i
Kyndryl
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed in Apr 2024. There was 1 interview round.
Abstraction is the concept of hiding complex implementation details and showing only the necessary features to the outside world.
Abstraction allows us to focus on what an object does rather than how it does it
Achieved through abstract classes and interfaces in object-oriented programming
Example: A car dashboard abstracts the internal workings of the car and provides only essential information to the driver
Hashtable is synchronized, while hashmap is not. Hashtable does not allow null keys or values, while hashmap does.
Hashtable is synchronized, while hashmap is not
Hashtable does not allow null keys or values, while hashmap does
Hashtable is a legacy class, while hashmap is a newer class
The get() method in HashMap retrieves the value associated with a specified key.
get() method takes a key as input and returns the value associated with that key in the HashMap.
Internally, get() uses the hash code of the key to find the corresponding bucket in the HashMap.
If multiple keys have the same hash code, get() uses the equals() method to find the correct key-value pair.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization helps in minimizing data redundancy by dividing the database into multiple tables and defining relationships between them.
It ensures data integrity by avoiding update anomalies and inconsistencies.
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, and 4NF, each with specific rules to fo...
Constraints are limitations or restrictions placed on a system or process.
Constraints define the boundaries within which a system must operate.
They can include limitations on resources, time, or functionality.
Examples of constraints in software engineering include memory limitations, processing speed, and input/output requirements.
Query to retrieve the 3rd highest salary from the employee table
Use the ORDER BY clause to sort salaries in descending order
Use the LIMIT clause to retrieve the 3rd highest salary
Traverse the linked list to find the 2nd last node and return its value.
Traverse the linked list while keeping track of the current and previous nodes.
Once at the end of the list, return the value of the previous node.
Use two variables to keep track of the smallest and second smallest numbers in the array.
Iterate through the array and update the variables accordingly.
Initialize the variables with the maximum possible integer value to start with.
Example: array = [5, 2, 8, 1, 3], smallest = 1, secondSmallest = 2.
I was interviewed in Feb 2025.
I was interviewed in Jan 2025.
The current version of Microsoft Windows Server is Windows Server 2019. Hyper-V is a virtualization platform. Active Directory is a directory service. DNS is a system that translates domain names to IP addresses. DHCP is a network protocol that assigns IP addresses to devices. WSUS is Windows Server Update Services. The current version of client Windows operating system is Windows 10.
Windows Server 2019 is the latest v...
VMware vSphere is a virtualization platform that provides virtualization, management, resource optimization, and more.
DRS (Distributed Resource Scheduler) in VMware is a feature that automatically balances computing workloads across a cluster of ESXi hosts.
High availability in VMware ensures that virtual machines are restarted on another host in case of a host failure.
Fault Tolerance in VMware provides continuous avail...
Microsoft Azure Cloud is a cloud computing service provided by Microsoft, offering a variety of services and resources for building, deploying, and managing applications.
Provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) offerings
Offers services such as virtual machines, databases, AI and machine learning tools, and more
Allows for scalability, flexibility, and co...
FSMO stands for Flexible Single Master Operations. They are specialized roles in Active Directory that handle specific tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Each FSMO role is responsible for a specific aspect of the Active Directory environment.
For example, the PDC Emulator role handles password changes and time synchronization within a do
Kyndryl interview questions for popular designations
Service Delivery involves providing services to customers in a timely and efficient manner.
Service Delivery focuses on meeting customer needs and expectations
It involves ensuring services are delivered on time and within budget
Service Delivery often includes managing relationships with customers and stakeholders
Examples of Service Delivery include IT support, logistics, and customer service
Incident is an unplanned event that disrupts or degrades a service, while Problem is the underlying cause of one or more incidents.
Incident is a specific event that causes an interruption or reduction in the quality of a service.
Problem is the root cause of one or more incidents and is identified through the analysis of incidents.
Incidents are typically resolved quickly to restore service, while problems require invest...
I prioritize tasks, stay organized, communicate effectively, and remain calm to manage work under pressure.
Prioritize tasks based on urgency and importance
Stay organized by creating to-do lists and setting deadlines
Communicate effectively with team members and stakeholders to manage expectations
Remain calm by taking deep breaths and focusing on solutions rather than problems
Get interview-ready with Top Kyndryl Interview Questions
DNS is a domain name system that translates domain names to IP addresses.
DNS stands for Domain Name System
It translates human-readable domain names (like www.example.com) to IP addresses (like 192.168.1.1)
DNS helps in locating websites and other resources on the internet
DNS operates through a distributed database system that stores domain names and their corresponding IP addresses
DHCP is a protocol used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It helps in efficient management of IP addresses in a network
DHCP servers lease IP addresses to devices for a specific period of time
Example: When a new device connects to a network, DHCP assigns it an available IP address
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.
Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...
I have extensive experience in network security and have successfully implemented various security measures in my previous roles.
I have a strong background in network security protocols and technologies
I have experience in implementing firewalls, intrusion detection systems, and VPNs
I have successfully managed security incidents and conducted security audits
I have a track record of staying up-to-date with the latest se
I applied via Approached by Company
Multiple questions are given to evaluate how you collaborate with others to reach a decision.
My area of interest is artificial intelligence and machine learning. I am well-informed about various technologies and stay updated through continuous learning.
I have a strong interest in artificial intelligence and machine learning, and have completed several projects in this field.
I regularly attend workshops, seminars, and online courses to stay updated on the latest technologies and trends.
I actively participate in...
My area of focus is strategic planning and implementation. I propose to use data-driven decision-making and cross-functional collaboration to drive change.
Utilize data analytics to identify key trends and opportunities for improvement
Implement agile methodologies to quickly adapt to changing market conditions
Foster a culture of innovation by encouraging team members to think creatively and share ideas
Collaborate with s...
TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection before sending data.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is commonly used for applications that require reliable data transmission, such as web browsing, emai...
To troubleshoot a user's system that cannot connect to the internet, I would follow these steps
Check if the internet connection is working on other devices
Restart the router and modem
Check network settings on the user's system
Run network diagnostics or troubleshoot network connection
Update network drivers or reset network settings
Top trending discussions
Some of the top questions asked at the Kyndryl interview -
The duration of Kyndryl interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 177 interviews
Interview experience
based on 2.8k reviews
Rating in categories
System Administrator
1.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Technical Engineer
635
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
622
salaries
| ₹0 L/yr - ₹0 L/yr |
Infrastructure Specialist
533
salaries
| ₹0 L/yr - ₹0 L/yr |
SME
435
salaries
| ₹0 L/yr - ₹0 L/yr |
IBM
Accenture
TCS
Wipro