Filter interviews by
I applied via Naukri.com and was interviewed in Feb 2022. There was 1 interview round.
Scaling the database involves horizontal or vertical scaling, sharding, caching, and load balancing.
Horizontal scaling involves adding more nodes to the database cluster.
Vertical scaling involves increasing the resources of the existing nodes.
Sharding involves partitioning the data across multiple nodes.
Caching involves storing frequently accessed data in memory.
Load balancing involves distributing the workload across ...
Sessions are managed using sticky sessions or session affinity.
Sticky sessions ensure that a user's requests are directed to the same instance throughout the session.
Session affinity routes requests to the instance that served the initial request.
Load balancers can be configured to use either method.
Session data can also be stored in a shared database or cache to ensure availability across instances.
I applied via Company Website and was interviewed in Mar 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Dec 2020. There was 1 interview round.
I applied via Company Website and was interviewed before Feb 2021. There were 2 interview rounds.
I applied via Walk-in and was interviewed before May 2021. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before Nov 2020. There were 5 interview rounds.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
based on 1 interview
Interview experience
Devops Engineer
24
salaries
| ₹4.8 L/yr - ₹17.8 L/yr |
Cloud Devops Engineer
14
salaries
| ₹8.5 L/yr - ₹15.5 L/yr |
Technical Testing Engineer
10
salaries
| ₹9.5 L/yr - ₹15 L/yr |
Software Developer
9
salaries
| ₹7.7 L/yr - ₹15 L/yr |
Operations Engineer
9
salaries
| ₹4 L/yr - ₹7 L/yr |
TCS
Infosys
Wipro
HCLTech