i
Infosys
Filter interviews by
Clear (1)
I was interviewed in Oct 2024.
To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.
Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.
Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.
Ensure that the IPsec tunnel is properly configured and tested for secure d...
To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.
Check the IPsec configuration on both ends to ensure they match
Verify that the tunnel endpoints can reach each other
Monitor logs on both devices for any error messages related to the tunnel
Use packet capture tools like Wireshark to analyze traffic going through the tunnel
SSL VPN allows remote users to securely access the network from any location.
SSL VPN uses encryption to secure the connection between the remote user and the network.
It authenticates users before granting access to resources.
SSL VPN can be set up using a web browser or a client application.
It provides a secure way for remote employees to access company resources.
SSL VPN can be configured to restrict access based on use
Configuring IPsec tunnel for 3 different locations and explaining traffic flow
Configure IPsec tunnel on routers/firewalls at each location
Set up IPsec policies for encryption and authentication
Define IPsec tunnel endpoints and establish secure communication
Ensure proper routing between locations for traffic flow
Monitor and troubleshoot the IPsec tunnel for any issues
To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.
Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.
Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...
To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.
Check the IPsec configurations on both ends to ensure they match
Verify network connectivity between the two locations
Check firewall and security policies to ensure they are not blocking the IPsec traffic
Review logs on both ends for any error messages or indications of the issue
Restart the IPsec serv
Rate your
company
🤫 100% anonymous
How was your last interview experience?
I was interviewed in Feb 2025.
Basic c text book question
Structure refers to the arrangement of parts in an object or system.
Structure defines how components are organized and interact with each other
It provides a framework for the object or system to function properly
Examples include the skeletal structure of a building, the organizational structure of a company, or the molecular structure of a compound
A union is a data structure that allows storing different data types in the same memory location.
Unions in C/C++ are similar to structures but all members share the same memory location.
Only one member of a union can be accessed at a time.
Unions are useful when you need to store different types of data in the same memory space.
Composite model in Power BI allows combining DirectQuery and Import data sources in a single report.
Composite model enables users to create relationships between tables from different data sources.
DirectQuery tables are connected to the data source in real-time, while Import tables are loaded into memory.
Users can create measures and calculations across both DirectQuery and Import tables in the same report.
Composite mo...
Infosys interview questions for designations
I applied via Naukri.com and was interviewed before Nov 2023. There were 2 interview rounds.
Easy questions for first round realated to aptitude, reasoning, english grammar
Java is a high-level programming language known for its portability, security, and versatility.
Java is an object-oriented language, meaning it focuses on objects and classes.
It is platform-independent, allowing programs to run on any device with a Java Virtual Machine (JVM).
Java is used for developing a wide range of applications, from web and mobile apps to enterprise systems.
It is known for its strong security featur...
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to retrieve, insert, update, and delete data
Common SQL commands include SELECT, INSERT, UPDATE, DELETE
Example: SELECT * FROM Customers WHERE Country='USA';
Get interview-ready with Top Infosys Interview Questions
I applied via LinkedIn and was interviewed in Aug 2022. There were 2 interview rounds.
I was interviewed before Sep 2023.
Abstract Factory is a creational design pattern that provides an interface for creating families of related objects.
Abstract Factory is used when we need to create families of related objects without specifying their concrete classes.
It provides an interface for creating objects of related classes without specifying their concrete classes.
It encapsulates a group of factories that have a common theme.
It promotes loose c...
Range based map iteration can be done using a for-each loop or iterators.
Use a for-each loop to iterate over the map elements.
Alternatively, use iterators to traverse the map.
The range-based for loop is preferred for its simplicity and readability.
Example: for(auto const& [key, value] : myMap) { //do something with key and value }
Detached threads are independent threads that run separately from the main thread. Joined threads are threads that wait for the main thread to finish.
Detached threads are created using pthread_detach() function
Joined threads are created using pthread_join() function
Detached threads do not need to be explicitly terminated
Joined threads must be explicitly terminated using pthread_exit() or return statement
Detached thread...
Static code analysis tools are software programs that analyze source code to find potential issues and improve code quality.
Static code analysis tools scan code without executing it
They can detect issues such as security vulnerabilities, coding errors, and performance problems
Examples of static code analysis tools include SonarQube, ESLint, and Checkstyle
Command to list currently running threads in linux
Use the 'ps' command with the 'H' option to display threads in a hierarchy
Use the 'top' command to display threads in real-time
Use the 'htop' command for an interactive display of threads
No, arithmetic operations cannot be performed on unique pointers.
Unique pointers are used to manage the lifetime of dynamically allocated objects.
They cannot be copied or assigned, only moved.
Arithmetic operations are not defined for pointers, including unique pointers.
Designing Facebook is a complex task involving various components and technologies.
Identify the core features of Facebook such as user profiles, news feed, messaging, and groups.
Choose appropriate technologies for each component such as PHP for backend, React for frontend, and MySQL for database.
Ensure scalability and performance by implementing caching, load balancing, and database sharding.
Implement security measures...
What people are saying about Infosys
Some of the top questions asked at the Infosys Senior Engineer interview -
based on 8 interviews
2 Interview rounds
Anonymously discuss salaries, work culture, and many more
Get Ambitionbox App
based on 52 reviews
Rating in categories
Technology Analyst
55.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Systems Engineer
50.6k
salaries
| ₹0 L/yr - ₹0 L/yr |
System Engineer
39.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
30.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Associate Consultant
27.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Cognizant
Accenture