Upload Button Icon Add office photos

Filter interviews by

LanzeIntegra Technologies Interview Questions, Process, and Tips

Updated 18 Oct 2023

LanzeIntegra Technologies Interview Experiences

1 interview found

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Referral and was interviewed in Apr 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(7 Questions)

  • Q1. What is your fortay in security ?
  • Ans. 

    My forte in security lies in network security, penetration testing, and incident response.

    • Specialize in network security protocols and technologies

    • Skilled in conducting penetration tests to identify vulnerabilities

    • Experienced in responding to security incidents and mitigating risks

    • Certifications such as CISSP, CEH, or OSCP demonstrate expertise

  • Answered by AI
  • Q2. Which technologies or languages you have knowledge about
  • Ans. 

    I have knowledge in technologies such as Python, Java, C++, Linux, and network security.

    • Python

    • Java

    • C++

    • Linux

    • Network Security

  • Answered by AI
  • Q3. Where do you stay currently
  • Q4. What was your final CGPA
  • Q5. Do you have any hands-on experience besides internship
  • Ans. Yes as a freelancer but not as full time professional
  • Answered Anonymously
  • Q6. How do you come to know about us
  • Ans. Via referral from a known person
  • Answered Anonymously
  • Q7. What you do to enhance your skill set
  • Ans. Read related articles and News. Also planning to complete certification and regularly solved machines
  • Answered Anonymously
Round 3 - Technical 

(14 Questions)

  • Q1. What is pentesting methodology
  • Ans. 

    Pentesting methodology is a systematic approach used to identify and exploit vulnerabilities in a system to improve security.

    • 1. Reconnaissance: Gather information about the target system.

    • 2. Scanning: Identify open ports and services on the target system.

    • 3. Gaining access: Exploit vulnerabilities to gain access to the system.

    • 4. Maintaining access: Maintain access to the system for further testing.

    • 5. Covering tracks: Rem...

  • Answered by AI
  • Q2. Tell any standard used for security testing of APIs and Web Applications
  • Ans. 

    OWASP is a standard used for security testing of APIs and Web Applications

    • OWASP Top 10 is a widely recognized standard for web application security

    • OWASP API Security Top 10 provides guidelines for securing APIs

    • OWASP ZAP (Zed Attack Proxy) is a popular tool for testing web application security

  • Answered by AI
  • Q3. White hat and black hat difference
  • Ans. 

    White hat hackers are ethical hackers who use their skills to improve security, while black hat hackers are malicious hackers who exploit vulnerabilities for personal gain.

    • White hat hackers are ethical hackers who work to improve security by finding and fixing vulnerabilities in systems.

    • Black hat hackers are malicious hackers who exploit vulnerabilities for personal gain or to cause harm.

    • White hat hackers may be hired ...

  • Answered by AI
  • Q4. Blue team and red team working difference
  • Ans. 

    Blue team focuses on defense and prevention, while red team simulates attacks to test defenses.

    • Blue team is responsible for defending against cyber threats and implementing security measures.

    • Red team simulates real-world attacks to test the effectiveness of the blue team's defenses.

    • Blue team works proactively to prevent security breaches, while red team works reactively to identify vulnerabilities.

    • Blue team focuses on ...

  • Answered by AI
  • Q5. Authentication vs authorisation
  • Ans. 

    Authentication verifies a user's identity, while authorization determines what actions a user is allowed to perform.

    • Authentication confirms the user's identity through credentials like passwords or biometrics.

    • Authorization controls access to resources based on the authenticated user's permissions.

    • Example: Logging into a system with a username and password is authentication, while being able to view or edit specific fil

  • Answered by AI
  • Q6. Any methods to secure authentication
  • Ans. 

    Secure authentication methods are crucial for protecting sensitive information.

    • Use multi-factor authentication (MFA) to add an extra layer of security

    • Implement strong password policies, including regular password changes

    • Utilize biometric authentication such as fingerprint or facial recognition

    • Employ single sign-on (SSO) for centralized authentication management

    • Monitor and analyze authentication logs for suspicious acti

  • Answered by AI
  • Q7. Difference between hashing and encryption
  • Ans. 

    Hashing is one-way function for data integrity while encryption is two-way function for data confidentiality.

    • Hashing is irreversible and used for data integrity verification.

    • Encryption is reversible and used for data confidentiality protection.

    • Hashing produces a fixed-length output (hash value) while encryption output length can vary.

    • Example: Hashing - MD5, SHA-256; Encryption - AES, RSA

  • Answered by AI
  • Q8. Lfi vs Rfi difference
  • Ans. 

    LFI allows an attacker to include files on a server through the web browser, while RFI allows an attacker to execute arbitrary code on a server.

    • LFI stands for Local File Inclusion, where an attacker can include files on a server using a vulnerable script.

    • RFI stands for Remote File Inclusion, where an attacker can execute arbitrary code on a server by including a remote file.

    • LFI is limited to files that are already pres...

  • Answered by AI
  • Q9. What are some mitigation for SQL injection
  • Ans. 

    Mitigations for SQL injection include input validation, parameterized queries, stored procedures, and least privilege access.

    • Implement input validation to ensure only expected data is accepted

    • Use parameterized queries to separate SQL code from user input

    • Utilize stored procedures to encapsulate SQL logic and prevent direct user input execution

    • Follow the principle of least privilege to restrict database access rights

  • Answered by AI
  • Q10. What is blind based SQL injection
  • Ans. 

    Blind based SQL injection is a type of SQL injection attack where the attacker sends SQL queries to the database and observes the result without actually seeing the output.

    • Attacker sends SQL queries to the database and observes the behavior of the application to determine if the query was successful or not.

    • No error messages are displayed to the attacker, making it harder to detect.

    • Time-based blind SQL injection involve...

  • Answered by AI
  • Q11. What is password spraying
  • Ans. 

    Password spraying is a type of cyber attack where attackers try a few common passwords against many usernames.

    • Attackers use common passwords to try and gain access to multiple accounts.

    • Unlike brute force attacks, password spraying involves trying a few passwords against many accounts.

    • Attackers aim to avoid detection by not triggering account lockouts.

    • Organizations can defend against password spraying by enforcing stron...

  • Answered by AI
  • Q12. How can you mitigate brute forcing
  • Ans. 

    Implement account lockout, use strong passwords, and implement CAPTCHA

    • Implement account lockout after a certain number of failed login attempts

    • Encourage users to use strong passwords with a combination of letters, numbers, and special characters

    • Implement CAPTCHA to prevent automated brute force attacks

    • Consider implementing rate limiting to restrict the number of login attempts within a certain time frame

  • Answered by AI
  • Q13. Rest were scenario based questions involving attacks and their mitigation
  • Q14. 3 - 4 questions related to coding are asked
  • Ans. Answer these questions as per security perspective and may not have direct solutions.
  • Answered Anonymously
Round 4 - HR 

(8 Questions)

  • Q1. Tell us something about yourself
  • Ans. Start with basic details such as education, family background and you may add any relevant participation or achievements related to cyber security (not necessary but if you have some it might push your case further)
  • Answered Anonymously
  • Q2. Tell me something that is not written in your resume
  • Ans. Again this is based on your experience. I answered about my hobbies and interests then informed about experience involving them. Do not add here something you're not interested or aware as it may not go well with the recruiter
  • Answered Anonymously
  • Q3. What is more important to you procedure or end goal ?
  • Ans. 

    End goal is more important as it drives the overall direction and success of a project.

    • End goal provides a clear vision and purpose for the project

    • Procedures are important for achieving the end goal efficiently

    • Flexibility in procedures may be necessary to adapt to changing circumstances

    • Examples: In cybersecurity, the end goal of protecting sensitive data may require constantly evolving procedures to combat new threats

  • Answered by AI
  • Q4. What will be your next step if your internship period is extended or you're not retained beyond probation
  • Ans. Again this appeared like psychological question. I said that basis on the situation I shall analyse the action and events leading to the same. In case I am not retained then will work more on honing my skills and use the experience gained here as step to achieve success in next interview. Also I said if the term of internship is extended beyond current period I shall be happy to learn more if it lands me a job here (
  • Answered Anonymously
  • Q5. What is your salary expectation with this job
  • Ans. Answer this as per your expectations
  • Answered Anonymously
  • Q6. Will you join us or look for other opportunities
  • Q7. How you will ensure you are up to date with latest developments in your field (it was informed that currently there is no mentorship at organisation and hence the question)
  • Ans. I will learn the new methodologies from the internet and use the experience gained here to enhance my working style. Also will look to get a good certification to serve as testimonials for my experience in cyber security
  • Answered Anonymously
  • Q8. Are you flexible with the shifts if you have to work on that basis
  • Ans. I said I prefer stable shifts but once in a while is manageable
  • Answered Anonymously

Interview Preparation Tips

Topics to prepare for LanzeIntegra Technologies Security Engineer interview:
  • Web Application Testing
  • API Testing
  • Cyber Security
  • Standards
  • Communication Skills
  • Identity and Access Management
  • Shell Scripting
Interview preparation tips for other job seekers - Be prepared in the interview and read your resume thoroughly. Brush your skills (both hard and soft). Don't exaggerate or over emphasize. Wear neat and nice fit clothes if going for on site interview. Project yourself as eager learner, self motivated worker and a team player. Be confident in your replies and take the disagreement lightly without getting your patience affected.

Have a proper sleep (as per your need to look fresh and keep mind active) and have plenty of water too for keeping your throat hydrated

Skills evaluated in this interview

Top LanzeIntegra Technologies Security Engineer Interview Questions and Answers

Q1. What is more important to you procedure or end goal ?
View answer (2)

Security Engineer Interview Questions asked at other Companies

Q1. 1. What is Cryptography? Cryptography is the practice and study of techniques for securing information and communication mainly to protect the data from third parties that the data is not intended for. 2. What is the difference between Symm... read more
View answer (25)

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
More than 8 weeks
Result
Selected Selected

I was interviewed in Jan 2025.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Sale price on on day
  • Q2. Start working

Interview Preparation Tips

Interview preparation tips for other job seekers - Fofocus heavily on networking, tailoring your resume with relevant keywords, actively following up with potential employers, showcasing your sales skills in interviews through storytelling, and monitoring companies you're interested in to stay updated on opportunities.
Key points to remember:
Prioritize networking:
Utilize your network to connect with people in the industry, attend industry events, and leverage platforms like LinkedIn to build relationships with potential hiring managers.
Tailor your resume:
Include relevant sales keywords throughout your resume to catch the attention of recruiters and ensure your experience aligns with the job description.
Practice your sales pitch:
Prepare compelling stories from your past experiences to demonstrate your ability to close deals, overcome objections, and build rapport during interviews.
Follow up consistently:
After submitting applications, send personalized follow-up emails to maintain engagement with potential employers.
Research companies:
Actively monitor companies you're interested in by following their social media and news to stay informed about potential openings.
Highlight transferable skills:
Even if you lack direct sales experience, emphasize skills like communication, persuasion, relationship building, and problem-solving that translate well to a sales role.
Ask insightful questions:
During interviews, demonstrate your knowledge of the company and role by asking thoughtful questions that show your genuine interest.
Be enthusiastic and confident:
Convey a positive attitude and express your passion for sales to make a strong impression on potential employers.
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
No response

I was interviewed in Feb 2025.

Round 1 - Technical 

(5 Questions)

  • Q1. Can you provide information about yourself and the projects you have worked on?
  • Q2. What is the Re-Framework, and how do the Dispatcher, Performer, and DataTable transaction approaches function in UiPath?
  • Q3. What is the difference between an execute query and an execute non-query?
  • Q4. What is the difference between a switch statement and an if-else statement?
  • Q5. Datatable how to use it in Uipath, what is a connection string and how we can create that?
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I was interviewed in Jan 2025.

Round 1 - Aptitude Test 

The exam consists of seven sections, and the cutoff score is quite high; it is essential to complete the exam thoroughly.

Round 2 - One-on-one 

(5 Questions)

  • Q1. Can you tell me about yourself?
  • Q2. Can you provide details about your internship experience?
  • Q3. Given a puzzle to solve
  • Q4. What can you tell me about your major projects?
  • Q5. What is the latest news you have heard regarding technology?

Interview Preparation Tips

Interview preparation tips for other job seekers - Stay composed, exhibit confidence, and ensure effective communication.
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I was interviewed in Feb 2025.

Round 1 - HR 

(3 Questions)

  • Q1. Tell me about yourself
  • Q2. Expected CTC
  • Q3. Why you left your previous company (Negative answers should be avoided)
Round 2 - Technical 

(3 Questions)

  • Q1. Questions based on the concepts of payroll
  • Q2. Expected CTC
  • Q3. Discussion regards to Shift timings, Cab facility, Annual leaves, Variable bonus, Relocate bonus.
Round 3 - Behavioral 

(1 Question)

  • Q1. Regards to Payroll questions on what I did on daily basis.

O&M WAREHOUSE MANAGER Interview Questions & Answers

Jio user image Anonymous

posted on 28 Feb 2025

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
No response

I was interviewed in Jan 2025.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Give work freedom to employee
  • Q2. No need to search each and every transactions
Round 2 - HR 

(2 Questions)

  • Q1. Trust on employee
  • Q2. Maintain minimum job curtsy
Round 3 - One-on-one 

(2 Questions)

  • Q1. Salary hike and position hike is Mandatory
  • Q2. Collect exact feedback from employee

Interview Preparation Tips

Interview preparation tips for other job seekers - Job guarantee is Mandatory
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
2-4 weeks
Result
No response

I was interviewed in Sep 2024.

Round 1 - Aptitude Test 

An aptitude test evaluates an individual's potential to excel in a specific area by assessing their strengths and weaknesses in particular abilities.

Round 2 - Aptitude Test 

An assessment that measures an individual's inherent abilities and potential for success in a specific activity.

Round 3 - Coding Test 

A coding test is a programming assessment designed to evaluate a candidate's coding skills. It is a standard component of the technical hiring process for software developers and programmers.

Round 4 - Coding Test 

Assessment that evaluates a candidate's coding skills

Round 5 - Group Discussion 

Group discussion (GD) topics for interviews may cover areas such as business, social issues, and current affairs. GDs serve to evaluate a candidate's communication, leadership, and teamwork abilities.

Round 6 - Assignment 

Discussion assignments are prompts that your teacher may assign to you. By participating in these discussions, you can reflect on your learning, share ideas and opinions, or ask and answer questions. Discussions may require you to respond to individual questions or provide multiple responses to an ongoing conversation.

Interview Preparation Tips

Interview preparation tips for other job seekers - Job seekers can improve their chances by researching the job market, preparing their resume and cover letter, and networking.
Research
Know your goals: Consider your values, strengths, and ideal work environment.
Research the company: Anticipate common interview questions.
Prepare your resume
Tailor your resume: Customize your resume for each job application.
Highlight your skills: Highlight how your skills and experience match the job description.
Use keywords: Use relevant keywords in your resume and cover letter.
Prepare for interviews
Prepare your answers: Use the STAR method to prepare your answers.
Research the company: Anticipate common interview questions.
Network
Expand your professional network: You may find that more people can recommend you to a new position.
Use your professional network: You can use your network for career advice.
Other tips Don't limit your search to online resources, Optimize your LinkedIn profile, Use several job-search websites, Keep your resume up-to-date, and Develop your interview skills.
Interview experience
1
Bad
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I was interviewed in Jan 2025.

Round 1 - Coding Test 

A sequence was provided: 4181, 2684, 1597, 987, 610.
first 2 are given and write code for other value calculation using java 8

The second question required writing a reverse of a palindrome using both Java 8 streams. I was able to successfully write both and clear the first round.

Round 2 - Technical 

(6 Questions)

  • Q1. Interviewer was himself not knowing anything as it was walkin drive he was sitting infront of me and checking questions on phone Introduction that he inturrepted in between when I was introducing myself
  • Q2. What are the features of Java 17, specifically related to sealed classes, including their syntax and necessity, along with the potential errors encountered when invoking a sealed class?
  • Ans. 

    Java 17 introduces sealed classes to restrict inheritance and improve code maintainability.

    • Sealed classes are declared using the 'sealed' keyword followed by the permitted subclasses.

    • Subclasses of a sealed class must be either final or sealed themselves.

    • Errors may occur when trying to extend a sealed class with a non-permitted subclass.

  • Answered by AI
  • Q3. Java 8 feathers stream api, functional interface, Intermittent operator ,Ternary operator, Prediction,Bi predicate. Answered all successfully
  • Q4. Draw low level design of implementation of notify me if item is back in stock in a ecommerce application
  • Ans. 

    Implementation of 'notify me if item is back in stock' feature in an ecommerce application

    • Create a database table to store user notifications for out-of-stock items

    • Implement a service to check item availability and send notifications to subscribed users

    • Provide a user interface for users to subscribe to notifications for specific items

  • Answered by AI
  • Q5. All design patterns which I know. Asked me to implement adapter pattern on paper
  • Q6. Then given a problem that concurrent way perform operation on excell to decrease the response time

Interview Preparation Tips

Interview preparation tips for other job seekers - I always suggest staying away from these companies commonly referred to as WITCH (Wipro, Infosys, TCS, Cognizant, HCL). You will rarely encounter good interviewers there unless there is an extreme necessity. Interview was judging me on the basis of syntex by seeing in his phone. How can everyone write each and everything on copy. For the low level design first time in my 6 years carrier someone asked to design without using kafka or any other library like spring boot to achieve that add in reminder list problem 😂. At first it was my bad after holding a offer of almost 27 lakh I somehow agreed for giving interview. Second thing I also know that after Even clearing they cannot afford 30LPA which I asked. I just went there because from last 6.5 year I have never attended any walking or face to face interview so was curious for it. Currently also working with somewhat premium product development company only. My experience was very bad. May be it can get vary person to person.

Functional Testing Senior Consultant Interview Questions & Answers

Deloitte user image Anonymous

posted on 4 Feb 2025

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I was interviewed in Jan 2025.

Round 1 - HR 

(2 Questions)

  • Q1. Current CTC, Expected CTC, Notice Period, Skill set
  • Q2. Open for Fixed term hire? Open for working from client location at Gurgaon? (3 days from office)
  • Ans. 

    Yes, open for fixed term hire and working from client location at Gurgaon for 3 days a week.

    • Open for fixed term hire

    • Willing to work from client location at Gurgaon for 3 days a week

  • Answered by AI
Round 2 - Technical 

(10 Questions)

  • Q1. Introduction, Current role and responsibilities
  • Q2. List out the achievements in current project, Tools used
  • Ans. 

    Implemented automated testing using Selenium WebDriver and JUnit in Agile environment

    • Implemented automated testing framework using Selenium WebDriver

    • Utilized JUnit for test case management

    • Worked in Agile environment to ensure continuous testing and integration

  • Answered by AI
  • Q3. Pilot vs Beta testing. How can newly developed functionality be tested via automation rather doing it manually?
  • Ans. 

    Pilot testing is done by a small group of users before the full release, while beta testing is done by a larger group of users. Automation testing can be used for regression testing, smoke testing, and performance testing.

    • Pilot testing involves a small group of users testing the functionality in a controlled environment.

    • Beta testing involves a larger group of users testing the functionality in a real-world environment.

    • ...

  • Answered by AI
  • Q4. Primary key vs Unique key in SQL, Query to find row having last id in sql
  • Ans. 

    Primary key uniquely identifies a record, while unique key allows only one instance of a value in a column. Query to find last id involves using ORDER BY and LIMIT.

    • Primary key enforces uniqueness and not null constraint on a column

    • Unique key enforces uniqueness but allows null values

    • To find row with last id, use ORDER BY id DESC LIMIT 1 in SQL query

  • Answered by AI
  • Q5. Explain Software Testing Life Cycle, Defect Life Cycle
  • Ans. 

    Software Testing Life Cycle (STLC) involves planning, designing, executing, and reporting on tests. Defect Life Cycle includes identification, logging, fixing, and retesting defects.

    • STLC includes requirements analysis, test planning, test design, test execution, and test closure.

    • Defect Life Cycle involves defect identification, defect logging, defect fixing, defect retesting, and defect closure.

    • STLC ensures that the so...

  • Answered by AI
  • Q6. What's the meaning of 303 status code in API? Put vs Delete method in API What is 3 point estimation technique in Agile?
  • Ans. 

    303 status code in API means 'See Other'. PUT method is used to update data, while DELETE method is used to remove data. 3 point estimation technique in Agile is used to estimate tasks.

    • 303 status code indicates that the resource can be found at a different URI and should be retrieved from there

    • PUT method is used to update an existing resource in the API

    • DELETE method is used to remove a resource from the API

    • 3 point esti...

  • Answered by AI
  • Q7. What kind of links and labels can be tagged to a bug in jira?
  • Ans. 

    Links and labels that can be tagged to a bug in Jira

    • Links: related issues, documents, websites

    • Labels: priority, severity, type, status

  • Answered by AI
  • Q8. Have you done shell scripting? What does grep, href commands do in unix?
  • Ans. 

    Shell scripting is a way to automate tasks in Unix/Linux systems. Grep is used to search for specific patterns in text files. Href is not a standard Unix command.

    • Shell scripting automates tasks by writing scripts in a Unix/Linux environment

    • Grep command is used to search for specific patterns in text files

    • Example: grep 'search_pattern' file.txt

    • Href is not a standard Unix command, it may be a typo or a custom script

  • Answered by AI
  • Q9. As a lead, how would you resolve conflict with a team member? As a lead, if you are given plenty of tasks to be completed with in a limited time frame. What would be your approach in doing them?
  • Ans. 

    To resolve conflict with a team member, communication is key. Prioritize understanding, address the issue calmly, find common ground, and work towards a solution together.

    • Listen to the team member's perspective and concerns

    • Communicate openly and calmly about the issue

    • Find common ground and areas of agreement

    • Work together to find a solution that benefits both parties

    • Seek input from other team members or a mediator if ne

  • Answered by AI
  • Q10. Open for relocating to Bangalore and working from client's office? (with no relocation bonus) Open for working in night / rotational shift? (with no additional compensation) Open for working in long exten...
  • Ans. 

    Open to relocating to Bangalore, working in night shifts, long hours, and 24X7 culture. Goal is to excel in automation testing.

    • Yes, open to relocating to Bangalore and working from client's office

    • Yes, open to working in night/rotational shifts

    • Yes, open to working in long extendable hours or 24X7 culture

    • Goal is to excel in automation testing

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Not a good experience. Some recruiters are very arrogant and have no respect for the people interviewing with them. They consider as themselves dummy kings, because they are working in Deloitte USI. I interacted with 4-5 recruiters for one opening (from Gurgaon / Hyderabad). One HR even said to me that I was not the only person interviewing with them, they have bunch of people to chose, also various other things were said in a very unprofessional and rude manner. She had no ethics of talking to an experienced resource, when I escalated this to the seniors, they immediately apologized for her behavior and I was then handled by another Senior HR

I applied via referral in Deloitte USI but to save their referral bonus (I guess), they rejected my profile on the portal and called me through Naukri.com. When I asked them the reason, they said its for a different profile them. however it was for the same one.
Also on their career site, it was not mentioned that role is of fixed term hire (for 2 years), but HR disclosed it later, during the conversation. (another discrepancy)

During my initial conversation, HR clearly said there won't be any night shifts and I would have to work from client's location in Gurgaon office. Although it is 2 year contractual role.
But during my technical interview, the person clearly said to me that I would have to relocate to Bangalore for working from client's secured ODC in office. Also there would be rotational/ night shifts (without any extra pay). Basically they were looking for someone who would devote his 24X7 time to the company for a minimal salary and does not demand for work life balance or weekends off

Neither the HR nor the interviewer opened their web camera during the video call. But HR kept asking me to keep my camera open, even during the waiting time
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
-
Result
No response

I was interviewed in Jan 2025.

Round 1 - Technical 

(6 Questions)

  • Q1. Multi cast in angular
  • Q2. Why event emitter what it does
  • Q3. Handling multiple api calls
  • Q4. Higher order functions
  • Q5. Child route and forRoot difference
  • Q6. Ng-container , ng-template

LanzeIntegra Technologies Interview FAQs

How many rounds are there in LanzeIntegra Technologies interview?
LanzeIntegra Technologies interview process usually has 4 rounds. The most common rounds in the LanzeIntegra Technologies interview process are Resume Shortlist, One-on-one Round and Technical.
What are the top questions asked in LanzeIntegra Technologies interview?

Some of the top questions asked at the LanzeIntegra Technologies interview -

  1. What is more important to you procedure or end goa...read more
  2. Tell any standard used for security testing of APIs and Web Applicati...read more
  3. Which technologies or languages you have knowledge ab...read more

Tell us how to improve this page.

LanzeIntegra Technologies Interview Process

based on 1 interview

Interview experience

4
  
Good
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.5k Interviews
Accenture Interview Questions
3.8
 • 8.2k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.7k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Amazon Interview Questions
4.1
 • 5.1k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.9k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.8
 • 3.1k Interviews
View all

LanzeIntegra Technologies Reviews and Ratings

based on 8 reviews

4.4/5

Rating in categories

4.4

Skill development

4.1

Work-life balance

4.4

Salary

4.2

Job security

3.6

Company culture

4.0

Promotions

4.4

Work satisfaction

Explore 8 Reviews and Ratings
Security Engineer
16 salaries
unlock blur

₹2.5 L/yr - ₹4 L/yr

Senior Security Engineer
10 salaries
unlock blur

₹2 L/yr - ₹9.7 L/yr

Cyber Security Analyst
4 salaries
unlock blur

₹3 L/yr - ₹6 L/yr

Cyber Security Engineer
4 salaries
unlock blur

₹2.8 L/yr - ₹4.2 L/yr

HR Executive
3 salaries
unlock blur

₹2.1 L/yr - ₹4.2 L/yr

Explore more salaries
Compare LanzeIntegra Technologies with

TCS

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare

Cognizant

3.8
Compare
Did you find this page helpful?
Yes No
write
Share an Interview