i
Infosys
Filter interviews by
I applied via Approached by Company and was interviewed before Jul 2022. There were 4 interview rounds.
Project life cycle involves phases from initiation to closure, ensuring successful completion of a project.
Initiation phase involves defining project scope and objectives.
Planning phase includes creating a project plan, schedule, and budget.
Execution phase involves implementing the project plan.
Monitoring and controlling phase ensures project stays on track.
Closure phase involves delivering the final product and evalua
I will use Excel data for project analysis by organizing and analyzing project data, creating charts and graphs for visualization, and identifying trends and patterns.
Organize project data in Excel sheets for easy access and analysis
Use Excel functions and formulas to calculate project metrics and KPIs
Create charts and graphs to visualize project progress and performance
Identify trends and patterns in project data to m...
Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data in the form of fields (attributes or properties) and code in the form of procedures (methods).
OOP focuses on creating objects that interact with each other to solve a problem.
Key concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation involves bundling data and methods tha...
MVC stands for Model-View-Controller. Controller is a component that handles user input and updates the model and view accordingly.
MVC is a software design pattern commonly used in web development
Controller is responsible for handling user input and updating the model and view
Controller acts as an intermediary between the model and the view
Examples: ASP.NET MVC, Spring MVC, Ruby on Rails
Inbound policy refers to rules and guidelines set by an organization for receiving incoming communications or data.
Inbound policy outlines procedures for handling emails, phone calls, and other forms of communication from external sources.
It may include guidelines for filtering and prioritizing incoming messages based on urgency or importance.
Inbound policies can also address security measures for screening and verifyi...
AD Connect is a tool used to synchronize on-premises Active Directory with Azure Active Directory.
Allows for single sign-on for users across on-premises and cloud environments
Enables password hash synchronization for seamless user authentication
Supports hybrid identity management for organizations using both on-premises and cloud resources
Hybrid model is a combination of two or more different models or approaches.
Combines the strengths of different models or approaches
Can be used in various fields like IT, business, education, etc.
Example: Hybrid cloud model combines public and private cloud services
I was interviewed in Feb 2024.
Infosys interview questions for designations
Get interview-ready with Top Infosys Interview Questions
I would refuse to create a policy with malicious IP addresses as it goes against ethical and legal standards.
Explain to the client the ethical and legal implications of creating a policy with malicious IP addresses
Offer alternative solutions that align with security best practices
Report the request to the appropriate authorities if necessary
The upgrade process of a firewall involves planning, testing, implementing, and monitoring changes to ensure network security.
Plan the upgrade by identifying the current firewall version and researching the latest version available
Backup firewall configurations and settings before starting the upgrade process
Test the upgrade in a lab environment to ensure compatibility and identify any potential issues
Schedule a mainte...
I applied via Naukri.com and was interviewed before May 2023. There were 2 interview rounds.
Git merge combines changes from different branches, while rebase moves the entire branch to a new base commit.
Git merge creates a new commit with combined changes from different branches.
Git rebase moves the entire branch to a new base commit, rewriting commit history.
Rebase results in a linear commit history, while merge retains the branching history.
Rebase is useful for keeping a clean and linear commit history, whil...
To check for memory leaks, monitor memory usage, use memory profiling tools, analyze code for potential leaks, and perform regular testing.
Monitor memory usage over time to identify any abnormal increases
Use memory profiling tools like Valgrind, Purify, or LeakSanitizer to detect leaks
Analyze code for potential memory leaks such as not freeing allocated memory
Perform regular testing to catch memory leaks early in the d
I applied via Company Website and was interviewed before Dec 2022. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Apr 2023. There were 3 interview rounds.
Java exception hierarchy includes Throwable, Error, and Exception classes.
Java exception hierarchy starts with Throwable class.
Throwable class has two subclasses: Error and Exception.
Error class represents serious problems that a reasonable application should not try to catch.
Exception class represents exceptional conditions that a reasonable application might want to catch.
I applied via Company Website and was interviewed before Feb 2023. There were 2 interview rounds.
What people are saying about Infosys
1 Interview rounds
based on 119 reviews
Rating in categories
Technology Analyst
56.3k
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Systems Engineer
49.4k
salaries
| ₹2.8 L/yr - ₹9.2 L/yr |
System Engineer
38.9k
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Technical Lead
30.7k
salaries
| ₹5.2 L/yr - ₹19.5 L/yr |
Senior Associate Consultant
27.1k
salaries
| ₹6.2 L/yr - ₹17 L/yr |
TCS
Wipro
Cognizant
Accenture