Premium Employer

Infosys

3.7
based on 36.3k Reviews
Filter interviews by

40+ Interview Questions and Answers

Updated 17 Aug 2024
Popular Designations

Q1. How Data Flow in SCOM monitoring Tool? DB name for SCOM and DB queries for Data Grooming. Values for Operations Console Grooming How to unseal the sealed management pack Names of Management Packs you have worke...

read more
Ans.

SCOM monitoring tool uses a database to store and process data. It also requires management packs for monitoring different components.

  • Data flows from agents to management servers and then to the database

  • SCOM uses SQL Server as its database

  • Data grooming queries can be found in the OperationsManagerDW database

  • Operations Console grooming values can be set in the Administration workspace

  • To unseal a management pack, use the 'Unseal-ManagementPack' PowerShell cmdlet

  • Examples of mana...read more

Add your answer

Q2. How did you implement Automation in your last organization?

Ans.

Implemented automation by identifying manual processes, selecting appropriate tools, and creating scripts.

  • Conducted a thorough analysis of manual processes to identify areas for automation

  • Selected appropriate automation tools based on the requirements and budget

  • Created scripts using Python and Selenium to automate repetitive tasks

  • Implemented continuous integration and delivery using Jenkins

  • Provided training to the team on using the automation tools and scripts

  • Achieved a 30% r...read more

View 1 answer

Q3. How to tackle the escalations and red situations?

Ans.

Escalations and red situations can be tackled by following a structured approach and effective communication.

  • Identify the root cause of the escalation and take immediate action to address it

  • Communicate clearly and transparently with all stakeholders involved

  • Establish a clear escalation path and ensure all team members are aware of it

  • Set realistic expectations and timelines for resolution

  • Document all actions taken and lessons learned for future reference

  • Examples: In a software...read more

Add your answer

Q4. How would you connect the machine in private subnet?

Ans.

To connect a machine in a private subnet, use a bastion host or VPN.

  • Set up a bastion host in the public subnet to act as a gateway.

  • Use SSH tunneling or RDP to connect to the bastion host.

  • From the bastion host, connect to the machine in the private subnet.

  • Alternatively, set up a VPN to securely connect to the private subnet.

  • Configure the security group and network ACLs to allow the necessary traffic.

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. What is Voip? How SBC works? What are codecs? Call flow for Call forwarding? How do you handle call muting issues? How sip registration happens? How can you troubleshoot and on going call quality issue with cus...

read more
Ans.

VoIP is a technology that allows voice communication over the internet.

  • SBC (Session Border Controller) is a device that controls the signaling and media streams involved in VoIP communication.

  • Codecs are algorithms that compress and decompress audio signals for transmission over the internet.

  • Call forwarding involves redirecting an incoming call to another number.

  • Call muting issues can be resolved by checking the microphone and speaker settings, and ensuring that the call is no...read more

Add your answer

Q6. How can you verfiy/check/validate your Ansible playbooks?

Ans.

Ansible playbooks can be verified/validated using various tools and techniques.

  • Use Ansible's built-in syntax checker 'ansible-playbook --syntax-check'

  • Use Ansible's 'ansible-lint' tool to check for best practices and potential issues

  • Use 'ansible-playbook --check' to simulate playbook execution without making changes

  • Use 'ansible-playbook --diff' to show the differences between the current and desired state

  • Use 'ansible-playbook --start-at-task=' to start playbook execution from ...read more

Add your answer
Are these interview questions helpful?

Q7. What is CI/CD pipeline, and why it is needed?

Ans.

CI/CD pipeline is a process of continuous integration and continuous delivery/deployment of software.

  • CI/CD pipeline automates the software delivery process

  • It helps in detecting and fixing bugs early in the development cycle

  • It ensures that the software is always in a releasable state

  • It reduces the time between writing code and deploying it to production

  • Examples of CI/CD tools include Jenkins, Travis CI, and CircleCI

Add your answer

Q8. Why MBA? What is the use of MBA in service based industry?

Ans.

MBA provides a comprehensive understanding of business operations and management principles, which are essential in the service industry.

  • MBA equips professionals with skills in strategic planning, financial management, and leadership, which are crucial in service-based industries.

  • It helps in developing a holistic approach to problem-solving and decision-making, which is necessary in service industries where customer satisfaction is paramount.

  • MBA graduates can apply their know...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is Maven? Diff B/W Install and Deploy

Ans.

Maven is a build automation tool used for Java projects. Install is for local repository, deploy is for remote repository.

  • Maven is used to manage dependencies and build Java projects

  • Install command installs the project's artifact (jar, war, etc.) to the local repository

  • Deploy command uploads the artifact to a remote repository

  • Install is used during development, deploy is used for distribution

  • Example: 'mvn install' installs the project locally, 'mvn deploy' deploys it to a rem...read more

Add your answer

Q10. What is inventory,roles,variable in ansible?

Ans.

Inventory is a list of hosts where Ansible runs tasks. Roles are reusable collections of tasks, files, and templates. Variables are used to store data.

  • Inventory is a file or directory containing a list of hosts or groups of hosts

  • Roles are used to organize tasks, files, and templates into reusable collections

  • Variables are used to store data that can be used across multiple tasks and roles

  • Example: inventory file can contain a group of web servers, roles can include installing a...read more

Add your answer

Q11. How to configure vswitch in vcenter

Ans.

To configure vswitch in vCenter, navigate to the Networking section, select the host, and add a new vSwitch with desired settings.

  • Navigate to Networking section in vCenter

  • Select the host where vSwitch will be configured

  • Add a new vSwitch with desired settings

Add your answer

Q12. - Steps to Create a Docker file - Types of firewall in AWS - How ELK Stack works.

Ans.

Answers to questions related to Docker, AWS firewall types, and ELK Stack

  • To create a Docker file, start with a base image and add necessary dependencies and configurations

  • AWS has two types of firewalls: Network ACLs and Security Groups

  • ELK Stack is a combination of Elasticsearch, Logstash, and Kibana used for log management and analysis

Add your answer

Q13. What are the different SAP certifications

Ans.

There are various SAP certifications available for different modules and roles.

  • SAP Certified Application Associate

  • SAP Certified Technology Associate

  • SAP Certified Development Associate

  • SAP Certified Solution Consultant

  • SAP Certified Business Associate

Add your answer

Q14. How to add user in Jenkins?

Ans.

Adding a user in Jenkins

  • Go to Jenkins dashboard and click on 'Manage Jenkins'

  • Click on 'Manage Users' and then 'Create User'

  • Fill in the user details and click 'Create User'

  • Assign the necessary permissions to the user

Add your answer

Q15. Explain subcontracting process in sap along with acounting entries.

Ans.

Subcontracting process in SAP involves sending raw materials to a vendor for processing into finished goods.

  • Create a subcontracting purchase order with material components and vendor details

  • Transfer the raw materials to the vendor's location using a transfer posting

  • Vendor processes the materials and creates a goods receipt for the finished goods

  • Create a goods receipt for the finished goods in SAP

  • Accounting entries include a decrease in raw material inventory and an increase i...read more

Add your answer

Q16. Explain about GPO scenario which caused P1 ?

Ans.

A Group Policy Object (GPO) misconfiguration causing a critical issue (P1)

  • Incorrect GPO settings leading to system instability

  • GPO conflicts with other policies causing unexpected behavior

  • Failure to properly test GPO changes before implementation

  • Lack of documentation for GPO configurations

  • Inadequate monitoring of GPO changes and their impact

Add your answer

Q17. Reason for switch and Reason for selecting Infosys

Ans.

Switched for career growth opportunities. Selected Infosys for its reputation and diverse projects.

  • Switched for better career growth opportunities

  • Selected Infosys for its reputation in the industry

  • Chose Infosys for the chance to work on diverse projects

  • Believed Infosys would provide a supportive and innovative work environment

Add your answer

Q18. How to configure jms, queues ?

Ans.

JMS and queues can be configured by defining connection factories, destinations, and message listeners.

  • Define a connection factory for the JMS provider

  • Define a destination (queue or topic) for sending and receiving messages

  • Configure message listeners to receive and process messages

  • Example: In Apache ActiveMQ, create a connection factory and queue using the web console or configuration files

  • Example: In Spring Boot, configure JMS using the JmsTemplate and @JmsListener annotatio...read more

Add your answer

Q19. Mediation flow of different call scenario

Ans.

Mediation flow of different call scenarios involves guiding parties towards a resolution through communication and negotiation.

  • Identify the issue or conflict at hand

  • Listen to each party's perspective and concerns

  • Facilitate communication between parties

  • Encourage empathy and understanding

  • Help parties brainstorm potential solutions

  • Guide parties towards a mutually agreeable resolution

Add your answer

Q20. How to configure release strategy

Ans.

Release strategy can be configured in SAP by defining release codes, release groups, and release indicators.

  • Define release codes in customizing for purchasing document types

  • Assign release codes to release groups

  • Assign release groups to users or user roles

  • Set release indicators in release strategies for document types

  • Test the release strategy by creating a purchase order and checking the release status

Add your answer

Q21. How to configure pricing procedure

Ans.

Configuring pricing procedure involves defining condition types, access sequences, and assigning them to the pricing procedure.

  • Define condition types for different pricing elements like discounts, surcharges, taxes, etc.

  • Create access sequences to determine the order in which system searches for valid condition records.

  • Assign condition types to access sequences and then assign the access sequences to the pricing procedure.

  • Maintain the pricing procedure determination in the sal...read more

Add your answer

Q22. End to end process explanation with examples

Ans.

End to end process involves all steps from start to finish of a task or project.

  • Identify the problem or task

  • Plan and strategize

  • Execute the plan

  • Monitor and evaluate progress

  • Make necessary adjustments

  • Complete the task and deliver the results

  • Example: End to end process of software development involves requirement gathering, design, coding, testing, deployment, and maintenance

Add your answer

Q23. How to take thread dump

Ans.

Thread dump can be taken using various tools and commands.

  • Using jstack command in Java

  • Using kill -3 command in Unix/Linux

  • Using VisualVM tool

  • Using Eclipse MAT tool

  • Thread dump can help in identifying thread deadlock and performance issues

Add your answer

Q24. Agile scrum process to be explained in detail

Ans.

Agile scrum is a project management framework that emphasizes teamwork, accountability, and iterative progress.

  • Agile scrum involves breaking down a project into small, manageable tasks called user stories.

  • Teams work in short iterations called sprints, typically 2-4 weeks long.

  • Daily stand-up meetings are held to discuss progress, roadblocks, and plans for the day.

  • At the end of each sprint, a review meeting is held to demonstrate completed work to stakeholders.

  • Retrospectives ar...read more

Add your answer

Q25. What is jenkinsfile?

Ans.

Jenkinsfile is a text file that defines the entire build process for a Jenkins pipeline.

  • Jenkinsfile is written in Groovy syntax

  • It can be stored in a version control system like Git

  • It allows for defining stages, steps, and conditions for a pipeline

  • Jenkinsfile can be executed on any Jenkins instance

  • Example: pipeline { agent { docker 'maven:3-alpine' } stages { stage('Build') { steps { sh 'mvn -B -DskipTests clean package' } } } }

Add your answer

Q26. different lookup tables and their uses

Ans.

Lookup tables are used to quickly retrieve data based on a key value.

  • Lookup tables are commonly used in databases to store data that needs to be accessed frequently.

  • They can be used for mapping codes to descriptions, such as converting a product code to a product name.

  • Lookup tables can also be used for translating data, such as converting abbreviations to full names.

  • They are useful for improving query performance by reducing the need for complex joins.

Add your answer

Q27. how to optimize performance?

Ans.

Optimizing performance involves identifying bottlenecks, improving efficiency, and utilizing resources effectively.

  • Identify and prioritize key performance indicators (KPIs)

  • Optimize code and algorithms for efficiency

  • Utilize caching and indexing to improve data retrieval speed

  • Implement load balancing and scaling strategies

  • Regularly monitor and analyze performance metrics

Add your answer

Q28. what is lazy loading?

Ans.

Lazy loading is a design pattern where objects are loaded into memory only when they are needed.

  • Lazy loading helps improve performance by reducing initial loading time.

  • It is commonly used in web development for loading images or content as the user scrolls down the page.

  • Lazy loading can also be used in programming languages to delay the loading of resources until they are actually needed.

Add your answer

Q29. Describe physical inventory process.

Ans.

Physical inventory process involves counting and verifying the actual inventory on hand.

  • All inventory is counted and verified for accuracy

  • The process may involve shutting down operations temporarily

  • Inventory records are compared to actual counts to identify discrepancies

  • The process may be done manually or with the help of technology such as barcode scanners

  • The results of the physical inventory are used to update inventory records and identify any losses or gains

Add your answer

Q30. End to end process explaination

Ans.

End to end process explanation refers to the complete process from start to finish.

  • End to end process explanation involves detailing every step of a process from beginning to end.

  • It includes all the activities, tasks, and resources required to complete the process.

  • For example, the end to end process of ordering a product online would include selecting the product, adding it to the cart, entering payment and shipping information, and receiving the product.

  • It is important to un...read more

Add your answer

Q31. Diff between list and tuple.

Ans.

List is mutable and tuple is immutable in Python.

  • List can be modified after creation while tuple cannot be modified.

  • List uses square brackets [] while tuple uses parentheses ().

  • List is used for homogeneous data while tuple is used for heterogeneous data.

  • List is slower than tuple in terms of performance.

  • Example of list: [1, 2, 3] and example of tuple: (1, 'hello', 3.14)

Add your answer

Q32. Find first() vs findany

Ans.

findFirst() returns the first element of a stream, while findAny() returns any element of a stream.

  • findFirst() is deterministic and will always return the first element of a stream, while findAny() is non-deterministic and can return any element.

  • findFirst() is useful when you need to find a specific element in a stream, while findAny() is useful when you just need any element from the stream.

  • Example: stream.findFirst() vs stream.findAny()

Add your answer

Q33. Map vs flatmap in stream

Ans.

Map is used to transform each element in a stream, while flatMap is used to transform each element into multiple elements in a stream.

  • Map applies a function to each element in the stream and returns a new stream with the transformed elements.

  • FlatMap applies a function that returns a stream for each element in the original stream, then flattens these streams into a single stream.

  • Example: Using map to convert a list of strings to uppercase - list.stream().map(String::toUpperCas...read more

Add your answer

Q34. What is APP steps?

Ans.

APP steps refer to the steps involved in the APP (Assessment, Planning, and Preparation) process.

  • Assessment: Evaluate the current situation or problem.

  • Planning: Develop a strategy or plan to address the issue.

  • Preparation: Get ready to implement the plan.

  • Example: In project management, APP steps are crucial for successful project execution.

Add your answer

Q35. Do you know EBS?

Ans.

Yes, EBS stands for Elastic Block Store, a block storage service provided by AWS.

  • EBS is used to store persistent data for EC2 instances in AWS.

  • It allows you to create volumes that can be attached to EC2 instances.

  • EBS volumes can be encrypted for security.

  • Snapshots can be taken of EBS volumes for backup purposes.

Add your answer

Q36. working of different decoder

Ans.

Decoders are electronic circuits that convert coded inputs into a set of outputs based on specific rules.

  • Decoders take binary inputs and produce multiple outputs based on the input code.

  • They are commonly used in digital electronics to select one of multiple options based on the input signal.

  • Examples of decoders include 2-to-4 line decoder, 3-to-8 line decoder, and BCD to 7-segment decoder.

Add your answer

Q37. Explain supply chain process

Ans.

Supply chain process involves the flow of goods and services from the initial raw materials to the final delivery to customers.

  • Includes sourcing raw materials

  • Manufacturing or production

  • Distribution

  • Retailing or delivery to customers

  • Involves coordination between suppliers, manufacturers, distributors, retailers, and customers

Add your answer

Q38. Explain demand planning

Ans.

Demand planning is the process of forecasting customer demand for products or services to optimize inventory levels and meet customer needs.

  • Forecasting customer demand based on historical data, market trends, and other factors

  • Collaborating with sales, marketing, and production teams to align demand forecasts with business goals

  • Adjusting inventory levels and production schedules to meet demand fluctuations

  • Utilizing demand planning software and tools to streamline the process

  • Mo...read more

Add your answer

Q39. HashMap vs Hashtable

Ans.

HashMap allows null values and keys, Hashtable does not. HashMap is not synchronized, Hashtable is.

  • HashMap is not synchronized, so it is faster but not thread-safe.

  • Hashtable is synchronized, so it is thread-safe but slower than HashMap.

  • HashMap allows null values and one null key, Hashtable does not allow null keys or values.

Add your answer

Q40. Filter in stream

Ans.

Filter in stream refers to the process of selecting specific data from a continuous flow of information.

  • Use filter functions to extract desired data from a stream

  • Specify criteria for filtering, such as keywords, values, or patterns

  • Examples: Filtering out spam emails from an inbox, extracting specific data from a live data feed

Add your answer

Q41. What is Streams API

Ans.

Streams API is a high-level API for processing data in a streaming fashion.

  • Streams API allows for processing data piece by piece as it becomes available

  • It is commonly used in JavaScript for handling data streams from sources like files or network requests

  • Streams API can improve performance and memory usage by processing data incrementally

Add your answer

Q42. 3rd party sales process

Ans.

The 3rd party sales process involves selling products or services through an intermediary rather than directly to the end customer.

  • Identify potential 3rd party partners who can help reach new markets or customers

  • Negotiate terms and agreements with the 3rd party, including pricing, distribution, and marketing strategies

  • Provide training and support to the 3rd party to ensure they effectively sell the product or service

  • Monitor and evaluate the performance of the 3rd party to ens...read more

Add your answer

Q43. Item category determination

Ans.

Item category determination involves assigning products to specific categories based on predefined criteria.

  • Consider the characteristics of the product such as size, color, material, and purpose.

  • Use predefined rules or algorithms to automatically assign categories.

  • Consult with stakeholders to ensure accurate categorization.

  • Examples: Clothing items can be categorized by gender, size, and type. Electronics can be categorized by brand, function, and price range.

Add your answer

Q44. Tell me about PO

Ans.

PO stands for Purchase Order, a document issued by a buyer to a seller indicating types, quantities, and agreed prices for products or services.

  • PO is a legally binding contract between the buyer and seller.

  • It helps in tracking and managing orders, ensuring timely delivery of goods or services.

  • POs are commonly used in business transactions to streamline the purchasing process.

  • Example: A company issues a PO to a supplier for 100 units of a specific product at an agreed price.

Add your answer

Q45. Architecture of SIEM

Ans.

SIEM architecture involves data collection, normalization, correlation, and analysis to detect and respond to security threats.

  • SIEM collects data from various sources such as logs, network traffic, and endpoints.

  • The collected data is normalized to a common format for easy analysis.

  • Correlation rules are applied to identify potential security threats.

  • SIEM provides real-time alerts and reports to security teams for timely response.

  • Examples of SIEM solutions include Splunk, IBM Q...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 59 interviews in the last 1 year
3 Interview rounds
Technical Round
HR Round 1
HR Round 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Consultant Interview Questions from Similar Companies

4.0
 • 34 Interview Questions
3.6
 • 19 Interview Questions
3.8
 • 12 Interview Questions
3.1
 • 10 Interview Questions
3.8
 • 10 Interview Questions
4.0
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter