i
Infosys
Work with us
Filter interviews by
I have fixed security vulnerabilities related to SQL injection, cross-site scripting, and insecure direct object references.
Implemented input validation to prevent SQL injection attacks
Escaped user input to prevent cross-site scripting attacks
Implemented access controls to prevent insecure direct object references
Regularly updated security patches and libraries
MVC stands for Model-View-Controller. Controller is a component that handles user input and updates the model and view accordingly.
MVC is a software design pattern commonly used in web development
Controller is responsible for handling user input and updating the model and view
Controller acts as an intermediary between the model and the view
Examples: ASP.NET MVC, Spring MVC, Ruby on Rails
Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data in the form of fields (attributes or properties) and code in the form of procedures (methods).
OOP focuses on creating objects that interact with each other to solve a problem.
Key concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation involves bundling data and method...
SQL joins are used to combine rows from two or more tables based on a related column between them.
Use INNER JOIN to return rows when there is at least one match in both tables
Use LEFT JOIN to return all rows from the left table, and the matched rows from the right table
Use RIGHT JOIN to return all rows from the right table, and the matched rows from the left table
Use FULL JOIN to return rows when there is a match ...
Exceptions are unexpected events that disrupt the normal flow of operations.
Exceptions are errors or unusual conditions that occur during the execution of a program.
They can be caused by various factors such as invalid input, hardware failures, or network issues.
Handling exceptions involves using try-catch blocks to catch and handle the errors gracefully.
Examples of exceptions include NullPointerException, ArrayIn...
Adapters are devices that allow different types of connectors or interfaces to be connected together.
There are various types of adapters such as USB adapters, HDMI adapters, power adapters, etc.
Adapters can also include converters that change the signal type or format, such as VGA to HDMI adapters.
Some adapters are specific to certain devices or brands, like Apple Lightning to 3.5mm headphone jack adapters.
Adapter...
This task involves counting the frequency of each character in a given string using Java.
Use a HashMap to store characters as keys and their frequencies as values.
Iterate through the string, updating the count for each character.
Example: For the string 'hello', the output should be {h=1, e=1, l=2, o=1}.
Consider edge cases like empty strings or strings with special characters.
I led a team in developing a Java project for a financial institution.
Developed a secure online banking platform using Java EE
Implemented features such as account management, transaction history, and fund transfers
Utilized Spring framework for dependency injection and Hibernate for database interaction
Sort strings based on city names.
Use Arrays.sort() method with a custom Comparator to sort strings based on city names.
Create a Comparator that compares the city names of two strings.
Example: String[] cities = {"New York", "London", "Paris"};
Example: Arrays.sort(cities, (a, b) -> a.compareTo(b));
Find 2nd max element in an array of strings.
Sort the array in descending order
Return the element at index 1
I appeared for an interview in Jan 2025.
Snowflake offers a unique architecture that separates storage and compute, providing scalability, flexibility, and cost-effectiveness.
Snowflake's architecture separates storage and compute, allowing for independent scaling of each component.
Snowflake uses virtual warehouses to allocate compute resources on-demand, optimizing performance and cost.
Snowflake's multi-cluster shared data architecture enables seamless collab...
Time travel refers to the ability to query historical data in Snowflake, while fail safe refers to the system's ability to maintain data integrity and availability in case of failures.
Time travel allows users to query data as it existed at a specific point in the past, using the TIMESTAMP parameter in queries.
Fail safe mechanisms in Snowflake ensure data integrity and availability by automatically handling system failu...
Live feed is real-time data while extract is historical data.
Live feed is data that is constantly updated in real-time.
Extract is historical data that is extracted at a specific point in time.
Live feed is commonly used for monitoring real-time events, while extract is used for analysis of past data.
Examples: Twitter feed is live data, while a monthly sales report is an extract.
Join combines data from two or more tables based on a related column, while data blending combines data from different sources without a direct relationship.
Join is used to combine data from multiple tables based on a common column.
Data blending is used to combine data from different sources without a direct relationship.
Join requires a common column to match records, while data blending does not require a common colum...
I appeared for an interview in May 2025, where I was asked the following questions.
Experienced Technical Lead with a strong background in software development and team management, passionate about delivering innovative solutions.
Over 10 years of experience in software development, specializing in Java and Python.
Led a team of 8 developers in a successful project that improved system performance by 30%.
Implemented Agile methodologies, resulting in a 25% increase in team productivity.
Strong communicati...
I have extensive experience in software development, team leadership, and project management across various technologies.
Led a team of 5 developers in creating a web application using React and Node.js, improving user engagement by 30%.
Implemented Agile methodologies, resulting in a 25% increase in project delivery speed.
Designed and optimized RESTful APIs, enhancing system performance and reducing response time by 40%...
I appeared for an interview in Feb 2025, where I was asked the following questions.
I struggle with expressing my answers confidently, even when I know them to be correct.
I often second-guess my responses during discussions, fearing they may be incorrect.
In team meetings, I hesitate to share my ideas, even when I have valuable insights.
For example, during a recent project, I had a solution but didn't voice it, leading to delays.
I am working on this by practicing assertiveness and seeking feedback from...
I appeared for an interview in Jan 2025.
HF stands for Heavy Forwarder, used for data forwarding and processing. UF stands for Universal Forwarder, used for lightweight data forwarding only.
HF is used for data forwarding, processing, and indexing, while UF is used for lightweight data forwarding only
HF can parse and index data locally, while UF can only forward data to indexers
HF requires more resources and is typically deployed on dedicated hardware, while U...
DS in Splunk stands for Data Source.
DS refers to the source of data that is being indexed and analyzed in Splunk.
Common data sources in Splunk include log files, metrics, and events from various systems and applications.
DS can also refer to the Data Summary feature in Splunk, which provides a summary of indexed data.
stats, eventstats, streamstats, and tstats are different Splunk commands used for statistical analysis.
stats: used to calculate statistics on the events in the search results.
eventstats: used to calculate statistics on the events in the search results, but the results are added as new fields to each event.
streamstats: used to calculate statistics on the events in the search results, but the results are added as new fie...
In Splunk, the priority of files is determined by the order in which they are indexed.
Files are indexed based on the inputs.conf configuration file.
Priority can be set using the 'disabled' attribute in inputs.conf.
Files with higher priority are indexed first.
Priority can also be influenced by the order of stanzas in inputs.conf.
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
CCW stands for Counterclockwise while DIS CCW stands for Disconnected Counterclockwise.
CCW refers to a direction of rotation that is opposite to the clockwise direction.
DIS CCW refers to a situation where something is disconnected from its counterclockwise rotation.
Example: Turning a screw counterclockwise is CCW, while a disconnected counterclockwise rotation could refer to a malfunctioning gear.
Example: In a motor, C...
PECI stands for Problem, Etiology, Context, and Intervention, while PICOF stands for Population, Intervention, Comparison, Outcome, and Timeframe.
PECI is used in problem-solving to identify and address issues, while PICOF is used in research to formulate a research question.
PECI focuses on the problem, its causes, the context in which it occurs, and potential interventions to address it.
PICOF focuses on defining the po...
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There were 2 interview rounds.
Docker images provide a lightweight, portable, and consistent environment for running applications.
Docker images encapsulate all dependencies and configurations needed for an application to run
They can be easily shared and deployed across different environments
Docker images are immutable, ensuring consistency and reproducibility
Containers based on Docker images are isolated from the host system, enhancing security
Docke...
I applied via Referral and was interviewed in Oct 2024. There were 3 interview rounds.
Seeking new challenges and growth opportunities in a more innovative environment.
Looking for new challenges and opportunities for growth
Interested in working in a more innovative environment
Seeking a better work-life balance
My workday as a Snowflake Developer involves data modeling, ETL processes, and collaborating with teams to optimize data solutions.
Start the day by reviewing project requirements and prioritizing tasks.
Collaborate with data engineers to design and implement ETL pipelines.
Monitor Snowflake performance and optimize queries for efficiency.
Conduct code reviews and provide feedback to team members.
Participate in daily stand...
I worked on developing data pipelines for ingesting and processing large volumes of data in Snowflake.
Designed and implemented ETL processes using Snowflake's features like Snowpipe and tasks.
Optimized SQL queries for performance and scalability.
Collaborated with data engineers and analysts to understand requirements and deliver solutions.
Implemented data quality checks and monitoring processes to ensure data integrity...
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
I appeared for an interview in Nov 2024.
Editing data in complex views can affect underlying tables, but it depends on the view's structure and rules.
Complex views often involve joins, aggregations, or groupings, making them non-updatable.
If a view is updatable, changes made to it will reflect in the underlying tables.
Example: A simple view on a single table can be updated directly.
Example: A view that aggregates data (e.g., SUM, COUNT) cannot be updated dire...
Performance tuning involves optimizing database queries and configurations for improved efficiency and speed.
Analyze execution plans to identify slow queries. For example, use EXPLAIN PLAN to see how Oracle executes a query.
Use indexing strategically. For instance, create indexes on columns frequently used in WHERE clauses to speed up data retrieval.
Optimize SQL queries by avoiding SELECT *, using WHERE clauses effecti...
Regular expressions (regex) are sequences of characters that define search patterns for strings, used for pattern matching and manipulation.
Regex is used for validating input formats, e.g., email addresses: ^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$
It can extract specific patterns from text, such as phone numbers: \d{3}-\d{3}-\d{4}
Regex supports various metacharacters like '.', '*', and '+', which have special me...
What people are saying about Infosys
Some of the top questions asked at the Infosys interview for experienced candidates -
The duration of Infosys interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 1.4k interview experiences
Difficulty level
Duration
based on 43k reviews
Rating in categories
Technology Analyst
54.7k
salaries
| ₹3 L/yr - ₹11.5 L/yr |
Senior Systems Engineer
53.7k
salaries
| ₹2.5 L/yr - ₹9 L/yr |
Technical Lead
35k
salaries
| ₹7.3 L/yr - ₹20 L/yr |
System Engineer
32.5k
salaries
| ₹2.4 L/yr - ₹5.3 L/yr |
Senior Associate Consultant
31k
salaries
| ₹6.3 L/yr - ₹16.9 L/yr |
TCS
Wipro
Cognizant
Accenture