i
Kyndryl
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
What people are saying about Kyndryl
I applied via Approached by Company and was interviewed before May 2021. There were 3 interview rounds.
Short basic algorithms test
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
posted on 15 May 2021
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
I appeared for an interview before Mar 2024, where I was asked the following questions.
Code test which i hd not attended
I appeared for an interview in Mar 2022.
Scenario based question and pseudo code for technical problem
posted on 25 Jul 2022
I applied via Instahyre and was interviewed in Jun 2022. There were 2 interview rounds.
Technical interview questions on Unix and SQL
To find files in a directory, use the 'find' command
To count words using grep, use the '-c' option
To kill a particular process, use the 'kill' command with the process ID
To find the kernel version and operating system, use the 'uname' command
The 'top' command is used to monitor system processes and resource usage
A zombie process is a process that has completed execution but ...
Questions related to project flow, Linux OS, application and web server, troubleshooting, ticketing tool, and handling critical situations.
Worked on Agile methodology with JIRA as ticketing tool
Used Ubuntu as the Linux operating system
Tomcat was the application server and Apache was the web server
Logged in to the application using LDAP authentication
Performed troubleshooting by analyzing logs and using debugging tools
H...
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
Yes
LiveData is lifecycle aware and can be used to observe changes in data.
ViewModel provides a way to store and manage UI-related data across configuration changes.
ViewModel can hold LiveData objects to provide data to the UI.
LiveData and ViewModel work together to ensure data consistency and prevent memory leaks.
The ViewModel survives configuration changes by being retained by the system.
ViewModels are designed to survive configuration changes like screen rotations or language changes.
When an activity is destroyed and recreated, the ViewModel is not destroyed and retains its data.
The ViewModel is associated with the activity's lifecycle and is retained until the activity is finished.
The retained ViewModel instance can be acces...
MVP offers better separation of concerns and easier unit testing compared to MVC.
MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.
MVP allows for easier unit testing as the presenter can be tested independently from the view.
MVP provides better decoupling between components, enabling easier code reuse and scalability.
MVP promotes a clear separation of con...
SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.
SSL pinning involves hardcoding the server's public key in the client's code or configuration.
During the SSL handshake, the client checks if the server's public key matches the pinned key.
If the keys match, the connection is established; otherwise, it is rejected.
Pinning prevents man-in-the-middle at
Data security can be achieved through encryption, access controls, backups, and regular security audits.
Encrypt sensitive data using strong encryption algorithms.
Implement access controls to restrict unauthorized access to the data.
Regularly backup the data to prevent data loss.
Conduct regular security audits to identify and fix vulnerabilities.
Use secure protocols and communication channels for data transfer.
Implement...
Encryption keys should be securely stored in a separate key management system.
Encryption keys should not be stored alongside the encrypted data.
Use a dedicated key management system (KMS) to store and manage encryption keys.
Implement strong access controls and authentication mechanisms for the KMS.
Consider using hardware security modules (HSMs) for added security.
Regularly rotate encryption keys to minimize the impact
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Use java 8 to find the first repeated character in a given string
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
System Administrator
1.3k
salaries
| ₹2.9 L/yr - ₹12 L/yr |
Associate Technical Engineer
654
salaries
| ₹4 L/yr - ₹6.6 L/yr |
Project Manager
620
salaries
| ₹7.1 L/yr - ₹28.5 L/yr |
Infrastructure Specialist
603
salaries
| ₹4.2 L/yr - ₹23 L/yr |
SME
419
salaries
| ₹7.5 L/yr - ₹25.5 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions