CoverPhoto
Infosys logo
Premium Employer

Infosys

Verified
3.6
based on 39.5k Reviews
Filter interviews by
Senior Engineer
Skills
Clear (1)

10+ Infosys Senior Engineer Interview Questions and Answers

Updated 1 Mar 2025

Q1. How to configure the IP sec tunnel for 3 different location and explain the traffic traffic flow and how it will be work?

Ans.

Configuring IPsec tunnel for 3 different locations and explaining traffic flow

  • Configure IPsec tunnel on routers/firewalls at each location

  • Set up IPsec policies for encryption and authentication

  • Define IPsec tunnel endpoints and establish secure communication

  • Ensure proper routing between locations for traffic flow

  • Monitor and troubleshoot the IPsec tunnel for any issues

Add your answer
right arrow

Q2. How ssl vpn it will be working for the remote location?

Ans.

SSL VPN allows remote users to securely access the network from any location.

  • SSL VPN uses encryption to secure the connection between the remote user and the network.

  • It authenticates users before granting access to resources.

  • SSL VPN can be set up using a web browser or a client application.

  • It provides a secure way for remote employees to access company resources.

  • SSL VPN can be configured to restrict access based on user roles or permissions.

Add your answer
right arrow

Q3. The both locations IP sec tunnel are down. How to troubleshoot the issue.

Ans.

To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.

  • Check the IPsec configurations on both ends to ensure they match

  • Verify network connectivity between the two locations

  • Check firewall and security policies to ensure they are not blocking the IPsec traffic

  • Review logs on both ends for any error messages or indications of the issue

  • Restart the IPsec services or devices if necessary

Add your answer
right arrow

Q4. How to upgrade to the palaalto firewall and fortigate?

Ans.

To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.

  • Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.

  • Backup configurations of the existing firewalls to ensure data safety in case of any issues during the upgrade process.

  • Test the upgrade in a lab environm...read more

Add your answer
right arrow
Discover Infosys interview dos and don'ts from real experiences

Q5. Can we perform arithmetic operation on Unique pointer

Ans.

No, arithmetic operations cannot be performed on unique pointers.

  • Unique pointers are used to manage the lifetime of dynamically allocated objects.

  • They cannot be copied or assigned, only moved.

  • Arithmetic operations are not defined for pointers, including unique pointers.

Add your answer
right arrow

Q6. How to create the IP sec tunnel?

Ans.

To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.

  • Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.

  • Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.

  • Ensure that the IPsec tunnel is properly configured and tested for secure data transmission.

  • Monitor the IPsec tunnel for any potentia...read more

Add your answer
right arrow
Are these interview questions helpful?

Q7. How to troubleshoot the IP sec tunnel?

Ans.

To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.

  • Check the IPsec configuration on both ends to ensure they match

  • Verify that the tunnel endpoints can reach each other

  • Monitor logs on both devices for any error messages related to the tunnel

  • Use packet capture tools like Wireshark to analyze traffic going through the tunnel

Add your answer
right arrow

Q8. Explain abstract factory design pattern ?

Ans.

Abstract Factory is a creational design pattern that provides an interface for creating families of related objects.

  • Abstract Factory is used when we need to create families of related objects without specifying their concrete classes.

  • It provides an interface for creating objects of related classes without specifying their concrete classes.

  • It encapsulates a group of factories that have a common theme.

  • It promotes loose coupling by hiding the concrete classes from the client.

  • Exa...read more

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. What are static code analysis tools

Ans.

Static code analysis tools are software programs that analyze source code to find potential issues and improve code quality.

  • Static code analysis tools scan code without executing it

  • They can detect issues such as security vulnerabilities, coding errors, and performance problems

  • Examples of static code analysis tools include SonarQube, ESLint, and Checkstyle

Add your answer
right arrow

Q10. What are detached and joined threads

Ans.

Detached threads are independent threads that run separately from the main thread. Joined threads are threads that wait for the main thread to finish.

  • Detached threads are created using pthread_detach() function

  • Joined threads are created using pthread_join() function

  • Detached threads do not need to be explicitly terminated

  • Joined threads must be explicitly terminated using pthread_exit() or return statement

  • Detached threads are useful for tasks that do not need to communicate wit...read more

Add your answer
right arrow

Q11. Command to list currently running threads in linux

Ans.

Command to list currently running threads in linux

  • Use the 'ps' command with the 'H' option to display threads in a hierarchy

  • Use the 'top' command to display threads in real-time

  • Use the 'htop' command for an interactive display of threads

Add your answer
right arrow

Q12. How do you do range based map iteration

Ans.

Range based map iteration can be done using a for-each loop or iterators.

  • Use a for-each loop to iterate over the map elements.

  • Alternatively, use iterators to traverse the map.

  • The range-based for loop is preferred for its simplicity and readability.

  • Example: for(auto const& [key, value] : myMap) { //do something with key and value }

Add your answer
right arrow

Q13. What was compiste model in powe bi

Ans.

Composite model in Power BI allows combining DirectQuery and Import data sources in a single report.

  • Composite model enables users to create relationships between tables from different data sources.

  • DirectQuery tables are connected to the data source in real-time, while Import tables are loaded into memory.

  • Users can create measures and calculations across both DirectQuery and Import tables in the same report.

  • Composite model provides flexibility and performance optimization for ...read more

Add your answer
right arrow

Q14. What is name mangling?

Ans.

Name mangling is a technique used by compilers to give unique names to functions and variables to avoid naming conflicts.

  • Name mangling is used in C++ to support function overloading.

  • It is also used in Python to avoid naming conflicts in modules.

  • Name mangling can make it difficult to access variables and functions from outside the class in which they are defined.

  • In C++, name mangling can be seen by using the 'nm' command on the compiled object file.

Add your answer
right arrow

Q15. What is java and explain

Ans.

Java is a high-level programming language known for its portability, security, and versatility.

  • Java is an object-oriented language, meaning it focuses on objects and classes.

  • It is platform-independent, allowing programs to run on any device with a Java Virtual Machine (JVM).

  • Java is used for developing a wide range of applications, from web and mobile apps to enterprise systems.

  • It is known for its strong security features, making it a popular choice for sensitive applications....read more

Add your answer
right arrow

Q16. What's is sql and explain

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language

  • It is used to communicate with databases to retrieve, insert, update, and delete data

  • Common SQL commands include SELECT, INSERT, UPDATE, DELETE

  • Example: SELECT * FROM Customers WHERE Country='USA';

Add your answer
right arrow

Q17. What is structure

Ans.

Structure refers to the arrangement of parts in an object or system.

  • Structure defines how components are organized and interact with each other

  • It provides a framework for the object or system to function properly

  • Examples include the skeletal structure of a building, the organizational structure of a company, or the molecular structure of a compound

Add your answer
right arrow

Q18. What is union

Ans.

A union is a data structure that allows storing different data types in the same memory location.

  • Unions in C/C++ are similar to structures but all members share the same memory location.

  • Only one member of a union can be accessed at a time.

  • Unions are useful when you need to store different types of data in the same memory space.

Add your answer
right arrow

Q19. Design facebook

Ans.

Designing Facebook is a complex task involving various components and technologies.

  • Identify the core features of Facebook such as user profiles, news feed, messaging, and groups.

  • Choose appropriate technologies for each component such as PHP for backend, React for frontend, and MySQL for database.

  • Ensure scalability and performance by implementing caching, load balancing, and database sharding.

  • Implement security measures such as encryption, two-factor authentication, and access...read more

Add your answer
right arrow
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Infosys Senior Engineer

based on 8 interviews
2 Interview rounds
Personal Interview1 Round
Technical Round
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Engineer Interview Questions from Similar Companies

Tata Elxsi Logo
3.8
 • 27 Interview Questions
Qualcomm Logo
3.8
 • 22 Interview Questions
Senvion Logo
4.0
 • 12 Interview Questions
Adani Infra Logo
3.9
 • 12 Interview Questions
View all
Recently Viewed
INTERVIEWS
Infosys
10 top interview questions
SALARIES
Cognizant
COMPANY BENEFITS
Infosys
No Benefits
INTERVIEWS
UST
Fresher
10 top interview questions
DESIGNATION
SALARIES
Capgemini
SALARIES
Infosys
COMPANY BENEFITS
Genpact
No Benefits
SALARIES
Accenture
SALARIES
Accenture
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter