Ingram Micro
10+ Raqeeb Technologies Interview Questions and Answers
Q1. Transient vs Scoped lifetime service - if one is transient and other is Scoped will this work?
Yes, a combination of transient and scoped lifetime services can work together.
Transient services are created each time they are requested, while scoped services are created once per request within the scope.
They can work together as long as the transient service does not depend on the scoped service for its functionality.
For example, a logging service can be transient while a database context service can be scoped.
Q2. What is the role of firewall and how it can be used efficiently to improve the security
Firewall is a network security system that monitors and controls incoming and outgoing network traffic.
Firewall acts as a barrier between a trusted internal network and untrusted external network
It can be used to block unauthorized access to a network
It can also be used to block outgoing traffic to prevent data leakage
Firewalls can be hardware or software-based
Examples of firewalls include Cisco ASA, Fortinet FortiGate, and pfSense
Q3. Do you have any experience in Penetration testing?
Yes, I have experience in Penetration testing.
I have conducted penetration testing for various clients in different industries.
I am familiar with various tools and techniques used in penetration testing such as Metasploit, Nmap, and Burp Suite.
I have experience in both manual and automated penetration testing.
I have provided detailed reports on vulnerabilities found and recommendations for remediation.
I stay up-to-date with the latest trends and developments in the field of p...read more
Q4. Usage of dependency injection in core along with types
Dependency injection in core with types is a common practice in software engineering.
Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.
Using dependency injection in core allows for easier testing and maintenance of the codebase.
Types in dependency injection help ensure that the correct dependencies are injected into components.
Examples include using frameworks like Spring for dependency injection in Jav...read more
Q5. How you can implement network segmentation?
Network segmentation can be implemented by creating separate subnetworks and controlling access between them.
Identify the different types of data and systems that need to be protected
Create separate subnetworks for each type of data/system
Use firewalls and access controls to control traffic between subnetworks
Regularly review and update the segmentation strategy
Example: separating guest Wi-Fi network from corporate network
Q6. Dedendency Injection - How it's works.
Dependency Injection is a design pattern where the dependencies of an object are provided externally rather than created within the object itself.
Dependencies are injected into a class through constructor injection, setter injection, or interface injection.
This helps in achieving loose coupling between classes and makes the code more testable and maintainable.
Example: Instead of creating an instance of a database connection within a class, the connection is passed to the clas...read more
Q7. Usage of Middleware along with custom middleware
Middleware is used to handle requests and responses in web applications. Custom middleware can be created to add specific functionality.
Middleware is software that acts as a bridge between an operating system or database and applications, allowing them to communicate with each other.
Middleware can be used to handle tasks such as authentication, logging, error handling, and more.
Custom middleware can be created to add specific functionality that is not provided by existing mid...read more
Q8. authentication and authorization in web api core
Authentication and authorization are essential for securing web APIs in ASP.NET Core.
Use authentication to verify the identity of the user accessing the API.
Use authorization to determine what actions the authenticated user is allowed to perform.
In ASP.NET Core, authentication can be implemented using various schemes like JWT, OAuth, or Identity.
Authorization can be achieved through policies, roles, or claims.
Always validate user input and sanitize data to prevent security vu...read more
Q9. What are different kind of views that can be created
Different kinds of views that can be created include materialized views, virtual views, and dynamic views.
Materialized views store the result set of a query physically and are updated periodically.
Virtual views are based on SQL queries and do not store data physically.
Dynamic views are created on the fly based on user input or system conditions.
Other types of views include read-only views, updatable views, and recursive views.
Q10. HOW DO YOU MANAGE CURRENCY CONVERSION SCENARIOS
I manage currency conversion scenarios by utilizing exchange rates, automated tools, and monitoring market trends.
Utilize exchange rates provided by financial institutions or APIs
Use automated tools or software for accurate and efficient conversions
Monitor market trends and adjust conversion strategies accordingly
Q11. How do you manage a currency conversion problem
I manage currency conversion problems by closely monitoring exchange rates, using hedging strategies, and collaborating with financial experts.
Monitor exchange rates regularly to identify trends and potential risks
Utilize hedging strategies such as forward contracts or options to mitigate currency fluctuations
Collaborate with financial experts or consultants to develop effective currency risk management strategies
Diversify currency exposure to reduce reliance on a single curr...read more
Q12. What is a data warehouse
A data warehouse is a centralized repository that stores structured and unstructured data from various sources for analysis and reporting.
Data warehouses are designed for query and analysis rather than transaction processing.
They typically store historical data and are used for creating reports, dashboards, and data visualizations.
Data warehouses often use ETL (extract, transform, load) processes to integrate data from different sources.
Examples of data warehouse technologies...read more
Q13. Experience into channel sales
I have over 5 years of experience in channel sales, including managing relationships with distributors and partners.
Developed and executed channel sales strategies to drive revenue growth
Built and maintained strong relationships with key channel partners
Managed sales pipeline and forecast accuracy for channel sales
Collaborated with marketing team to create channel-specific marketing campaigns
Negotiated contracts and pricing with channel partners
More about working at Ingram Micro
Top HR Questions asked in Raqeeb Technologies
Interview Process at Raqeeb Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month