i
Infosys
Filter interviews by
Critical Authorization objects are essential for controlling access to sensitive data and functions within SAP systems.
S_USER_AUTH - User authorization object for user maintenance
S_PROGRAM - Authorization object for executing programs
S_TABU_DIS - Table maintenance authorization object
S_TCODE - Transaction code authorization object
S_RFC - Remote function call authorization object
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
BTP stands for Business Technology Platform. It is a platform-as-a-service offering from SAP that provides tools and services for developing, integrating, and extending applications.
BTP offers services such as database and data management, analytics, machine learning, and IoT.
It allows businesses to build, run, and manage applications in the cloud.
Scope of work includes implementing security measures, configuring acces...
The question seems to be asking about the panelists' opinions on something being wasteful.
Discuss the importance of efficient resource allocation in SAP security projects
Provide examples of common wasteful practices in SAP security, such as over-provisioning of user access rights
Explain how proper planning and risk assessment can help prevent wastage of time and resources
The question is likely asking about the inefficiency or redundancy of having multiple panelists in a discussion or decision-making process.
Having too many panelists can lead to inefficiency and lack of focus in discussions.
Some panelists may not contribute meaningfully or may repeat points already made by others.
Reducing the number of panelists can lead to more productive and streamlined discussions.
It's important to h...
The question is likely asking about the efficiency of having multiple panelists in the interview process.
Panelists should be carefully selected to ensure they add value to the interview process.
Having too many panelists can lead to redundancy and confusion.
Efficient use of panelists' time and expertise is crucial for a successful interview process.
I applied via Company Website and was interviewed in Jul 2023. There were 4 interview rounds.
My name is Gopi. I am from Kothacheruvu, i am completed bachelor's degree from Sk University i am belongs to nuclear family. My strengths are self motivating person and have strong communication skills also . My short term goal is to get a job in reputed company. Where i can build my career help the organisation. My hobbies are reading books & traveling. I am a quick learner and believe n learning from my past mistakes and experience.
SAP security involves protecting the SAP system from unauthorized access and ensuring data integrity.
SAP security involves setting up user roles and authorizations to control access to sensitive data
It includes implementing security measures such as encryption, authentication, and monitoring
Regular security audits and updates are essential to maintain a secure SAP environment
Some user types include end users, power users, administrators, and developers.
End users are regular users who utilize the system for their daily tasks.
Power users have advanced permissions and capabilities within the system.
Administrators have full control over the system and its configuration.
Developers create and customize functionalities within the system.
Different user types in SAP: Dialog, System, Communication, Service, Reference
Dialog user: used by humans to log in and perform transactions
System user: used by system processes and background jobs
Communication user: used for communication between systems
Service user: used for specific services or applications
Reference user: used as a template for creating new users
T-codes are transaction codes used in SAP to access specific functions or perform specific tasks.
T-code SU01 - User Maintenance
T-code SE38 - ABAP Editor
T-code SM21 - System Log
T-code SE11 - Data Dictionary
T-code SE16 - Data Browser
Infosys interview questions for designations
As per jd questions asked
Get interview-ready with Top Infosys Interview Questions
I applied via Referral and was interviewed before Apr 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before May 2021. There were 4 interview rounds.
Online questions were based on scenarios to write SQL queries. Also got few questions on Python as well for which I had only limited knowledge.
The source row will be treated as an update, but the target object will be deleted.
The session level property 'Treat source row as Update' will be applied to the source row.
The target object will be deleted regardless of the update status of the source row.
This can result in data loss if the source row contains important information.
Dimension tables are used in data warehousing to provide descriptive information about the data in fact tables.
Slowly changing dimensions
Junk dimensions
Degenerate dimensions
Role-playing dimensions
Bridge dimensions
We used a relational schema in our previous project as it was suitable for the data structure and allowed for efficient querying.
Relational schema was used as it allowed for efficient querying of data
The data structure was suitable for a relational schema
We were able to easily join tables to retrieve necessary data
Examples include using SQL to query a database with multiple tables
Normalization was used to reduce data r
Joiner combines data from multiple sources based on a common key, while Lookup retrieves data from a reference table based on a matching key.
Joiner is used to combine data from two or more sources based on a common key column.
Lookup is used to retrieve data from a reference table based on a matching key column.
Joiner can perform inner, outer, left, and right joins, while Lookup can only perform an inner join.
Joiner can...
We used Git for version control in our previous project.
We created a Git repository for the project.
All team members were added as collaborators to the repository.
We followed the Git flow branching model.
We used pull requests for code review and merging.
We used tags to mark important releases.
We regularly pushed our changes to the remote repository.
We used Git commands like commit, push, pull, merge, and rebase.
We used...
I have worked on SCD Type 2 before.
SCD Type 2 is used to track historical changes in data.
It creates a new record for each change and maintains a history of changes.
It includes start and end dates for each record.
Example: Tracking changes in employee salary over time.
I applied via Naukri.com and was interviewed before Jul 2020. There were 3 interview rounds.
Performa is a performance monitoring tool for HPE 3PAR storage arrays.
Performa provides real-time monitoring of storage performance metrics.
It helps identify performance bottlenecks and optimize storage performance.
Performa can generate reports and alerts based on user-defined thresholds.
It can also be used for capacity planning and trend analysis.
Examples of performance metrics monitored by Performa include IOPS, late
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
based on 5 interviews
1 Interview rounds
based on 13 reviews
Rating in categories
Technology Analyst
55.4k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
51.2k
salaries
| ₹2.5 L/yr - ₹8 L/yr |
System Engineer
31.7k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
31k
salaries
| ₹5.1 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
28.8k
salaries
| ₹6.2 L/yr - ₹16.9 L/yr |
TCS
Wipro
Cognizant
Accenture