Add office photos
Engaged Employer

i-exceed technology solutions

2.9
based on 146 Reviews
Filter interviews by

Tenneco Interview Questions and Answers

Updated 5 Feb 2024

Q1. What is meant by connection pool properties

Ans.

Connection pool properties refer to the settings that control the behavior of a connection pool.

  • Connection pool properties include settings such as maximum connections, minimum connections, and connection timeout.

  • These properties can be configured in the application server or in the database driver.

  • The purpose of connection pool properties is to optimize the use of database connections and improve application performance.

  • Examples of connection pool properties include maxActiv...read more

Add your answer

Q2. Explain websphere installation methods followed

Ans.

WebSphere installation methods include GUI, silent, and response file installations.

  • WebSphere can be installed using a graphical user interface (GUI).

  • Silent installation allows for installation without user interaction.

  • Response file installation uses a pre-recorded response file to automate the installation process.

View 1 answer

Q3. Any exposure in devops, cloud technologies

Ans.

Yes, I have experience in both devops and cloud technologies.

  • I have worked with AWS, Azure, and Google Cloud Platform.

  • I have experience with containerization using Docker and Kubernetes.

  • I have worked with CI/CD pipelines using tools like Jenkins and GitLab.

  • I have experience with infrastructure as code using tools like Terraform and CloudFormation.

Add your answer

Q4. Any work experience in other middleware platforms

Ans.

Yes, I have experience in working with Apache Kafka and RabbitMQ.

  • Worked on developing microservices using Apache Kafka as a messaging platform

  • Implemented RabbitMQ for message queuing in a project

  • Experience in configuring and managing both platforms

Add your answer
Discover Tenneco interview dos and don'ts from real experiences

Q5. How security configured in websphere

Ans.

Security in WebSphere is configured through various mechanisms such as SSL, authentication, authorization, and encryption.

  • SSL can be configured to secure communication between clients and servers

  • Authentication can be configured using various methods such as LDAP, database, or custom authentication

  • Authorization can be configured using role-based access control or custom authorization

  • Encryption can be configured to secure data at rest and in transit

Add your answer

Q6. What is the expected ctc

Ans.

The expected CTC depends on the company's budget and the candidate's experience and skills.

  • The CTC can vary based on the company's location and industry.

  • The candidate's negotiation skills can also impact the final CTC.

  • The CTC can be influenced by the candidate's education, certifications, and previous work experience.

  • The CTC can range from 8-10 lakhs per annum for a Senior Software Engineer role in India.

  • Some companies may offer additional benefits like health insurance, stoc...read more

Add your answer

Q7. How ssl achieved in websphere

Ans.

SSL in WebSphere is achieved through configuration of SSL certificates and enabling SSL protocols.

  • SSL configuration involves generating and importing SSL certificates

  • SSL protocols such as TLS can be enabled through server.xml configuration

  • WebSphere also supports SSL offloading through plug-in configuration

  • SSL can be enforced for specific applications or URLs through web.xml configuration

Add your answer

Q8. What is tour current ctc

Ans.

My current CTC is confidential.

  • I prefer not to disclose my current CTC as it may affect negotiations.

  • I am open to discussing my salary expectations for this role.

  • My previous salary was in line with industry standards for my experience level.

Add your answer

Q9. Explain garbage collection

Ans.

Garbage collection is an automatic memory management process that frees up memory occupied by objects that are no longer in use.

  • Garbage collection is performed by the JVM in Java and CLR in .NET languages.

  • It helps prevent memory leaks and null pointer exceptions.

  • Garbage collection can be triggered manually or automatically.

  • Examples of garbage collection algorithms include mark-and-sweep, reference counting, and copying.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Tenneco

based on 2 interviews
1 Interview rounds
Technical Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Software Engineer Interview Questions from Similar Companies

3.8
 • 41 Interview Questions
3.6
 • 25 Interview Questions
4.0
 • 22 Interview Questions
4.0
 • 17 Interview Questions
3.6
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter