information. It helps in controlling the flow of traffic.

  • BGP community is a 32-bit number that can be attached to a route advertisement.

  • It is used to tag routes with additional information.

  • It helps in controlling the flow of traffic by allowing network administrators to manipulate the way BGP routes are propagated and selected.

  • BGP communities can be used to implement policies such as traffic engineering, route filtering, an...read more

Add your answer

Q44. What are different types of joins

Ans.

Different types of joins are Inner Join, Left Join, Right Join, and Full Outer Join.

  • Inner Join returns only the matching rows from both tables.

  • Left Join returns all the rows from the left table and matching rows from the right table.

  • Right Join returns all the rows from the right table and matching rows from the left table.

  • Full Outer Join returns all the rows from both tables, with NULL values in the columns where there is no match.

  • Join types can be combined with other SQL cla...read more

View 1 answer

Q45. What is difference between Auto-Pilot and Co-management?

Ans.

Auto-Pilot is a fully automated management solution while Co-management is a shared management solution.

  • Auto-Pilot is a cloud-based solution that automates device deployment, configuration, and management.

  • Co-management allows organizations to manage devices using both Configuration Manager and Intune.

  • Auto-Pilot is designed for modern devices running Windows 10 while Co-management is designed for legacy devices.

  • Auto-Pilot is a fully automated solution while Co-management is a ...read more

View 1 answer

Q46. What was a pointer in c language?

Ans.

A pointer in C language is a variable that stores the memory address of another variable.

  • Pointers are used to manipulate data directly in memory

  • They can be used to pass data between functions efficiently

  • Pointers can be used to create dynamic data structures like linked lists

  • Example: int *ptr; ptr = # *ptr = 10; //num now has a value of 10

Add your answer

Q47. How to manage teams and assign task

Ans.

Managing teams involves clear communication, delegation, and accountability.

  • Establish clear goals and expectations for each team member

  • Communicate regularly to ensure everyone is on the same page

  • Delegate tasks based on individual strengths and workload

  • Provide support and resources to help team members succeed

  • Hold team members accountable for their work and deadlines

  • Encourage collaboration and open communication within the team

  • Recognize and reward team members for their contri...read more

View 4 more answers

Q48. Write a program to find the names of students against a subject using stream API.

Ans.

Program to find student names against a subject using stream API

  • Create a list of students with their subjects

  • Use stream API to filter the list based on the subject

  • Map the filtered list to get only the names of students

  • Collect the names in a list or any other data structure

  • Return the list of names

Add your answer

Q49. Which protocol we are using for monitoring network devices?

Ans.

SNMP is the protocol used for monitoring network devices.

  • SNMP stands for Simple Network Management Protocol

  • It is used to manage and monitor network devices such as routers, switches, servers, etc.

  • SNMP allows network administrators to collect information about network performance, usage, and errors.

  • Examples of SNMP monitoring tools include Nagios, Zabbix, and PRTG Network Monitor.

View 1 answer

Q50. Define EPG ? Why contract ios used for EPG communication?

Ans.

EPG is Electronic Program Guide used for TV listings. Contract iOS is used for EPG communication due to its reliability and security.

  • EPG is a digital guide that provides information about TV programs and schedules.

  • Contract iOS is a secure and reliable way to communicate EPG data between devices.

  • EPG data can be accessed through set-top boxes, smart TVs, and mobile apps.

  • EPG data includes program titles, descriptions, start and end times, and channel information.

Add your answer

Q51. What are the different types of controller in SAP CRM webui?

Ans.

The different types of controllers in SAP CRM webui include Component Controller, View Controller, Context Controller, and Custom Controller.

  • Component Controller: Controls the entire component and manages the context data.

  • View Controller: Controls the layout and rendering of the UI elements.

  • Context Controller: Manages the context data and communication between controllers.

  • Custom Controller: Allows for custom logic and functionality to be implemented.

Add your answer

Q52. How to test a printer for checking performance

Ans.

To test printer performance, check print speed, quality, and connectivity.

  • Print a test page to check for print speed and quality.

  • Print a large document to test for any potential jams or errors.

  • Test connectivity by printing from different devices and checking for any connection issues.

  • Check ink or toner levels and replace if necessary.

  • Test different paper types and sizes to ensure compatibility.

  • Check for any software updates or driver issues.

  • Perform regular maintenance such as...read more

Add your answer

Q53. How to check logs for pods and containers in kubernets ?

Ans.

To check logs for pods and containers in Kubernetes, you can use the kubectl command-line tool.

  • Use the 'kubectl logs' command to view logs for a specific pod or container.

  • Specify the pod or container name along with the appropriate flags.

  • You can also use selectors to filter logs based on labels or namespaces.

  • To follow logs in real-time, use the '-f' flag.

  • To limit the number of lines displayed, use the '--tail' flag.

  • To view logs from multiple containers in a pod, use the '--co...read more

View 3 more answers

Q54. Do you have experience in java 8 , could u explain some new features

Ans.

Yes, Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions allow for functional programming and simplify code.

  • Streams provide a way to process collections of data in a functional way.

  • Default methods allow for adding new methods to interfaces without breaking existing implementations.

  • Other new features include the Optional class, Date and Time API, and Nashorn JavaScript engine.

  • Example: Lambda expression - (x, y) -...read more

Add your answer

Q55. Which Linux commands you have used on daily basis??

Ans.

I have used various Linux commands on a daily basis.

  • ls - to list files and directories

  • cd - to change directories

  • grep - to search for specific text in files

  • tail - to view the end of a file

  • ps - to view running processes

  • kill - to terminate a process

  • chmod - to change file permissions

  • ssh - to connect to remote servers

  • scp - to transfer files between servers

  • tar - to archive and compress files

View 1 answer

Q56. Diffence between P&L statement and PP reports, what comes in assets and liabilities in the finance statement

Ans.

P&L statement shows revenue, expenses, and profit/loss. Balance sheet shows assets and liabilities.

  • P&L statement shows revenue, expenses, and profit/loss over a period of time

  • PP reports are production reports that show the quantity and quality of goods produced

  • Balance sheet shows assets and liabilities at a specific point in time

  • Assets include cash, accounts receivable, inventory, property, and equipment

  • Liabilities include accounts payable, loans, and accrued expenses

Add your answer

Q57. Different ways to implement and break Singleton pattern.

Ans.

Different ways to implement and break Singleton pattern.

  • Implement: Eager initialization, Lazy initialization, Thread-safe initialization, Bill Pugh Singleton Implementation

  • Break: Reflection, Serialization/Deserialization, Cloning, Multithreading

  • Example: Eager initialization - private static final Singleton instance = new Singleton();

  • Example: Reflection - Constructor constructor = Singleton.class.getDeclaredConstructor(); constructor.setAccessible(true); Singleton instance2 = ...read more

Add your answer

Q58. Real life scenario for food delivery company For delayed food delivery

Ans.

In case of delayed food delivery, the food delivery company should take prompt actions to rectify the situation and compensate the customer.

  • Apologize to the customer for the delay and inconvenience caused.

  • Offer a discount or a free meal to the customer as compensation.

  • Ensure that the food is delivered as soon as possible and in good condition.

  • Investigate the cause of the delay and take measures to prevent it from happening again.

  • Maintain good communication with the customer t...read more

Add your answer

Q59. 1. What is HANA replication? 2. What is fencing? 3. What is near zero downtime technique, how to plan? 4. Migration process? 5. What are sum tool phases and role of standard configuration, High level configurat...

read more
Ans.

Technical Specialist interview questions on HANA replication, fencing, migration, minimizing downtime, and export/import files.

  • HANA replication is the process of copying data from one HANA system to another.

  • Fencing is a mechanism to prevent split-brain scenarios in a high-availability setup.

  • Near zero downtime technique involves careful planning and execution to minimize downtime during system upgrades or migrations.

  • Migration process involves moving data from one system to ano...read more

View 1 answer

Q60. How many cycles microprocessor run in MOV A,B?

Ans.

The number of cycles a microprocessor runs in MOV A,B depends on the specific microprocessor architecture.

  • The number of cycles can vary depending on the microprocessor architecture and its implementation.

  • In general, MOV A,B is a simple instruction that moves the value in register B to register A.

  • The number of cycles required for this instruction can range from 1 to multiple cycles.

  • Factors such as the microprocessor's pipeline, cache, and instruction set architecture can affec...read more

View 3 more answers

Q61. How useful is it to create a class public and private in Java ? And which one to prefer for whom?

Ans.

Creating public and private classes in Java is useful for encapsulation and access control.

  • Creating a class as public allows it to be accessed from any other class.

  • Creating a class as private restricts its access to only within the same class.

  • Public classes are typically used for classes that need to be accessed by other classes or modules.

  • Private classes are typically used for helper classes or internal implementation details.

  • The choice between public and private depends on ...read more

View 3 more answers

Q62. What is the minimum clearance for DDR Data group signals Routing?

Ans.

The minimum clearance for DDR Data group signals Routing is 6 mils.

  • DDR Data group signals Routing requires a minimum clearance of 6 mils to avoid crosstalk and interference.

  • The clearance may vary depending on the specific DDR standard being used.

  • It is important to follow the recommended guidelines provided by the DDR manufacturer.

  • Failure to meet the minimum clearance requirements can result in signal integrity issues and data corruption.

  • Examples of DDR standards include DDR2,...read more

Add your answer

Q63. What is the difference between workflow and approval process.?

Ans.

Workflow automates standard internal procedures and processes to save time across the organization. Approval process automates the approval of records.

  • Workflow automates standard internal procedures and processes

  • Approval process automates the approval of records

  • Workflow can update fields, send email alerts, create tasks, etc.

  • Approval process involves submitting records for approval and defining approval steps

  • Workflow can be triggered by specific criteria or time-based events

  • A...read more

View 3 more answers

Q64. Recently which business portal is getting added under ministry of new and reneawable energy?

Ans.

The business portal added under ministry of new and renewable energy is SAMPADA.

  • SAMPADA stands for System for Assessment, Awareness and Training for Renewable Energy Applications

  • It is a web-based platform for promoting and creating awareness about renewable energy technologies

  • It provides information on various renewable energy technologies, their applications, and financial incentives available for their adoption

  • It also offers online training and certification courses on rene...read more

View 2 more answers

Q65. What is map and what is collection and all those things

Ans.

Map and Collection are data structures in programming used to store and manipulate data.

  • Map is a key-value pair data structure where each value is associated with a unique key.

  • Collection is a group of objects that can be accessed and manipulated as a single unit.

  • Examples of collections include lists, sets, and queues.

  • Maps are commonly used for caching, indexing, and searching data.

  • Collections are used for storing and manipulating data in various ways such as sorting, filterin...read more

Add your answer

Q66. How many handshakes will be there in a party with 30 members , everyone is required to handshake every person, no repeat handshakes will be there.

Ans.

The number of handshakes in a party with 30 members where each person shakes hands with every other person once.

  • Calculate the total number of handshakes using the formula n(n-1)/2, where n is the number of people.

  • Substitute n=30 in the formula to get the total number of handshakes.

  • Total handshakes = 30(30-1)/2 = 435 handshakes.

Add your answer

Q67. What is Redux and Redux purpose?

Ans.

Redux is a predictable state container for JavaScript apps.

  • Redux is a library for managing application state

  • It provides a predictable state container by enforcing a strict unidirectional data flow

  • Redux can be used with any UI library or framework

  • It is commonly used with React to manage state in complex applications

  • Redux allows for easy debugging and testing of state changes

  • Actions are dispatched to update the state, and reducers handle the updates

  • Selectors can be used to retr...read more

Add your answer

Q68. What is intern() method of String?

Ans.

intern() method of String returns a canonical representation of the string object.

  • The intern() method returns a string that has the same contents as the original string, but is guaranteed to be from a pool of unique strings.

  • This method is useful when comparing strings for equality as it compares the references instead of the contents.

  • Example: String s1 = new String("hello"); String s2 = s1.intern(); // s2 will be from the string pool

Add your answer

Q69. What is MLAG? Difference between LACP & PAGP?

Ans.

MLAG is a protocol used for creating a loop-free network topology. LACP and PAGP are link aggregation protocols.

  • MLAG stands for Multi-Chassis Link Aggregation Group.

  • It allows multiple switches to appear as a single logical switch to the connected devices.

  • LACP (Link Aggregation Control Protocol) is an IEEE standard protocol used for link aggregation.

  • PAGP (Port Aggregation Protocol) is a Cisco proprietary protocol used for link aggregation.

  • Both LACP and PAGP are used to bundle ...read more

Add your answer

Q70. How to manipulate outbound traffic in bgp

Ans.

Outbound traffic in BGP can be manipulated using various techniques such as AS path prepending, community strings, and route maps.

  • AS path prepending involves adding additional AS numbers to the path attribute of a BGP route advertisement to make it less attractive to other BGP routers.

  • Community strings can be used to tag routes and apply policies to them based on the tags.

  • Route maps can be used to match specific routes and apply policies to them such as setting local preferen...read more

Add your answer

Q71. What would you do if there is a defect leakage ?

Ans.

Defect leakage is a serious issue. I would take immediate action to identify the root cause and implement corrective measures.

  • Analyze the defect leakage data to identify the root cause

  • Implement corrective measures to fix the issue

  • Conduct a thorough review of the testing process to prevent future leakage

  • Communicate the issue and resolution to stakeholders

  • Track and monitor the effectiveness of the corrective measures

Add your answer

Q72. Find number which repeating first with linear complexity.

Ans.

Finding repeating number with linear complexity.

  • Use Floyd's cycle-finding algorithm to detect the cycle in the sequence.

  • Maintain two pointers, one moving at a rate of one step and the other at a rate of two steps.

  • When they meet, move one pointer to the start and keep the other pointer at the meeting point.

  • Move both pointers at a rate of one step until they meet again, which is the start of the cycle.

  • The number at the start of the cycle is the repeating number.

Add your answer

Q73. What is the complicated issue that you have solved and what is the solution you have provided

Ans.

Developed a real-time data processing system for a financial institution

  • Implemented a distributed system using Apache Kafka and Apache Storm

  • Designed a fault-tolerant architecture with multiple redundancy layers

  • Optimized the system for high throughput and low latency

  • Provided real-time monitoring and alerting using Grafana and Prometheus

Add your answer

Q74. Nexus 9K hardware models used in Leaf and spine architecture?

Ans.

Nexus 9K hardware models used in Leaf and spine architecture.

  • Nexus 9372PX and 9372TX used as leaf switches

  • Nexus 9504, 9508, and 9516 used as spine switches

  • Nexus 93108TC-EX and 93180YC-EX also used as leaf switches

  • All models support VXLAN and ACI

  • Highly scalable and flexible architecture

Add your answer

Q75. How to create reports by pivot table?

Ans.

Pivot tables are used to create reports by summarizing and analyzing data.

  • Select the data range that you want to analyze

  • Go to the 'Insert' tab and click on 'PivotTable'

  • Choose the location where you want to place the pivot table

  • Drag and drop the fields you want to analyze into the 'Rows' and 'Columns' areas

  • Add any additional fields to the 'Values' area to calculate summaries

  • Customize the pivot table by applying filters, sorting, and formatting

  • Refresh the pivot table if the sou...read more

View 3 more answers

Q76. 1. How to connect 2 DBs from spring boot application

Ans.

To connect 2 DBs from a Spring Boot application, configure multiple data sources and use JdbcTemplate or EntityManager for each DB.

  • Configure multiple data sources in the application.properties file

  • Create separate configuration classes for each data source

  • Use JdbcTemplate or EntityManager to interact with each DB

  • Specify the appropriate data source in the repository or service classes

Add your answer

Q77. how to generate encrypted passwords for user module

Ans.

Encrypted passwords for user module can be generated using hashing algorithms like bcrypt or PBKDF2.

  • Choose a strong hashing algorithm like bcrypt or PBKDF2

  • Generate a random salt for each user

  • Combine the password and salt, and hash the result using the chosen algorithm

  • Store the salt and hashed password in the database

  • When verifying a password, retrieve the salt for the user, combine it with the entered password, and hash the result using the same algorithm. Compare the resulti...read more

Add your answer

Q78. 1. what are the considerations while selecting engineering materials for specific applications? 2. How would you calculate sheer strength of a round cross section metal bar? 3. Explain your project work.

Ans.

Considerations for selecting engineering materials, calculating sheer strength of a metal bar, and explaining project work.

  • Consider factors like strength, durability, cost, and availability when selecting materials for specific applications.

  • Calculate sheer strength of a round cross section metal bar using the formula: Sheer Strength = (0.5 * Ultimate Tensile Strength)

  • In project work, explain the objectives, methodology, results, and any challenges faced.

Add your answer

Q79. which html control is not programmable in asp.net what does this mean saas,pass,Iaas in technology what is design pattern what is Singleton what is multicast delegates

Ans.

Answering technical questions related to ASP.NET and design patterns

  • The HTML control that is not programmable in ASP.NET is the control

  • SaaS stands for Software as a Service, PaaS stands for Platform as a Service, and IaaS stands for Infrastructure as a Service

  • Design patterns are reusable solutions to common software development problems

  • Singleton is a design pattern that restricts the instantiation of a class to one object

  • Multicast delegates are delegates that can have multip...read more

Add your answer

Q80. What is System.out.println?

Ans.

System.out.println is a Java statement used to print output to the console.

  • System is a class in Java's core library.

  • out is a static member of the System class.

  • println is a method of the PrintStream class.

  • It is used to print output to the console.

  • It adds a newline character at the end of the output.

View 5 more answers

Q81. What functionalities have you worked as an AEM and java developer?

Ans.

I have worked on developing custom components, templates, workflows, and integrating third-party systems in AEM. In Java, I have worked on backend development, RESTful services, and database interactions.

  • Developed custom components and templates in AEM

  • Implemented workflows for content approval processes

  • Integrated third-party systems with AEM

  • Backend development in Java

  • Created RESTful services

  • Worked on database interactions

Add your answer

Q82. End to end OTC domain process, where my core responsibility falls in.

Ans.

OTC domain process involves end to end sales cycle from order placement to delivery, where my core responsibility lies.

  • My core responsibility is to lead the team in ensuring smooth functioning of the entire OTC process.

  • I need to ensure timely order placement, accurate order processing, and timely delivery of products.

  • I need to monitor inventory levels and ensure that products are available for sale.

  • I need to ensure that customer queries and complaints are addressed promptly a...read more

View 1 answer

Q83. What is issue and risk? Have you involved in any Risk practice or not?

Ans.

Issue and risk are two different concepts in project management. Issues are current problems that need to be resolved, while risks are potential future problems that need to be mitigated.

  • Issues are current problems that have already occurred and need to be addressed immediately

  • Risks are potential future problems that may or may not occur, but need to be identified and planned for

  • Examples of issues include budget overruns, missed deadlines, and scope changes

  • Examples of risks i...read more

Add your answer

Q84. What is runbook and SOP ? Can we consider SOP as Runbook or not?

Ans.

Runbook is a set of instructions for IT operations, while SOP is a set of instructions for business processes. They are not the same.

  • Runbook is a document containing a set of procedures for IT operations, such as troubleshooting steps, maintenance tasks, and disaster recovery processes.

  • SOP (Standard Operating Procedure) is a document containing a set of instructions for business processes, such as employee onboarding, customer service protocols, and financial reporting proced...read more

Add your answer

Q85. Whether I have knowledge on PLM tools or not?

Ans.

Yes, I have knowledge on PLM tools.

  • I have experience working with PLM tools such as Teamcenter and Windchill.

  • I have used PLM tools to manage product data, collaborate with cross-functional teams, and track project progress.

  • I am familiar with PLM concepts such as BOM management, change management, and version control.

  • I have also worked on customizing PLM tools to meet specific business requirements.

  • Overall, my experience with PLM tools has helped me streamline product developm...read more

Add your answer

Q86. Design the zabbix architecture and share how many servers are you gonna suggest the customer to have?

Ans.

The number of servers required for Zabbix architecture depends on the size of the environment and the level of monitoring required.

  • Assess the size of the environment and the number of devices to be monitored

  • Determine the level of monitoring required, such as real-time monitoring or historical data analysis

  • Consider the need for high availability and redundancy

  • Suggest a minimum of 3 servers for a basic setup: 1 for the Zabbix server, 1 for the database, and 1 for the web interf...read more

Add your answer

Q87. whenever restart SQL server one database comes online late what is the reason what are are startup parameters how will you troubleshoot database goes into suspect mode

Ans.

The reason for a database coming online late after restarting SQL server could be due to various factors such as large database size, heavy transactional activity, or insufficient server resources.

  • Large database size can result in longer recovery time during startup.

  • Heavy transactional activity can delay the recovery process.

  • Insufficient server resources like CPU, memory, or disk I/O can slow down the startup process.

  • Other factors like network issues or conflicts with other s...read more

Add your answer

Q88. How many matches will occur if there are 20 teams and each match is knock out match.

Ans.

There will be 19 matches in total in a knock out tournament with 20 teams.

  • In a knock out tournament, each match eliminates one team.

  • To determine the number of matches, subtract 1 from the total number of teams.

  • For 20 teams, there will be 20 - 1 = 19 matches.

Add your answer

Q89. How to reduce/extend size of a lvm partition

Ans.

To reduce/extend size of a lvm partition, use lvresize command.

  • Use lvresize command with appropriate options to reduce/extend the size of a lvm partition.

  • To reduce the size, use the option --resizefs to resize the file system as well.

  • To extend the size, use the option --resizefs only if the file system supports online resizing.

  • Example: lvresize --resizefs --size -2G /dev/vg01/lv01 to reduce by 2GB.

  • Example: lvresize --resizefs --size +2G /dev/vg01/lv01 to extend by 2GB.

Add your answer

Q90. What exact code to be written when there are two field in selection screen if one field is filled the display second field and in which event it need to be written.

Ans.

Use AT SELECTION-SCREEN OUTPUT event to display second field based on first field input.

  • Use AT SELECTION-SCREEN OUTPUT event to check if first field is filled.

  • If first field is filled, display the second field using the statement 'SET PF-STATUS'.

  • Example: AT SELECTION-SCREEN OUTPUT. IF sy-abcde = 'X'. SET PF-STATUS 'SECOND_FIELD'. ENDIF.

View 1 answer

Q91. difference between get and load method in hibernate?

Ans.

get() method returns null if the object is not found in the cache or database, while load() method throws an exception.

  • get() method is eager loading while load() method is lazy loading.

  • get() method returns the object from the database or cache while load() method returns a proxy object.

  • get() method is slower than load() method.

  • get() method is used when we are not sure if the object exists in the database or cache while load() method is used when we are sure that the object ex...read more

Add your answer

Q92. How can you handle different exceptionsin in a class

Ans.

Handle exceptions in a class by using try-catch blocks and throwing custom exceptions.

  • Use try-catch blocks to catch exceptions and handle them appropriately.

  • Throw custom exceptions to provide more specific information about the error.

  • Use multiple catch blocks to handle different types of exceptions.

  • Implement a finally block to execute code regardless of whether an exception is thrown or not.

Add your answer

Q93. What is SEPA and the role of the project related to SEPA implementation?

Ans.

SEPA is the Single Euro Payments Area, a project aimed at harmonizing electronic payments in Europe.

  • SEPA is a European Union initiative to simplify and standardize electronic payments across Europe.

  • It allows individuals and businesses to make cross-border payments in euros as easily as domestic payments.

  • SEPA implementation involves adopting common payment instruments, formats, and technical standards.

  • The project aims to enhance efficiency, reduce costs, and increase competiti...read more

View 1 answer

Q94. What is difference between family ipv6 route-target and default-route-target in Nokia 7750 bgp configuration ?

Ans.

Family ipv6 route-target and default-route-target in Nokia 7750 bgp configuration.

  • Family ipv6 route-target is used to import/export ipv6 routes within a VRF family

  • Default-route-target is used to import/export ipv4 routes within a VRF family

  • Family ipv6 route-target is configured under VRF family while default-route-target is configured under VRF

  • Family ipv6 route-target is used for VPNv6 while default-route-target is used for VPNv4

Add your answer

Q95. Patch installation procedures and what are the main components required.

Ans.

Patch installation procedures and main components required.

  • Patch installation procedures involve planning, testing, and deployment.

  • Main components required include the patch file, installation package, and documentation.

  • Procedures may vary depending on the SharePoint version and environment.

  • Testing should be done in a non-production environment before deployment.

  • Documentation should include details of the patch, installation steps, and rollback plan.

View 1 answer

Q96. What is the difference between AngularJS & angular 10

Ans.

AngularJS is the first version of Angular, while Angular 10 is the latest version with significant improvements and updates.

  • AngularJS is based on JavaScript, while Angular 10 is based on TypeScript.

  • AngularJS uses controllers and $scope for data binding, while Angular 10 uses components and directives.

  • AngularJS has two-way data binding, while Angular 10 has one-way data binding by default.

  • AngularJS uses $http for AJAX requests, while Angular 10 uses HttpClient module for the s...read more

Add your answer

Q97. How did you handled performance testing end to end?

Ans.

I handled performance testing end to end by conducting thorough analysis, creating test plans, executing tests, analyzing results, and implementing optimizations.

  • Conducted thorough analysis to identify key performance metrics and testing requirements

  • Created detailed test plans outlining scenarios, tools, and success criteria

  • Executed tests using appropriate tools and techniques, monitoring system behavior and performance

  • Analyzed test results to identify bottlenecks, performanc...read more

Add your answer

Q98. How to troubleshoot netbackup 13 backup failure.

Ans.

To troubleshoot netbackup 13 backup failure, check logs, verify connectivity, and ensure proper configuration.

  • Check the logs for any error messages or warnings

  • Verify connectivity between the backup server and the client

  • Ensure that the backup policy is properly configured

  • Check for any conflicts with other backup jobs or processes

  • Verify that the backup media is available and properly configured

  • Consider running a test backup to isolate the issue

Add your answer

Q99. Technical Writers produce what types of documents?

Ans.

Technical Writers produce a variety of documents to communicate complex technical information.

  • User manuals and guides

  • Technical specifications

  • API documentation

  • Training materials

  • White papers

  • Online help systems

  • Release notes

  • Troubleshooting guides

Add your answer

Q100. What is Stakeholders in Project Management and type?

Ans.

Stakeholders in project management are individuals or groups who have an interest in the project and can influence or be influenced by its outcome.

  • Stakeholders can include project sponsors, team members, clients, end users, suppliers, and regulatory bodies.

  • They can be classified into internal stakeholders (e.g. team members) and external stakeholders (e.g. clients).

  • Stakeholders can have varying levels of influence and interest in the project, which can impact project success....read more

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at DSP Mutual Fund

based on 968 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 537 Interview Questions
3.3
 • 458 Interview Questions
4.4
 • 247 Interview Questions
4.2
 • 173 Interview Questions
4.1
 • 160 Interview Questions
3.3
 • 142 Interview Questions
View all
Top HCLTech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter