Incedo
30+ Paktolus Solutions Llc Interview Questions and Answers
Q1. Difference between hashmap and concurrent hashmap?
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashmap due to the overhead of maintaining thread-safety.
Use Has...read more
Q2. Difference between Hashtable and hashmap?
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Q3. Explain oops concept with example
OOPs concept is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPs stands for Object-Oriented Programming
Key concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction
Example: Inheritance allows a class to inherit properties and behavior from another class
Q4. What do you understand by market capitalisation?
Market capitalisation is the total value of a company's outstanding shares.
Market cap is calculated by multiplying the current stock price by the total number of outstanding shares.
It is used to determine the size of a company and its overall worth.
Companies with higher market caps are generally considered more stable and less risky investments.
For example, Apple Inc. has a market cap of over $2 trillion as of 2021.
Market cap can fluctuate based on changes in stock price and ...read more
Q5. What is Capital market, define debt securities, are you comfortable working in Night Shifts, what is custodian, and who is broker?
Capital market is a platform where companies and governments raise funds through debt and equity securities. Debt securities are loans that investors provide to the issuer.
Capital market is a platform for raising funds through securities
Debt securities are loans provided by investors to the issuer
Working in night shifts is comfortable for me
Custodian is a financial institution that holds securities on behalf of clients
Broker is a person or firm that buys and sells securities ...read more
Q6. what is STP, HSRP,FRRP, what is the difference between hsrp and vrrp and why hsrp is better than vrrf
STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.
STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address
FRRP (Fast Router Redundancy Protocol) is a Cisco proprietary protocol that provides faster failover than HSRP an...read more
Q7. What is the function of custodian bank
Custodian banks are financial institutions responsible for safeguarding assets, such as securities and cash, on behalf of institutional clients.
Provide safekeeping of assets
Settle trades on behalf of clients
Collect income on assets
Process corporate actions
Provide reporting and other administrative services
Act as a liaison between the client and the investment manager
Q8. How your Automation Framework is organized ?
Our Automation Framework is organized in a modular and scalable way.
We use a Page Object Model design pattern
We have separate modules for test data, test scripts, and test reports
We use a central configuration file for easy maintenance
We have a library of reusable functions
We use version control to manage changes
We have a clear naming convention for easy identification
Q9. How to release, renew IP in CMD?
To release and renew IP in CMD, use the commands 'ipconfig /release' and 'ipconfig /renew'.
Open Command Prompt
Type 'ipconfig /release' and press Enter to release the current IP address
Type 'ipconfig /renew' and press Enter to obtain a new IP address
You can also use 'ipconfig /all' to view detailed information about network interfaces
Q10. what is xlate table in ASA and ipsec tunnel trouble shooting
The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.
The xlate table is used to map internal IP addresses to external IP addresses
It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly
You can view the xlate table using the 'show xlate' command in the ASA CLI
If there are issues with the xlate table, it can cause I...read more
Q11. what is encapsulation and loading process.also write an code for Reverse string
Encapsulation is the process of hiding internal details of an object and providing access only through defined methods.
Encapsulation helps in achieving data abstraction and data hiding.
It allows for better control over the data and prevents direct access to it.
Loading process refers to the process of loading a program or data into memory for execution.
Reverse string code example: function reverseString(str) { return str.split('').reverse().join(''); }
Q12. what is encapsulation and loading process. Also write an code for reverse string
Encapsulation is the process of hiding internal implementation details and providing a public interface. Loading process refers to the steps involved in loading a program or data into memory.
Encapsulation helps in achieving data abstraction and information hiding.
It allows for better control over data and prevents unauthorized access.
Loading process involves steps like parsing, linking, and loading the program or data into memory.
Here's an example code for reversing a string:...read more
Q13. 1. What is a loop in switching? 2. How do you say vlan 200 working on switch? 3. How do you say ethernet frame is tagged or untagged? 4. Regarding project 5. Python string slicing 6. Max vlans allowed on single...
read moreTechnical questions related to switching, VLANs, and Python string slicing for Lead Engineer position.
A loop in switching occurs when a broadcast packet is forwarded endlessly between switches.
To say VLAN 200 is working on a switch, you can check the VLAN database or use the show vlan command.
An ethernet frame is tagged when it has a VLAN ID added to its header, and untagged when it does not.
Regarding the project, provide details on the scope, timeline, and deliverables.
Pytho...read more
Q14. If the user would not get OTP to access the profile?
If the user does not receive OTP to access their profile, they should first check their internet connection and then contact customer support.
Check internet connection to ensure OTP delivery
Contact customer support for assistance
Verify contact information for accuracy
Consider alternative authentication methods
Q15. What would happened if the user would not be able to use the card?
If the user is unable to use the card, they may experience inconvenience, potential financial loss, and may need to contact the card issuer for assistance.
User may face inconvenience in making purchases or transactions
User may incur financial loss if unable to access funds on the card
User may need to contact the card issuer for assistance or to report the issue
Q16. What is nav describe
NAV stands for Net Asset Value, which represents the per-share value of a mutual fund or exchange-traded fund (ETF).
NAV is calculated by subtracting a fund's liabilities from its assets and dividing by the number of shares outstanding.
It is used to determine the price at which investors can buy or sell shares of the fund.
NAV is typically calculated at the end of each trading day.
For example, if a mutual fund has assets worth $100 million and liabilities worth $10 million, and...read more
Q17. What is private equity ? What is limited partners ? What is NAV ? What is IRR ?
Private equity is an alternative investment class where investors pool capital to invest in private companies.
Limited partners are investors who provide capital to a private equity fund but have limited liability.
NAV (Net Asset Value) is the value of a fund's assets minus its liabilities.
IRR (Internal Rate of Return) is a metric used to measure the profitability of an investment over time.
Private equity firms typically acquire companies, improve their operations, and sell the...read more
Q18. How would i f-identify whether the access was done the member or the scammer
To identify whether the access was done by the member or the scammer, analyze login patterns, IP addresses, device information, and behavior.
Analyze login patterns - look for unusual login times or frequency
Check IP addresses - compare the location of the access to the member's usual locations
Review device information - see if the device used for access matches the member's known devices
Monitor behavior - look for any suspicious activity or changes in behavior
Q19. How you do forecasting. Which excel functions do you use
I use various excel functions for forecasting such as TREND, FORECAST, and GROWTH.
I analyze historical data to identify trends and patterns
I use functions like TREND to project future values based on historical data
I use functions like FORECAST to estimate future values based on existing data
I use functions like GROWTH to project future values based on exponential growth
I also use other statistical functions like AVERAGE, STDEV, and CORREL to analyze data
I ensure accuracy by ...read more
Q20. Expertise in which technology
My expertise lies in Java and related technologies.
Proficient in Java programming language and its frameworks like Spring and Hibernate
Experience in developing web applications using HTML, CSS, JavaScript, and AngularJS
Familiarity with database technologies like MySQL and Oracle
Knowledge of software development methodologies like Agile and Scrum
Experience in leading and mentoring a team of developers
Q21. what is ssl offloading in f5
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certificates and protocols like TLS 1.3.
It can also perform SSL ...read more
Q22. Did you use docker? And how did you build image
Q23. What are the Linux commands you have used
Q24. Regression testing and sanity difference
Regression testing is retesting of previously tested functionality, while sanity testing is a quick check to ensure basic functionality is working.
Regression testing is performed to ensure that changes or fixes in the software do not introduce new defects or impact existing functionality.
It involves retesting of the entire application or a specific set of test cases.
Regression testing is usually performed after major changes or enhancements to the software.
Sanity testing is a...read more
Q25. Possible mirror Substring from the given string
Find possible mirror substrings in a given string
Iterate through the string and check for mirror substrings
Use two pointers to check for mirror substrings
Examples: 'abcddcba' -> ['abcddcba', 'cddc', 'dd']
Q26. what is SNAT in f5
SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.
SNAT is used to translate the source IP address of outgoing traffic to a different IP address.
This can be useful in scenarios where multiple devices are sharing a single public IP address.
SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.
F5 offers a variety of SNAT options, including automap SNAT...read more
Q27. Why choose .Net core
High performance, cross-platform compatibility, open-source, modern development features
Cross-platform compatibility allows for deployment on various operating systems
High performance due to optimized runtime and just-in-time compilation
Open-source community support for continuous improvement and updates
Modern development features like dependency injection, modular architecture, and improved performance monitoring
Example: .Net Core allows for easy migration of existing .Net a...read more
Q28. How did you deploy your models
Q29. Explain OSI model
The OSI model is a conceptual framework used to describe the communication functions of a network.
The model has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure interoperability between different network devices and software.
Example: When you visit a website, the Application layer sends a request to the Transpo...read more
Q30. What is database and scaling
Database is a structured collection of data, scaling refers to increasing capacity to handle more data or users.
Database is a structured collection of data organized for easy access, retrieval, and management
Scaling refers to the ability of a system to handle increased workload or growth
Scaling can involve adding more servers, increasing storage capacity, or optimizing performance
Examples of scaling in databases include sharding, replication, and vertical or horizontal scalin...read more
Q31. Diff b/w interface and abstract
Interface is a contract that defines the methods a class must implement, while abstract class can have both implemented and abstract methods.
Interface can only have abstract methods and constants, while abstract class can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subcl...read more
Q32. Merge 2 list using linked list
Merge two linked lists into one
Create a new linked list to store the merged list
Iterate through both input linked lists and add nodes to the new list in sorted order
Update the next pointers accordingly
Q33. IR Response for P1 ticket
IR Response for P1 ticket involves immediate investigation, containment, and resolution of critical security incidents.
Immediately triage the incident to determine severity and impact
Contain the incident to prevent further damage or data loss
Gather evidence and conduct forensic analysis to identify root cause
Coordinate with relevant teams for remediation and recovery
Document all actions taken and lessons learned for future incidents
Q34. Define Neo4J architecturaly
Neo4J is a graph database management system that stores data in nodes and relationships.
Uses graph structures to represent and store data
Nodes represent entities and relationships represent connections between entities
Supports ACID transactions for data consistency
Query language is Cypher
More about working at Incedo
Top HR Questions asked in Paktolus Solutions Llc
Interview Process at Paktolus Solutions Llc
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month