Add office photos
Employer?
Claim Account for FREE

Incedo

3.3
based on 905 Reviews
Filter interviews by

30+ Paktolus Solutions Llc Interview Questions and Answers

Updated 3 Sep 2024
Popular Designations

Q1. Difference between hashmap and concurrent hashmap?

Ans.

Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.

  • Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.

  • Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.

  • Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.

  • Concurrent Hashmap is slower than Hashmap due to the overhead of maintaining thread-safety.

  • Use Has...read more

Add your answer

Q2. Difference between Hashtable and hashmap?

Ans.

Hashtable is synchronized while hashmap is not.

  • Hashtable is thread-safe while hashmap is not.

  • Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.

  • Hashtable is slower than hashmap due to synchronization.

  • Hashtable is a legacy class while hashmap is a newer implementation.

Add your answer

Q3. Explain oops concept with example

Ans.

OOPs concept is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOPs stands for Object-Oriented Programming

  • Key concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction

  • Example: Inheritance allows a class to inherit properties and behavior from another class

Add your answer

Q4. What do you understand by market capitalisation?

Ans.

Market capitalisation is the total value of a company's outstanding shares.

  • Market cap is calculated by multiplying the current stock price by the total number of outstanding shares.

  • It is used to determine the size of a company and its overall worth.

  • Companies with higher market caps are generally considered more stable and less risky investments.

  • For example, Apple Inc. has a market cap of over $2 trillion as of 2021.

  • Market cap can fluctuate based on changes in stock price and ...read more

View 1 answer
Discover Paktolus Solutions Llc interview dos and don'ts from real experiences
Asked in
SME Interview

Q5. What is Capital market, define debt securities, are you comfortable working in Night Shifts, what is custodian, and who is broker?

Ans.

Capital market is a platform where companies and governments raise funds through debt and equity securities. Debt securities are loans that investors provide to the issuer.

  • Capital market is a platform for raising funds through securities

  • Debt securities are loans provided by investors to the issuer

  • Working in night shifts is comfortable for me

  • Custodian is a financial institution that holds securities on behalf of clients

  • Broker is a person or firm that buys and sells securities ...read more

View 1 answer

Q6. what is STP, HSRP,FRRP, what is the difference between hsrp and vrrp and why hsrp is better than vrrf

Ans.

STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.

  • STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links

  • HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address

  • FRRP (Fast Router Redundancy Protocol) is a Cisco proprietary protocol that provides faster failover than HSRP an...read more

Add your answer
Are these interview questions helpful?

Q7. What is the function of custodian bank

Ans.

Custodian banks are financial institutions responsible for safeguarding assets, such as securities and cash, on behalf of institutional clients.

  • Provide safekeeping of assets

  • Settle trades on behalf of clients

  • Collect income on assets

  • Process corporate actions

  • Provide reporting and other administrative services

  • Act as a liaison between the client and the investment manager

Add your answer

Q8. How your Automation Framework is organized ?

Ans.

Our Automation Framework is organized in a modular and scalable way.

  • We use a Page Object Model design pattern

  • We have separate modules for test data, test scripts, and test reports

  • We use a central configuration file for easy maintenance

  • We have a library of reusable functions

  • We use version control to manage changes

  • We have a clear naming convention for easy identification

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to release, renew IP in CMD?

Ans.

To release and renew IP in CMD, use the commands 'ipconfig /release' and 'ipconfig /renew'.

  • Open Command Prompt

  • Type 'ipconfig /release' and press Enter to release the current IP address

  • Type 'ipconfig /renew' and press Enter to obtain a new IP address

  • You can also use 'ipconfig /all' to view detailed information about network interfaces

View 1 answer

Q10. what is xlate table in ASA and ipsec tunnel trouble shooting

Ans.

The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.

  • The xlate table is used to map internal IP addresses to external IP addresses

  • It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly

  • You can view the xlate table using the 'show xlate' command in the ASA CLI

  • If there are issues with the xlate table, it can cause I...read more

Add your answer

Q11. what is encapsulation and loading process.also write an code for Reverse string

Ans.

Encapsulation is the process of hiding internal details of an object and providing access only through defined methods.

  • Encapsulation helps in achieving data abstraction and data hiding.

  • It allows for better control over the data and prevents direct access to it.

  • Loading process refers to the process of loading a program or data into memory for execution.

  • Reverse string code example: function reverseString(str) { return str.split('').reverse().join(''); }

Add your answer

Q12. what is encapsulation and loading process. Also write an code for reverse string

Ans.

Encapsulation is the process of hiding internal implementation details and providing a public interface. Loading process refers to the steps involved in loading a program or data into memory.

  • Encapsulation helps in achieving data abstraction and information hiding.

  • It allows for better control over data and prevents unauthorized access.

  • Loading process involves steps like parsing, linking, and loading the program or data into memory.

  • Here's an example code for reversing a string:...read more

Add your answer

Q13. 1. What is a loop in switching? 2. How do you say vlan 200 working on switch? 3. How do you say ethernet frame is tagged or untagged? 4. Regarding project 5. Python string slicing 6. Max vlans allowed on single...

read more
Ans.

Technical questions related to switching, VLANs, and Python string slicing for Lead Engineer position.

  • A loop in switching occurs when a broadcast packet is forwarded endlessly between switches.

  • To say VLAN 200 is working on a switch, you can check the VLAN database or use the show vlan command.

  • An ethernet frame is tagged when it has a VLAN ID added to its header, and untagged when it does not.

  • Regarding the project, provide details on the scope, timeline, and deliverables.

  • Pytho...read more

Add your answer

Q14. If the user would not get OTP to access the profile?

Ans.

If the user does not receive OTP to access their profile, they should first check their internet connection and then contact customer support.

  • Check internet connection to ensure OTP delivery

  • Contact customer support for assistance

  • Verify contact information for accuracy

  • Consider alternative authentication methods

Add your answer

Q15. What would happened if the user would not be able to use the card?

Ans.

If the user is unable to use the card, they may experience inconvenience, potential financial loss, and may need to contact the card issuer for assistance.

  • User may face inconvenience in making purchases or transactions

  • User may incur financial loss if unable to access funds on the card

  • User may need to contact the card issuer for assistance or to report the issue

Add your answer

Q16. What is nav describe

Ans.

NAV stands for Net Asset Value, which represents the per-share value of a mutual fund or exchange-traded fund (ETF).

  • NAV is calculated by subtracting a fund's liabilities from its assets and dividing by the number of shares outstanding.

  • It is used to determine the price at which investors can buy or sell shares of the fund.

  • NAV is typically calculated at the end of each trading day.

  • For example, if a mutual fund has assets worth $100 million and liabilities worth $10 million, and...read more

Add your answer

Q17. What is private equity ? What is limited partners ? What is NAV ? What is IRR ?

Ans.

Private equity is an alternative investment class where investors pool capital to invest in private companies.

  • Limited partners are investors who provide capital to a private equity fund but have limited liability.

  • NAV (Net Asset Value) is the value of a fund's assets minus its liabilities.

  • IRR (Internal Rate of Return) is a metric used to measure the profitability of an investment over time.

  • Private equity firms typically acquire companies, improve their operations, and sell the...read more

View 1 answer

Q18. How would i f-identify whether the access was done the member or the scammer

Ans.

To identify whether the access was done by the member or the scammer, analyze login patterns, IP addresses, device information, and behavior.

  • Analyze login patterns - look for unusual login times or frequency

  • Check IP addresses - compare the location of the access to the member's usual locations

  • Review device information - see if the device used for access matches the member's known devices

  • Monitor behavior - look for any suspicious activity or changes in behavior

Add your answer

Q19. How you do forecasting. Which excel functions do you use

Ans.

I use various excel functions for forecasting such as TREND, FORECAST, and GROWTH.

  • I analyze historical data to identify trends and patterns

  • I use functions like TREND to project future values based on historical data

  • I use functions like FORECAST to estimate future values based on existing data

  • I use functions like GROWTH to project future values based on exponential growth

  • I also use other statistical functions like AVERAGE, STDEV, and CORREL to analyze data

  • I ensure accuracy by ...read more

Add your answer

Q20. Expertise in which technology

Ans.

My expertise lies in Java and related technologies.

  • Proficient in Java programming language and its frameworks like Spring and Hibernate

  • Experience in developing web applications using HTML, CSS, JavaScript, and AngularJS

  • Familiarity with database technologies like MySQL and Oracle

  • Knowledge of software development methodologies like Agile and Scrum

  • Experience in leading and mentoring a team of developers

Add your answer

Q21. what is ssl offloading in f5

Ans.

SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.

  • SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.

  • It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.

  • F5 SSL offloading can be configured to support multiple SSL certificates and protocols like TLS 1.3.

  • It can also perform SSL ...read more

Add your answer

Q22. Did you use docker? And how did you build image

Add your answer

Q23. What are the Linux commands you have used

Add your answer

Q24. Regression testing and sanity difference

Ans.

Regression testing is retesting of previously tested functionality, while sanity testing is a quick check to ensure basic functionality is working.

  • Regression testing is performed to ensure that changes or fixes in the software do not introduce new defects or impact existing functionality.

  • It involves retesting of the entire application or a specific set of test cases.

  • Regression testing is usually performed after major changes or enhancements to the software.

  • Sanity testing is a...read more

Add your answer

Q25. Possible mirror Substring from the given string

Ans.

Find possible mirror substrings in a given string

  • Iterate through the string and check for mirror substrings

  • Use two pointers to check for mirror substrings

  • Examples: 'abcddcba' -> ['abcddcba', 'cddc', 'dd']

Add your answer

Q26. what is SNAT in f5

Ans.

SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.

  • SNAT is used to translate the source IP address of outgoing traffic to a different IP address.

  • This can be useful in scenarios where multiple devices are sharing a single public IP address.

  • SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.

  • F5 offers a variety of SNAT options, including automap SNAT...read more

Add your answer

Q27. Why choose .Net core

Ans.

High performance, cross-platform compatibility, open-source, modern development features

  • Cross-platform compatibility allows for deployment on various operating systems

  • High performance due to optimized runtime and just-in-time compilation

  • Open-source community support for continuous improvement and updates

  • Modern development features like dependency injection, modular architecture, and improved performance monitoring

  • Example: .Net Core allows for easy migration of existing .Net a...read more

Add your answer

Q28. How did you deploy your models

Add your answer

Q29. Explain OSI model

Ans.

The OSI model is a conceptual framework used to describe the communication functions of a network.

  • The model has 7 layers, each with a specific function.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer communicates with the layer above and below it.

  • The model helps ensure interoperability between different network devices and software.

  • Example: When you visit a website, the Application layer sends a request to the Transpo...read more

Add your answer

Q30. What is database and scaling

Ans.

Database is a structured collection of data, scaling refers to increasing capacity to handle more data or users.

  • Database is a structured collection of data organized for easy access, retrieval, and management

  • Scaling refers to the ability of a system to handle increased workload or growth

  • Scaling can involve adding more servers, increasing storage capacity, or optimizing performance

  • Examples of scaling in databases include sharding, replication, and vertical or horizontal scalin...read more

Add your answer

Q31. Diff b/w interface and abstract

Ans.

Interface is a contract that defines the methods a class must implement, while abstract class can have both implemented and abstract methods.

  • Interface can only have abstract methods and constants, while abstract class can have both abstract and non-abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subcl...read more

Add your answer

Q32. Merge 2 list using linked list

Ans.

Merge two linked lists into one

  • Create a new linked list to store the merged list

  • Iterate through both input linked lists and add nodes to the new list in sorted order

  • Update the next pointers accordingly

Add your answer

Q33. IR Response for P1 ticket

Ans.

IR Response for P1 ticket involves immediate investigation, containment, and resolution of critical security incidents.

  • Immediately triage the incident to determine severity and impact

  • Contain the incident to prevent further damage or data loss

  • Gather evidence and conduct forensic analysis to identify root cause

  • Coordinate with relevant teams for remediation and recovery

  • Document all actions taken and lessons learned for future incidents

View 1 answer

Q34. Define Neo4J architecturaly

Ans.

Neo4J is a graph database management system that stores data in nodes and relationships.

  • Uses graph structures to represent and store data

  • Nodes represent entities and relationships represent connections between entities

  • Supports ACID transactions for data consistency

  • Query language is Cypher

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Paktolus Solutions Llc

based on 85 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 521 Interview Questions
4.0
 • 463 Interview Questions
4.2
 • 346 Interview Questions
3.7
 • 265 Interview Questions
4.0
 • 200 Interview Questions
3.7
 • 143 Interview Questions
View all
Top Incedo Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter