Filter interviews by
I applied via Company Website and was interviewed in Dec 2024. There were 4 interview rounds.
Given Python coding challenge related to string processing and second question was matrix processing using python
I was interviewed in Aug 2024.
Software development design patterns are reusable solutions to common problems encountered in software design.
Design patterns help in creating maintainable, scalable, and efficient software.
Singleton design pattern ensures a class has only one instance and provides a global point of access to it.
Example: Implementing a singleton class in Java -
public class Singleton { private static Singleton instance; private Singleto...
I have worked on relational databases like MySQL and PostgreSQL. DML stands for Data Manipulation Language.
Worked on MySQL and PostgreSQL databases
Familiar with writing SQL queries for data manipulation
DML stands for Data Manipulation Language
One challenge when working with microservices is managing communication between services.
Ensuring proper service discovery and registration
Handling network latency and failures
Implementing effective monitoring and logging
Maintaining consistency and data integrity across services
Types of deployments include blue-green, canary, rolling, and immutable.
Blue-green deployment involves running two identical production environments and switching between them.
Canary deployment gradually rolls out changes to a small subset of users before deploying to the entire infrastructure.
Rolling deployment updates a few instances at a time, ensuring continuous availability.
Immutable deployment creates new instanc
Blue Green Deployment is a software release strategy that reduces downtime and risk by running two identical production environments.
In Blue Green Deployment, one environment (blue) is live and serving production traffic while the other (green) is idle and ready to be switched to at any time.
This strategy allows for zero downtime deployments, as the switch between blue and green environments can be done seamlessly.
Blue...
I enjoyed the challenging technical questions and the opportunity to showcase my problem-solving skills.
Challenging technical questions
Opportunity to showcase problem-solving skills
Developed a web-based project management tool for tracking tasks and deadlines.
Implemented user authentication and authorization using JWT tokens
Integrated real-time chat feature using WebSockets
Utilized React for front-end and Node.js for back-end development
Vector databases store data in a vector format, allowing for efficient querying and analysis of high-dimensional data.
Vector databases use vectors to represent data points in a multi-dimensional space.
They are commonly used in machine learning and data science applications for tasks like similarity search and clustering.
Examples of vector databases include Faiss, Annoy, and Milvus.
Yes, I can solve a coding problem in a language I don't know with Google search.
Utilize Google search to understand syntax and concepts in the unfamiliar language
Break down the problem into smaller parts and search for solutions to each part
Refer to online resources, forums, and documentation for guidance
Practice writing and testing code snippets in the new language before attempting the full solution
Use regex to extract location and shop name from transaction string.
Use regular expressions to match patterns for location and shop name.
Look for keywords like 'at', 'from', 'in' to identify location.
Consider variations in transaction strings and account for them in regex patterns.
Example: 'Spent $50 at Starbucks Coffee' -> Location: Starbucks Coffee, Shop Name: Starbucks Coffee
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
Maintaining security in Microservices involves implementing authentication, authorization, encryption, and monitoring.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices.
Implement monitoring and logging to detect and respond to security incidents.
Regularly update dependencies and patches to address security vulnerabilities...
Kafka is a distributed streaming platform while RabbitMQ is a message broker.
Kafka is designed for high-throughput, fault-tolerant, real-time data streaming.
RabbitMQ is a traditional message broker that follows the AMQP protocol.
Kafka uses a publish-subscribe model while RabbitMQ uses a message queuing model.
Kafka is horizontally scalable and provides strong durability guarantees.
RabbitMQ supports multiple messaging pr...
CQRS pattern can be used in scenarios where read and write operations need to be separated for better scalability and performance.
CQRS can be used in applications with complex domain models that require different models for reading and writing data.
It can be beneficial in scenarios where read operations heavily outnumber write operations.
CQRS is useful when there is a need to optimize read and write operations independ...
Implementing eventual consistency in a relational DB involves careful design and use of techniques like conflict resolution and versioning.
Use timestamp-based conflict resolution to handle conflicting updates.
Implement versioning to track changes and resolve conflicts.
Consider using distributed transactions or distributed consensus algorithms like Paxos or Raft.
Use compensating transactions to rollback changes in case ...
MasterCard interview questions for popular designations
General DSA with some ds questions
Get interview-ready with Top MasterCard Interview Questions
I applied via Campus Placement
3 Coding Questions of moderate level .
SSL certificates are digital certificates that authenticate the identity of a website and encrypt information sent to the server.
SSL certificates ensure secure communication between a user's browser and a website's server.
They use encryption to protect sensitive data such as login credentials, credit card information, etc.
SSL certificates are issued by Certificate Authorities (CAs) and contain information about the web...
Securing REST API involves using authentication, authorization, encryption, and input validation.
Use authentication methods like OAuth, JWT, or API keys to verify the identity of clients.
Implement authorization to control access to resources based on user roles and permissions.
Encrypt data transmission using HTTPS to protect sensitive information from being intercepted.
Validate and sanitize input data to prevent inject
I would investigate the root cause, work on fixing the issue, and implement measures to prevent it from happening again.
Investigate the root cause of the downtime, such as network issues, server failures, or software bugs
Work on fixing the issue promptly to minimize impact on users and business operations
Implement measures to prevent similar downtime in the future, such as redundancy, monitoring, and failover mechanism
Implement a throttling system to handle dropped messages from a slow downstream service.
Implement a queue to store messages from the downstream service.
Set a maximum queue size and drop messages when the queue is full.
Use a timestamp to track when messages were received and process them in order.
Implement a retry mechanism to reprocess dropped messages after a certain time.
Monitor the queue size and processing speed to
Top trending discussions
Some of the top questions asked at the MasterCard interview -
The duration of MasterCard interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 117 interviews
Interview experience
based on 714 reviews
Rating in categories
Senior Software Engineer
692
salaries
| ₹13.9 L/yr - ₹46 L/yr |
Software Engineer2
244
salaries
| ₹9.6 L/yr - ₹30 L/yr |
Software Engineer
216
salaries
| ₹6.1 L/yr - ₹25.1 L/yr |
Consultant
186
salaries
| ₹12.3 L/yr - ₹40 L/yr |
Lead Software Engineer
152
salaries
| ₹20 L/yr - ₹57.5 L/yr |
PayPal
Visa
American Express
Discover Financial Services