Infosys
40+ Interview Questions and Answers
Q1. How Data Flow in SCOM monitoring Tool? DB name for SCOM and DB queries for Data Grooming. Values for Operations Console Grooming How to unseal the sealed management pack Names of Management Packs you have worke...
read moreSCOM monitoring tool uses a database to store and process data. It also requires management packs for monitoring different components.
Data flows from agents to management servers and then to the database
SCOM uses SQL Server as its database
Data grooming queries can be found in the OperationsManagerDW database
Operations Console grooming values can be set in the Administration workspace
To unseal a management pack, use the 'Unseal-ManagementPack' PowerShell cmdlet
Examples of mana...read more
Q2. How did you implement Automation in your last organization?
Implemented automation by identifying manual processes, selecting appropriate tools, and creating scripts.
Conducted a thorough analysis of manual processes to identify areas for automation
Selected appropriate automation tools based on the requirements and budget
Created scripts using Python and Selenium to automate repetitive tasks
Implemented continuous integration and delivery using Jenkins
Provided training to the team on using the automation tools and scripts
Achieved a 30% r...read more
Q3. How to tackle the escalations and red situations?
Escalations and red situations can be tackled by following a structured approach and effective communication.
Identify the root cause of the escalation and take immediate action to address it
Communicate clearly and transparently with all stakeholders involved
Establish a clear escalation path and ensure all team members are aware of it
Set realistic expectations and timelines for resolution
Document all actions taken and lessons learned for future reference
Examples: In a software...read more
Q4. How would you connect the machine in private subnet?
To connect a machine in a private subnet, use a bastion host or VPN.
Set up a bastion host in the public subnet to act as a gateway.
Use SSH tunneling or RDP to connect to the bastion host.
From the bastion host, connect to the machine in the private subnet.
Alternatively, set up a VPN to securely connect to the private subnet.
Configure the security group and network ACLs to allow the necessary traffic.
Q5. What is Voip? How SBC works? What are codecs? Call flow for Call forwarding? How do you handle call muting issues? How sip registration happens? How can you troubleshoot and on going call quality issue with cus...
read moreVoIP is a technology that allows voice communication over the internet.
SBC (Session Border Controller) is a device that controls the signaling and media streams involved in VoIP communication.
Codecs are algorithms that compress and decompress audio signals for transmission over the internet.
Call forwarding involves redirecting an incoming call to another number.
Call muting issues can be resolved by checking the microphone and speaker settings, and ensuring that the call is no...read more
Q6. How can you verfiy/check/validate your Ansible playbooks?
Ansible playbooks can be verified/validated using various tools and techniques.
Use Ansible's built-in syntax checker 'ansible-playbook --syntax-check'
Use Ansible's 'ansible-lint' tool to check for best practices and potential issues
Use 'ansible-playbook --check' to simulate playbook execution without making changes
Use 'ansible-playbook --diff' to show the differences between the current and desired state
Use 'ansible-playbook --start-at-task=
' to start playbook execution from ...read more
Q7. What is CI/CD pipeline, and why it is needed?
CI/CD pipeline is a process of continuous integration and continuous delivery/deployment of software.
CI/CD pipeline automates the software delivery process
It helps in detecting and fixing bugs early in the development cycle
It ensures that the software is always in a releasable state
It reduces the time between writing code and deploying it to production
Examples of CI/CD tools include Jenkins, Travis CI, and CircleCI
Q8. Why MBA? What is the use of MBA in service based industry?
MBA provides a comprehensive understanding of business operations and management principles, which are essential in the service industry.
MBA equips professionals with skills in strategic planning, financial management, and leadership, which are crucial in service-based industries.
It helps in developing a holistic approach to problem-solving and decision-making, which is necessary in service industries where customer satisfaction is paramount.
MBA graduates can apply their know...read more
Q9. What is Maven? Diff B/W Install and Deploy
Maven is a build automation tool used for Java projects. Install is for local repository, deploy is for remote repository.
Maven is used to manage dependencies and build Java projects
Install command installs the project's artifact (jar, war, etc.) to the local repository
Deploy command uploads the artifact to a remote repository
Install is used during development, deploy is used for distribution
Example: 'mvn install' installs the project locally, 'mvn deploy' deploys it to a rem...read more
Q10. What is inventory,roles,variable in ansible?
Inventory is a list of hosts where Ansible runs tasks. Roles are reusable collections of tasks, files, and templates. Variables are used to store data.
Inventory is a file or directory containing a list of hosts or groups of hosts
Roles are used to organize tasks, files, and templates into reusable collections
Variables are used to store data that can be used across multiple tasks and roles
Example: inventory file can contain a group of web servers, roles can include installing a...read more
Q11. How to configure vswitch in vcenter
To configure vswitch in vCenter, navigate to the Networking section, select the host, and add a new vSwitch with desired settings.
Navigate to Networking section in vCenter
Select the host where vSwitch will be configured
Add a new vSwitch with desired settings
Q12. - Steps to Create a Docker file - Types of firewall in AWS - How ELK Stack works.
Answers to questions related to Docker, AWS firewall types, and ELK Stack
To create a Docker file, start with a base image and add necessary dependencies and configurations
AWS has two types of firewalls: Network ACLs and Security Groups
ELK Stack is a combination of Elasticsearch, Logstash, and Kibana used for log management and analysis
Q13. What are the different SAP certifications
There are various SAP certifications available for different modules and roles.
SAP Certified Application Associate
SAP Certified Technology Associate
SAP Certified Development Associate
SAP Certified Solution Consultant
SAP Certified Business Associate
Q14. How to add user in Jenkins?
Adding a user in Jenkins
Go to Jenkins dashboard and click on 'Manage Jenkins'
Click on 'Manage Users' and then 'Create User'
Fill in the user details and click 'Create User'
Assign the necessary permissions to the user
Q15. Explain subcontracting process in sap along with acounting entries.
Subcontracting process in SAP involves sending raw materials to a vendor for processing into finished goods.
Create a subcontracting purchase order with material components and vendor details
Transfer the raw materials to the vendor's location using a transfer posting
Vendor processes the materials and creates a goods receipt for the finished goods
Create a goods receipt for the finished goods in SAP
Accounting entries include a decrease in raw material inventory and an increase i...read more
Q16. Explain about GPO scenario which caused P1 ?
A Group Policy Object (GPO) misconfiguration causing a critical issue (P1)
Incorrect GPO settings leading to system instability
GPO conflicts with other policies causing unexpected behavior
Failure to properly test GPO changes before implementation
Lack of documentation for GPO configurations
Inadequate monitoring of GPO changes and their impact
Q17. Reason for switch and Reason for selecting Infosys
Switched for career growth opportunities. Selected Infosys for its reputation and diverse projects.
Switched for better career growth opportunities
Selected Infosys for its reputation in the industry
Chose Infosys for the chance to work on diverse projects
Believed Infosys would provide a supportive and innovative work environment
Q18. How to configure jms, queues ?
JMS and queues can be configured by defining connection factories, destinations, and message listeners.
Define a connection factory for the JMS provider
Define a destination (queue or topic) for sending and receiving messages
Configure message listeners to receive and process messages
Example: In Apache ActiveMQ, create a connection factory and queue using the web console or configuration files
Example: In Spring Boot, configure JMS using the JmsTemplate and @JmsListener annotatio...read more
Q19. Mediation flow of different call scenario
Mediation flow of different call scenarios involves guiding parties towards a resolution through communication and negotiation.
Identify the issue or conflict at hand
Listen to each party's perspective and concerns
Facilitate communication between parties
Encourage empathy and understanding
Help parties brainstorm potential solutions
Guide parties towards a mutually agreeable resolution
Q20. How to configure release strategy
Release strategy can be configured in SAP by defining release codes, release groups, and release indicators.
Define release codes in customizing for purchasing document types
Assign release codes to release groups
Assign release groups to users or user roles
Set release indicators in release strategies for document types
Test the release strategy by creating a purchase order and checking the release status
Q21. How to configure pricing procedure
Configuring pricing procedure involves defining condition types, access sequences, and assigning them to the pricing procedure.
Define condition types for different pricing elements like discounts, surcharges, taxes, etc.
Create access sequences to determine the order in which system searches for valid condition records.
Assign condition types to access sequences and then assign the access sequences to the pricing procedure.
Maintain the pricing procedure determination in the sal...read more
Q22. End to end process explanation with examples
End to end process involves all steps from start to finish of a task or project.
Identify the problem or task
Plan and strategize
Execute the plan
Monitor and evaluate progress
Make necessary adjustments
Complete the task and deliver the results
Example: End to end process of software development involves requirement gathering, design, coding, testing, deployment, and maintenance
Q23. How to take thread dump
Thread dump can be taken using various tools and commands.
Using jstack command in Java
Using kill -3 command in Unix/Linux
Using VisualVM tool
Using Eclipse MAT tool
Thread dump can help in identifying thread deadlock and performance issues
Q24. Agile scrum process to be explained in detail
Agile scrum is a project management framework that emphasizes teamwork, accountability, and iterative progress.
Agile scrum involves breaking down a project into small, manageable tasks called user stories.
Teams work in short iterations called sprints, typically 2-4 weeks long.
Daily stand-up meetings are held to discuss progress, roadblocks, and plans for the day.
At the end of each sprint, a review meeting is held to demonstrate completed work to stakeholders.
Retrospectives ar...read more
Q25. What is jenkinsfile?
Jenkinsfile is a text file that defines the entire build process for a Jenkins pipeline.
Jenkinsfile is written in Groovy syntax
It can be stored in a version control system like Git
It allows for defining stages, steps, and conditions for a pipeline
Jenkinsfile can be executed on any Jenkins instance
Example: pipeline { agent { docker 'maven:3-alpine' } stages { stage('Build') { steps { sh 'mvn -B -DskipTests clean package' } } } }
Q26. different lookup tables and their uses
Lookup tables are used to quickly retrieve data based on a key value.
Lookup tables are commonly used in databases to store data that needs to be accessed frequently.
They can be used for mapping codes to descriptions, such as converting a product code to a product name.
Lookup tables can also be used for translating data, such as converting abbreviations to full names.
They are useful for improving query performance by reducing the need for complex joins.
Q27. how to optimize performance?
Optimizing performance involves identifying bottlenecks, improving efficiency, and utilizing resources effectively.
Identify and prioritize key performance indicators (KPIs)
Optimize code and algorithms for efficiency
Utilize caching and indexing to improve data retrieval speed
Implement load balancing and scaling strategies
Regularly monitor and analyze performance metrics
Q28. what is lazy loading?
Lazy loading is a design pattern where objects are loaded into memory only when they are needed.
Lazy loading helps improve performance by reducing initial loading time.
It is commonly used in web development for loading images or content as the user scrolls down the page.
Lazy loading can also be used in programming languages to delay the loading of resources until they are actually needed.
Q29. Describe physical inventory process.
Physical inventory process involves counting and verifying the actual inventory on hand.
All inventory is counted and verified for accuracy
The process may involve shutting down operations temporarily
Inventory records are compared to actual counts to identify discrepancies
The process may be done manually or with the help of technology such as barcode scanners
The results of the physical inventory are used to update inventory records and identify any losses or gains
Q30. End to end process explaination
End to end process explanation refers to the complete process from start to finish.
End to end process explanation involves detailing every step of a process from beginning to end.
It includes all the activities, tasks, and resources required to complete the process.
For example, the end to end process of ordering a product online would include selecting the product, adding it to the cart, entering payment and shipping information, and receiving the product.
It is important to un...read more
Q31. Diff between list and tuple.
List is mutable and tuple is immutable in Python.
List can be modified after creation while tuple cannot be modified.
List uses square brackets [] while tuple uses parentheses ().
List is used for homogeneous data while tuple is used for heterogeneous data.
List is slower than tuple in terms of performance.
Example of list: [1, 2, 3] and example of tuple: (1, 'hello', 3.14)
Q32. Find first() vs findany
findFirst() returns the first element of a stream, while findAny() returns any element of a stream.
findFirst() is deterministic and will always return the first element of a stream, while findAny() is non-deterministic and can return any element.
findFirst() is useful when you need to find a specific element in a stream, while findAny() is useful when you just need any element from the stream.
Example: stream.findFirst() vs stream.findAny()
Q33. Map vs flatmap in stream
Map is used to transform each element in a stream, while flatMap is used to transform each element into multiple elements in a stream.
Map applies a function to each element in the stream and returns a new stream with the transformed elements.
FlatMap applies a function that returns a stream for each element in the original stream, then flattens these streams into a single stream.
Example: Using map to convert a list of strings to uppercase - list.stream().map(String::toUpperCas...read more
Q34. What is APP steps?
APP steps refer to the steps involved in the APP (Assessment, Planning, and Preparation) process.
Assessment: Evaluate the current situation or problem.
Planning: Develop a strategy or plan to address the issue.
Preparation: Get ready to implement the plan.
Example: In project management, APP steps are crucial for successful project execution.
Q35. Do you know EBS?
Yes, EBS stands for Elastic Block Store, a block storage service provided by AWS.
EBS is used to store persistent data for EC2 instances in AWS.
It allows you to create volumes that can be attached to EC2 instances.
EBS volumes can be encrypted for security.
Snapshots can be taken of EBS volumes for backup purposes.
Q36. working of different decoder
Decoders are electronic circuits that convert coded inputs into a set of outputs based on specific rules.
Decoders take binary inputs and produce multiple outputs based on the input code.
They are commonly used in digital electronics to select one of multiple options based on the input signal.
Examples of decoders include 2-to-4 line decoder, 3-to-8 line decoder, and BCD to 7-segment decoder.
Q37. Explain supply chain process
Supply chain process involves the flow of goods and services from the initial raw materials to the final delivery to customers.
Includes sourcing raw materials
Manufacturing or production
Distribution
Retailing or delivery to customers
Involves coordination between suppliers, manufacturers, distributors, retailers, and customers
Q38. Explain demand planning
Demand planning is the process of forecasting customer demand for products or services to optimize inventory levels and meet customer needs.
Forecasting customer demand based on historical data, market trends, and other factors
Collaborating with sales, marketing, and production teams to align demand forecasts with business goals
Adjusting inventory levels and production schedules to meet demand fluctuations
Utilizing demand planning software and tools to streamline the process
Mo...read more
Q39. HashMap vs Hashtable
HashMap allows null values and keys, Hashtable does not. HashMap is not synchronized, Hashtable is.
HashMap is not synchronized, so it is faster but not thread-safe.
Hashtable is synchronized, so it is thread-safe but slower than HashMap.
HashMap allows null values and one null key, Hashtable does not allow null keys or values.
Q40. Filter in stream
Filter in stream refers to the process of selecting specific data from a continuous flow of information.
Use filter functions to extract desired data from a stream
Specify criteria for filtering, such as keywords, values, or patterns
Examples: Filtering out spam emails from an inbox, extracting specific data from a live data feed
Q41. What is Streams API
Streams API is a high-level API for processing data in a streaming fashion.
Streams API allows for processing data piece by piece as it becomes available
It is commonly used in JavaScript for handling data streams from sources like files or network requests
Streams API can improve performance and memory usage by processing data incrementally
Q42. 3rd party sales process
The 3rd party sales process involves selling products or services through an intermediary rather than directly to the end customer.
Identify potential 3rd party partners who can help reach new markets or customers
Negotiate terms and agreements with the 3rd party, including pricing, distribution, and marketing strategies
Provide training and support to the 3rd party to ensure they effectively sell the product or service
Monitor and evaluate the performance of the 3rd party to ens...read more
Q43. Item category determination
Item category determination involves assigning products to specific categories based on predefined criteria.
Consider the characteristics of the product such as size, color, material, and purpose.
Use predefined rules or algorithms to automatically assign categories.
Consult with stakeholders to ensure accurate categorization.
Examples: Clothing items can be categorized by gender, size, and type. Electronics can be categorized by brand, function, and price range.
Q44. Tell me about PO
PO stands for Purchase Order, a document issued by a buyer to a seller indicating types, quantities, and agreed prices for products or services.
PO is a legally binding contract between the buyer and seller.
It helps in tracking and managing orders, ensuring timely delivery of goods or services.
POs are commonly used in business transactions to streamline the purchasing process.
Example: A company issues a PO to a supplier for 100 units of a specific product at an agreed price.
Q45. Architecture of SIEM
SIEM architecture involves data collection, normalization, correlation, and analysis to detect and respond to security threats.
SIEM collects data from various sources such as logs, network traffic, and endpoints.
The collected data is normalized to a common format for easy analysis.
Correlation rules are applied to identify potential security threats.
SIEM provides real-time alerts and reports to security teams for timely response.
Examples of SIEM solutions include Splunk, IBM Q...read more
Top HR Questions asked in null
Interview Process at null
Top Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month