i
Infosys
Filter interviews by
I have over 8 years of experience working as a Senior Test Lead in various companies.
Led a team of testers in creating test plans and executing test cases
Managed testing activities for multiple projects simultaneously
Collaborated with developers and stakeholders to ensure high quality software delivery
Implemented automation testing to improve efficiency and accuracy
Provided mentorship and training to junior testers
What people are saying about Infosys
I applied via Approached by Company and was interviewed in Jun 2017. There were 5 interview rounds.
I appeared for an interview before Jul 2016.
IAM major components are authentication, authorization, and identity management.
Authentication: verifying the identity of a user or system
Authorization: granting access to resources based on user roles and permissions
Identity management: managing user identities and their access to resources
Examples: Single Sign-On (SSO), Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC)
I applied via Campus Placement and was interviewed before May 2020. There were 2 interview rounds.
OLAP in IDT and UDT and generating reports without universe
OLAP can be used in both IDT and UDT for data analysis
Reports can be generated without a universe using OLAP
OLAP allows for multidimensional analysis of data
HANA, ERP, and BW are all data sources that can be used to create reports in BI.
HANA can be used as a data source for BI reports, allowing for real-time reporting and analysis.
ERP data can also be used to create BI reports, providing insights into business operations and performance.
BW is a data warehousing solution that can be used to store and manage data for BI reporting.
All three data sources can be integrated with...
Report customisation can be done by using tools like Crystal Reports or SSRS to modify the layout and data displayed.
Identify the report to be customised
Determine the changes to be made
Use a report customisation tool like Crystal Reports or SSRS
Modify the layout and data displayed
Test the customised report to ensure accuracy
Report managing under CMC involves creating, scheduling, and distributing reports.
Create reports using CMC's report creation tools
Schedule reports to run at specific times or intervals
Distribute reports to specific users or groups
Monitor report usage and performance
Customize report templates and layouts
Examples: Sales reports, financial reports, inventory reports
BI reports have filters at both report level and query level.
Report level filters allow users to filter data within the report itself.
Query level filters are applied to the underlying data source before the report is generated.
Common filters include date filters, dimension filters, and measure filters.
Report level filters can be applied to specific visualizations or the entire report.
Query level filters can be used to ...
There are multiple ways to resolve loops during universe building.
One way is to use aggregate awareness to avoid loops.
Another way is to use aliases to create a self-join.
A third way is to use contexts to define the scope of the query.
It is also important to ensure that the join paths are correct and optimized.
Testing and debugging can help identify and resolve any remaining loops.
Yes, I am satisfied with my current salary.
I am content with my current salary as it meets my financial needs
I feel valued for my work and contributions at my current salary level
I have compared my salary with industry standards and feel it is fair
The speed of the person sitting under the train is zero.
The person sitting under the train is stationary.
The speed of the train does not affect the speed of the person.
The person's speed is relative to the ground, not the train.
Water does not fall from a filled glass because of surface tension and gravity.
Surface tension of water creates a force that holds it together and prevents it from overflowing.
Gravity pulls the water downwards, keeping it inside the glass.
The shape of the glass also plays a role in containing the water.
If the glass is filled beyond its capacity, the surface tension may break and water will overflow.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
I applied via Approached by Company and was interviewed in Nov 2017. There were 3 interview rounds.
We can achieve this by sending the data in chunks using pagination.
Implement pagination to limit the amount of data sent per request.
Use a cursor-based pagination approach to efficiently retrieve large amounts of data.
Consider compressing the data to reduce the size of each chunk.
Use HTTP range requests to retrieve specific chunks of data.
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechani...
Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.
Shared variables are used to share data between tasks in a process.
Job shared variables are used to share data between tasks in a specific job.
Shared variables can cause race conditions and should be used with caution.
Job shared variables are useful for passing data between tasks in a job
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
I applied via Naukri.com and was interviewed before Feb 2021. There were 3 interview rounds.
Subject
based on 1 interview
Interview experience
Technology Analyst
55.3k
salaries
| ₹3 L/yr - ₹11.1 L/yr |
Senior Systems Engineer
50.9k
salaries
| ₹2.5 L/yr - ₹7.9 L/yr |
System Engineer
31.5k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.9k
salaries
| ₹5.1 L/yr - ₹19.7 L/yr |
Senior Associate Consultant
28.4k
salaries
| ₹6.2 L/yr - ₹15 L/yr |
TCS
Wipro
Cognizant
Accenture