Add office photos
Employer?
Claim Account for FREE

National Informatics Centre

3.9
based on 574 Reviews
Filter interviews by

30+ Corporate Channels India Interview Questions and Answers

Updated 3 Jan 2025

Q1. What is class, object? Oops concepts in java? Struts flow.. Database ddl and dml commands? System test Ajax calls

Ans.

Questions related to software development concepts and technologies.

  • Class is a blueprint for creating objects in Java.

  • Object is an instance of a class.

  • OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.

  • Struts is a framework for developing Java web applications.

  • Database DDL commands are used to define database schema, while DML commands are used to manipulate data.

  • System testing is a type of testing that evaluates the system as a whole.

  • Ajax calls a...read more

Add your answer

Q2. What is server side state management

Ans.

Server side state management is the process of storing and managing data on the server side of a web application.

  • It involves storing data on the server instead of the client side

  • It helps maintain consistency and security of data

  • Examples include session management and database management

Add your answer

Q3. Which technologies you are comfortable ?

Ans.

I am comfortable with a wide range of technologies including Java, Python, JavaScript, and SQL.

  • Proficient in Java and Python programming languages

  • Familiar with JavaScript and its frameworks such as React and Angular

  • Experienced in working with SQL databases

  • Comfortable with version control systems like Git

  • Knowledgeable in software development methodologies like Agile and Scrum

Add your answer

Q4. What is string toknizer in java ?

Ans.

StringTokenizer is a class in Java that breaks a string into tokens based on a delimiter.

  • It is a legacy class that is not recommended to use in new code.

  • It is used to split a string into smaller parts based on a delimiter.

  • The default delimiter is whitespace, but it can be changed to any character or string.

  • It is useful for parsing text files or data that is separated by a specific character.

  • Example: StringTokenizer st = new StringTokenizer("Hello World", " "); while (st.hasMo...read more

Add your answer
Discover Corporate Channels India interview dos and don'ts from real experiences

Q5. What are the security measures you will take to secure server

Ans.

I will implement various security measures such as firewalls, access controls, regular updates, and backups.

  • Install and configure firewalls to prevent unauthorized access

  • Implement access controls to restrict access to sensitive data

  • Regularly update software and operating systems to patch vulnerabilities

  • Perform regular backups to ensure data can be restored in case of a security breach

Add your answer

Q6. How to handle cyber threads in web application

Ans.

Cyber threats in web applications can be handled by implementing security measures such as encryption, firewalls, and regular security audits.

  • Implement strong encryption protocols to protect data in transit and at rest

  • Use firewalls to monitor and control incoming and outgoing traffic

  • Regularly conduct security audits and penetration testing to identify vulnerabilities

  • Implement secure coding practices to prevent common security flaws like SQL injection and cross-site scripting

  • K...read more

Add your answer
Are these interview questions helpful?

Q7. What is OOPs concept in java?

Ans.

OOPs concept in Java is a programming paradigm that focuses on objects and their interactions.

  • OOPs stands for Object-Oriented Programming

  • It emphasizes on encapsulation, inheritance, and polymorphism

  • Encapsulation is the process of hiding implementation details from the user

  • Inheritance allows a class to inherit properties and methods from another class

  • Polymorphism allows objects to take on multiple forms or behaviors

  • Example: A car is an object that has properties like color, mo...read more

Add your answer

Q8. what are problems in india about IT industry... ? job opportunities in IT ? what you think about growth in IT sector?

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is components of dot net

Ans.

The components of .NET include the Common Language Runtime, Framework Class Library, and ASP.NET.

  • Common Language Runtime (CLR) - manages memory, security, and execution of code

  • Framework Class Library (FCL) - collection of reusable classes, interfaces, and value types

  • ASP.NET - web application framework for building dynamic web pages and web services

Add your answer

Q10. What is mean by sql injection?with example

Ans.

SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.

  • SQL injection is a common attack on web applications that use SQL databases.

  • Attackers can use SQL injection to bypass authentication, steal data, or modify data.

  • SQL injection can be prevented by using prepared statements, input validation, and limiting database privileges.

  • Example: If a login form is vulnerable to SQL injection, an attacker can ent...read more

Add your answer

Q11. What is page life cycle

Ans.

Page life cycle refers to the series of events that occur between the time a user requests a web page and the time the page is rendered on the user's browser.

  • Page life cycle consists of several stages such as initialization, loading, rendering, and unloading.

  • During initialization, the page is created and controls are initialized.

  • During loading, the page is loaded with data and controls are populated.

  • During rendering, the page is displayed on the user's browser.

  • During unloadin...read more

Add your answer

Q12. Which is the default Mysql port

Ans.

The default Mysql port is 3306.

  • Mysql uses port 3306 by default for communication.

  • The port number can be changed in the configuration file.

  • To connect to a Mysql server, the client must specify the correct port number.

Add your answer

Q13. What is clr

Ans.

CLR stands for Common Language Runtime, a component of .NET framework that manages execution of .NET programs.

  • CLR is responsible for memory management, security, and exception handling.

  • It compiles code into an intermediate language (IL) and then executes it.

  • CLR allows for language interoperability, meaning that code written in different languages can be compiled to the same IL and run on the same runtime.

  • Examples of languages that can run on CLR include C#, VB.NET, F#, and ma...read more

Add your answer

Q14. What is cookies

Ans.

Cookies are small text files stored on a user's computer by a website to remember user preferences and login information.

  • Cookies are used to track user activity on a website

  • They can be used to store user preferences and login information

  • Cookies can be either session cookies or persistent cookies

  • Session cookies are deleted when the user closes their browser

  • Persistent cookies remain on the user's computer until they expire or are deleted

Add your answer

Q15. How to publish dot net application

Ans.

To publish a .NET application, you need to compile it, create a deployment package, and then deploy it to a server.

  • Compile the application using Visual Studio or the command line

  • Create a deployment package using tools like MSBuild or Visual Studio's Publish Wizard

  • Deploy the package to a server using tools like IIS or Azure App Service

  • Configure the server to run the application

  • Test the application to ensure it is working properly

Add your answer

Q16. what would you know about technologies .

Add your answer

Q17. What is OSI model, networking, sattalite communication.

Ans.

OSI model is a conceptual framework for understanding network communication. Satellite communication is a type of wireless communication.

  • OSI model has 7 layers, each with a specific function in network communication

  • Networking involves connecting devices to share resources and information

  • Satellite communication uses satellites to transmit signals over long distances

  • Satellite communication is used for TV broadcasting, GPS, and internet access in remote areas

Add your answer

Q18. What is server hardening?

Ans.

Server hardening is the process of securing a server by reducing its attack surface and minimizing vulnerabilities.

  • Server hardening involves configuring the server to reduce the risk of unauthorized access, data theft, and other security threats.

  • This can include installing security patches and updates, disabling unnecessary services and ports, and implementing access controls.

  • Examples of server hardening measures include using firewalls, implementing strong passwords and encr...read more

Add your answer

Q19. What is Logical volume management?

Ans.

Logical Volume Management (LVM) is a method of allocating space on mass storage devices that allows for flexible partitioning.

  • LVM allows for the creation of logical volumes that can span multiple physical disks.

  • It provides features such as resizing volumes on-the-fly and creating snapshots for backups.

  • LVM is commonly used in enterprise environments to manage large amounts of data.

  • Examples of LVM tools include pvcreate, vgcreate, lvcreate, and lvextend.

Add your answer

Q20. What is ssh? What is ssl?

Ans.

SSH is a secure network protocol used for remote access to servers. SSL is a security protocol used for secure communication over the internet.

  • SSH stands for Secure Shell and is used for secure remote access to servers

  • SSH uses encryption to secure the communication between the client and server

  • SSL stands for Secure Sockets Layer and is used for secure communication over the internet

  • SSL uses encryption to secure the communication between the client and server

  • SSL is commonly us...read more

Add your answer

Q21. What are types of cyber attacks

Ans.

Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.

  • Malware: malicious software designed to damage or gain unauthorized access to a computer system.

  • Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

  • Ransomware: malware that encrypts a user's files and demands payment for their release.

  • DDoS attacks: flooding a network or server with an overwhelming amount of traffic to disrupt norma...read more

Add your answer

Q22. Validations used in your project

Ans.

Validations used in project

  • Input validation to ensure correct data type and format

  • Data validation to ensure data integrity and consistency

  • Business rule validation to ensure compliance with requirements

  • Authentication and authorization validation to ensure secure access

  • Error handling and exception validation to ensure proper handling of errors

Add your answer

Q23. What is difference between Web services and WCF?

Ans.

Web services are a broader concept that includes various technologies, while WCF is a specific technology for building distributed systems.

  • Web services are based on open standards like HTTP, XML, and SOAP, while WCF uses a more flexible messaging system.

  • Web services can be consumed by any platform or language, while WCF is primarily used in the .NET framework.

  • Web services are typically used for interoperability between different systems, while WCF is more focused on building ...read more

Add your answer

Q24. How to manage bulky CRM application Data?

Ans.

To manage bulky CRM application data, use data compression techniques, optimize database queries, implement data archiving, and utilize cloud storage.

  • Implement data compression techniques to reduce the storage space required for the CRM application data.

  • Optimize database queries to improve the performance of data retrieval and manipulation operations.

  • Implement data archiving to move older or less frequently accessed data to a separate storage system, freeing up resources in t...read more

Add your answer

Q25. StoredProcedure in sql

Ans.

Stored procedures are precompiled SQL statements that can be saved and reused in a database.

  • Stored procedures can improve performance by reducing network traffic and improving security.

  • They can be used to encapsulate business logic and provide a consistent interface to the database.

  • Parameters can be passed to stored procedures, allowing for dynamic queries.

  • Examples of stored procedures include ones that retrieve data, insert data, or update data in a database.

Add your answer

Q26. What are the features of Selenium?

Ans.

Selenium is a popular automation testing tool used for web applications.

  • Supports multiple programming languages like Java, Python, C#, etc.

  • Can automate web browsers across different platforms.

  • Allows for parallel test execution.

  • Integrates with popular CI/CD tools like Jenkins.

  • Supports various browsers like Chrome, Firefox, Safari, etc.

Add your answer

Q27. How to mitigate MITM attack

Ans.

To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.

  • Use encryption to protect data in transit

  • Implement secure communication protocols like HTTPS

  • Verify server certificates to ensure the authenticity of the server

  • Use VPNs for secure remote access

Add your answer

Q28. views in sql

Ans.

Views in SQL are virtual tables that are based on the result of an SQL statement.

  • Views are created using the CREATE VIEW statement.

  • They can be used to simplify complex queries.

  • They can also be used to restrict access to sensitive data.

  • Views are updated automatically when the underlying tables are updated.

  • They can be used to join multiple tables into a single view.

Add your answer

Q29. Arrays & Strings explanation

Ans.

Arrays & Strings are data structures used to store multiple values in a single variable.

  • Arrays store multiple values of the same data type in a contiguous memory location.

  • Strings are arrays of characters used to represent text.

  • Example: int[] numbers = {1, 2, 3}; String name = 'John';

Add your answer

Q30. PHP session?with example

Ans.

PHP session is a way to store user data on the server for later use.

  • Sessions are started with session_start() function

  • Session data is stored in $_SESSION superglobal array

  • Session ID is stored in a cookie on the user's browser

  • Session can be destroyed with session_destroy() function

Add your answer

Q31. Develop a RAT using MSF

Ans.

Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)

  • Use Metasploit Framework to create a payload for the RAT

  • Set up a listener to receive connections from the compromised machines

  • Utilize post-exploitation modules in MSF for advanced functionality

  • Ensure proper evasion techniques to avoid detection by antivirus software

Add your answer

Q32. Describe OSI model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with the adjacent layers.

  • Example: When you send an email, the Application layer initiates the process, while the Phys...read more

Add your answer

Q33. software testing life cycle

Ans.

Software testing life cycle is a process of testing software from planning to deployment.

  • STLC includes planning, designing, executing, and reporting.

  • It ensures that the software meets the requirements and is of high quality.

  • STLC involves functional, non-functional, and regression testing.

  • It also includes test environment setup and test data creation.

  • STLC ends with the release of the software.

  • Example: STLC phases - requirement analysis, test planning, test case design, test ex...read more

Add your answer

Q34. Experience in each tool

Ans.

I have experience with a variety of tools commonly used in DevOps, including Jenkins, Docker, Kubernetes, Ansible, and Git.

  • Proficient in Jenkins for continuous integration and continuous deployment

  • Familiar with Docker for containerization of applications

  • Experience with Kubernetes for container orchestration

  • Skilled in Ansible for configuration management and automation

  • Proficient in Git for version control and collaboration

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Corporate Channels India

based on 11 interviews in the last 1 year
Interview experience
4.6
Excellent
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 432 Interview Questions
3.7
 • 332 Interview Questions
4.1
 • 272 Interview Questions
4.0
 • 269 Interview Questions
4.1
 • 255 Interview Questions
4.1
 • 154 Interview Questions
View all
Top National Informatics Centre Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter