i
Infosys
Filter interviews by
I have worked on various projects involving test automation for web applications using Selenium and API testing using Postman.
Developed automated test scripts using Selenium WebDriver for regression testing of web applications
Created test suites and executed test cases using TestNG framework
Performed API testing using Postman to validate response data and status codes
Integrated test automation scripts with CI/CD pipeli...
API testing is a type of software testing that involves testing APIs directly to ensure they meet functionality, reliability, performance, and security requirements.
API testing involves testing the functionality, reliability, performance, and security of APIs.
It focuses on verifying the communication and data exchange between different software systems.
API testing can be done at different levels such as unit testing, i...
Post is used to create a new resource, while patch is used to update an existing resource.
Post is used to create a new resource in the server.
Patch is used to update an existing resource in the server.
Post request typically includes all the data needed to create the resource, while patch request only includes the data that needs to be updated.
Post requests are idempotent, meaning multiple identical requests will have t...
Priority and severity are used to classify the impact and importance of a defect in software testing.
Priority determines the order in which defects should be fixed, based on business needs.
Severity indicates the impact of a defect on the system or users.
Priority is usually set by the product owner or business stakeholders.
Severity is typically determined by the testing team based on the impact on functionality.
Examples...
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
A testing framework is a set of guidelines, coding standards, concepts, processes, practices, project hierarchies, modularity, reporting mechanisms, and tool support for writing automated tests.
Provides a structure for organizing test scripts and test data
Offers reusable functions and libraries for common testing tasks
Helps in generating test reports and managing test execution
Supports integration with other tools and
Java code to identify duplicates in a given string
Convert the string into an array of characters
Use a HashMap to store each character and its frequency
Iterate through the array and check if the character already exists in the HashMap
If it does, increment the frequency count, if not, add it to the HashMap
Finally, iterate through the HashMap and print out the characters with frequency greater than 1
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
Taking a screenshot in Selenium can be done using the getScreenshotAs method.
Use WebDriver's getScreenshotAs method to capture the screenshot
Save the screenshot to a file using File class
Handle exceptions using try-catch block
A defect can have high severity and low priority when it affects critical functionality but can be easily worked around.
High severity due to impact on critical functionality
Low priority because there is a workaround available
Example: Spelling mistake in a non-critical error message
Use a HashSet to remove duplicates from a String in Java.
Create a HashSet to store unique characters.
Iterate through the String and add each character to the HashSet.
Convert the HashSet back to a String to get the result.
Oops concepts are not directly used in automation testing, but understanding them can help in writing better test scripts.
Understanding object-oriented programming concepts can help in writing efficient and maintainable test scripts
Encapsulation, inheritance, and polymorphism can be applied in test automation to improve code reusability and readability
For example, using inheritance to create a base test class with comm
Use a hash map to find repeated words in a sentence.
Split the sentence into words using space as delimiter
Create a hash map to store word frequencies
Iterate through the words and update the frequencies in the hash map
Identify words with frequency greater than 1 as repeated words
Infosys interview questions for designations
What people are saying about Infosys
I applied via Campus Placement and was interviewed before Jul 2020. There were 4 interview rounds.
The project involved designing and implementing a new network infrastructure for a large corporation.
Conducted a thorough analysis of the existing network infrastructure
Designed a new network architecture that met the company's needs
Implemented the new network infrastructure with minimal disruption to business operations
Tested and optimized the new network to ensure optimal performance
Provided ongoing support and maint
I applied via Naukri.com and was interviewed in Jul 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Jul 2020. There were 5 interview rounds.
I applied via Recruitment Consultant and was interviewed in Dec 2018. There were 3 interview rounds.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or softwa...
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to...
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass cens...
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but ...
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls...
I applied via Campus Placement and was interviewed in Nov 2020. There was 1 interview round.
The largest area in a histogram refers to the rectangle with the maximum area that can be formed within the histogram.
To find the largest area in a histogram, we can use the concept of a stack.
We iterate through each bar in the histogram and maintain a stack of bars in non-decreasing order of their heights.
If the current bar's height is greater than the height of the bar at the top of the stack, we push the current bar...
I applied via Campus Placement and was interviewed before Oct 2019. There were 4 interview rounds.
based on 4 interviews
1 Interview rounds
based on 6 reviews
Rating in categories
Technology Analyst
55.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Systems Engineer
50.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
System Engineer
39.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
30.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate Consultant
28k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Cognizant
Accenture