Infosys
10+ Siddhartha Engineering Limited Interview Questions and Answers
Q1. How will you do Project Analysis with the help of excel data?
I will use Excel data for project analysis by organizing and analyzing project data, creating charts and graphs for visualization, and identifying trends and patterns.
Organize project data in Excel sheets for easy access and analysis
Use Excel functions and formulas to calculate project metrics and KPIs
Create charts and graphs to visualize project progress and performance
Identify trends and patterns in project data to make informed decisions
Use pivot tables to summarize and an...read more
Q2. What is the action you do when client asks you to create a policy with malicious ip
I would refuse to create a policy with malicious IP addresses as it goes against ethical and legal standards.
Explain to the client the ethical and legal implications of creating a policy with malicious IP addresses
Offer alternative solutions that align with security best practices
Report the request to the appropriate authorities if necessary
Q3. Fork join Uses and How it is different from concatMap
ForkJoin is used for parallel processing while concatMap is used for sequential processing.
ForkJoin is used to split a task into smaller sub-tasks that can be executed in parallel.
concatMap is used to sequentially process a stream of data.
ForkJoin can improve performance by utilizing multiple threads to execute tasks in parallel.
concatMap is useful when the order of data processing is important.
ForkJoin is commonly used in reactive programming frameworks like RxJava.
concatMap...read more
Q4. How to check for memory leaks Role of devops in team
To check for memory leaks, monitor memory usage, use memory profiling tools, analyze code for potential leaks, and perform regular testing.
Monitor memory usage over time to identify any abnormal increases
Use memory profiling tools like Valgrind, Purify, or LeakSanitizer to detect leaks
Analyze code for potential memory leaks such as not freeing allocated memory
Perform regular testing to catch memory leaks early in the development process
Q5. Difference between git merge and rebase Solid principles
Git merge combines changes from different branches, while rebase moves the entire branch to a new base commit.
Git merge creates a new commit with combined changes from different branches.
Git rebase moves the entire branch to a new base commit, rewriting commit history.
Rebase results in a linear commit history, while merge retains the branching history.
Rebase is useful for keeping a clean and linear commit history, while merge is better for preserving the context of changes.
Ex...read more
Q6. What is oops and explain concepts
Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data in the form of fields (attributes or properties) and code in the form of procedures (methods).
OOP focuses on creating objects that interact with each other to solve a problem.
Key concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Inheritance allow...read more
Q7. Describe the upgrade process of a firewall
The upgrade process of a firewall involves planning, testing, implementing, and monitoring changes to ensure network security.
Plan the upgrade by identifying the current firewall version and researching the latest version available
Backup firewall configurations and settings before starting the upgrade process
Test the upgrade in a lab environment to ensure compatibility and identify any potential issues
Schedule a maintenance window for the upgrade to minimize impact on network...read more
Q8. How Project life cycle works?
Project life cycle involves phases from initiation to closure, ensuring successful completion of a project.
Initiation phase involves defining project scope and objectives.
Planning phase includes creating a project plan, schedule, and budget.
Execution phase involves implementing the project plan.
Monitoring and controlling phase ensures project stays on track.
Closure phase involves delivering the final product and evaluating project success.
Q9. What is inbound policy
Inbound policy refers to rules and guidelines set by an organization for receiving incoming communications or data.
Inbound policy outlines procedures for handling emails, phone calls, and other forms of communication from external sources.
It may include guidelines for filtering and prioritizing incoming messages based on urgency or importance.
Inbound policies can also address security measures for screening and verifying the authenticity of incoming data.
Examples of inbound p...read more
Q10. What is mvc and controller
MVC stands for Model-View-Controller. Controller is a component that handles user input and updates the model and view accordingly.
MVC is a software design pattern commonly used in web development
Controller is responsible for handling user input and updating the model and view
Controller acts as an intermediary between the model and the view
Examples: ASP.NET MVC, Spring MVC, Ruby on Rails
Q11. Explain java exception hirerachy
Java exception hierarchy includes Throwable, Error, and Exception classes.
Java exception hierarchy starts with Throwable class.
Throwable class has two subclasses: Error and Exception.
Error class represents serious problems that a reasonable application should not try to catch.
Exception class represents exceptional conditions that a reasonable application might want to catch.
Q12. Template Forms vs Reactive Forms
Template forms are static while reactive forms are dynamic.
Template forms are easier to create and maintain.
Reactive forms allow for more complex validation and dynamic behavior.
Template forms are suitable for simple forms with few fields.
Reactive forms are suitable for complex forms with many fields and dependencies.
Reactive forms use observable streams to manage form data.
Template forms use two-way data binding to manage form data.
Q13. What is AD connect
AD Connect is a tool used to synchronize on-premises Active Directory with Azure Active Directory.
Allows for single sign-on for users across on-premises and cloud environments
Enables password hash synchronization for seamless user authentication
Supports hybrid identity management for organizations using both on-premises and cloud resources
Q14. Hybrid model full explain
Hybrid model is a combination of two or more different models or approaches.
Combines the strengths of different models or approaches
Can be used in various fields like IT, business, education, etc.
Example: Hybrid cloud model combines public and private cloud services
Interview Process at Siddhartha Engineering Limited
Reviews
Interviews
Salaries
Users/Month