i
IBS Software Services
Filter interviews by
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2024. There were 4 interview rounds.
Fancy string problem
Use Java Streams to find total employees with salary > 50000
Filter employees with salary > 50000 using stream.filter()
Count the number of employees using stream.count()
Annotations in Springboot like @Entity, @RestController are used for defining classes and endpoints respectively.
Annotations like @Entity are used to define JPA entities in Springboot.
Annotations like @RestController are used to define RESTful web services endpoints.
Annotations like @Autowired are used for dependency injection in Springboot.
In my previous project, I used AWS services such as EC2, S3, and RDS for hosting, storage, and database management.
EC2 for hosting application servers
S3 for storing and retrieving files
RDS for managing relational databases
The problem was to check whether an int matrix is magic matrix ( where sum of elements in row = sum of elements in column = sum of elements in diagonal)
Reverse a string to check if it is a palindrome.
Create a function that takes a string as input
Reverse the string using built-in functions or manually
Compare the reversed string with the original string to check if it is a palindrome
IBS Software Services interview questions for popular designations
Easy Programming problem
Get interview-ready with Top IBS Software Services Interview Questions
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
Spring IOC containers are responsible for managing the instantiation of objects and their dependencies in a Spring application.
IOC stands for Inversion of Control, which means that the control of object creation is inverted from the application code to the Spring framework.
There are two main types of Spring IOC containers: BeanFactory and ApplicationContext.
BeanFactory is the simplest container, providing basic support...
Metaspace is a part of the Java HotSpot VM memory where class metadata is stored.
Metaspace replaces the permanent generation (PermGen) in Java 8 and later versions.
It is used to store class metadata such as class names, method names, field names, annotations, etc.
Metaspace is dynamically resized by the JVM based on the application's demand.
You can monitor Metaspace usage using tools like JConsole or VisualVM.
Predicate is a functional interface that represents a boolean-valued function, while Consumer is a functional interface that represents an operation that accepts a single input argument and returns no result.
Predicate is used for filtering elements based on a condition, while Consumer is used for performing actions on elements.
Predicate has a test() method to evaluate a condition, while Consumer has an accept() method ...
Java 8 stream based question
I applied via Referral and was interviewed in Jul 2024. There were 2 interview rounds.
Find min ,max and second largest (avoid duplicates)using streams
Checked exceptions are checked at compile time, while unchecked exceptions are not.
Checked exceptions must be either caught or declared in the method signature using 'throws'
Unchecked exceptions do not need to be caught or declared
Example of checked exception: IOException
Example of unchecked exception: NullPointerException
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jun 2024. There was 1 interview round.
ISO 27001 focuses on information security management system while SOC2 Type 2 audit focuses on controls related to security, availability, processing integrity, confidentiality, and privacy.
ISO 27001 is an international standard that focuses on establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
SOC2 Type 2 audit is a report based on the Trust Services Cri...
BCMS is implemented through a structured approach involving planning, implementation, monitoring, and continual improvement.
Develop a BCMS policy outlining objectives and scope
Conduct a risk assessment to identify threats and vulnerabilities
Implement controls to mitigate risks
Train employees on BCMS procedures and protocols
Regularly test and evaluate the effectiveness of the BCMS
Review and update the BCMS as needed bas...
A SOC2 report is an audit report that attests to the controls in place at a service organization relevant to security, availability, processing integrity, confidentiality, and privacy.
Review the scope of the report to understand the services covered
Examine the auditor's opinion on the effectiveness of controls
Look for any exceptions or deficiencies noted in the report
Check the date of the report to ensure it is current
...
Clustering in Cassandra involves grouping together multiple nodes to improve performance, scalability, and fault tolerance.
Clustering is used to distribute data across multiple nodes in a Cassandra cluster.
It helps in achieving high availability and fault tolerance by replicating data across nodes.
Cassandra uses consistent hashing to determine which node will store a particular piece of data.
Data is partitioned into sm...
Top trending discussions
Some of the top questions asked at the IBS Software Services interview -
The duration of IBS Software Services interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 82 interviews
Interview experience
based on 626 reviews
Rating in categories
Senior Software Engineer
595
salaries
| ₹3.4 L/yr - ₹14 L/yr |
Software Engineer
389
salaries
| ₹2.4 L/yr - ₹11 L/yr |
Technical Lead
266
salaries
| ₹5.4 L/yr - ₹20 L/yr |
Solution Architect
207
salaries
| ₹8 L/yr - ₹30.6 L/yr |
Solution Engineer
190
salaries
| ₹3 L/yr - ₹6.2 L/yr |
TCS
Infosys
Wipro
HCLTech