i
NTT DATA,
Inc.
Work with us
Filter interviews by
Managing user access in Kubernetes involves RBAC, authentication, and authorization mechanisms to control permissions.
Use Role-Based Access Control (RBAC) to define roles and permissions for users and service accounts.
Create Roles and ClusterRoles to specify access to resources within a namespace or across the cluster.
Bind Roles to users or groups using RoleBindings and ClusterRoleBindings.
Implement authentication...
VPC peering is non-transitive because it only allows direct connections between two VPCs, not through a third party.
VPC peering connects two VPCs directly, enabling them to communicate as if they are on the same network.
If VPC A is peered with VPC B, and VPC B is peered with VPC C, VPC A cannot communicate with VPC C directly.
This design enhances security and simplifies routing, as each peering connection must be ...
In my previous role, I led projects that enhanced operational efficiency and improved client satisfaction significantly.
Managed a team of 5 to streamline project workflows, resulting in a 20% reduction in project delivery time.
Implemented a new client feedback system that increased customer satisfaction scores by 15%.
Conducted training sessions for junior associates, improving their performance metrics by 30% with...
NAT translates private IP addresses to public ones, enhancing security and conserving IP addresses.
Static NAT: Maps a single private IP to a single public IP. Example: A web server with a fixed public IP.
Dynamic NAT: Maps a private IP to a public IP from a pool of addresses. Example: Multiple users accessing the internet.
PAT (Port Address Translation): Maps multiple private IPs to a single public IP using differen...
VPNs create secure connections over the internet, allowing users to access private networks remotely and protect their data.
VPNs encrypt internet traffic, making it difficult for hackers to intercept data.
They allow remote access to corporate networks, enabling employees to work securely from anywhere.
VPNs can mask a user's IP address, enhancing privacy and anonymity online.
Examples include OpenVPN, L2TP/IPsec, an...
Day Sales Outstanding (DSO) measures the average number of days a company takes to collect payment after a sale.
DSO = (Accounts Receivable / Total Credit Sales) x Number of Days.
A lower DSO indicates efficient collection processes.
For example, if Accounts Receivable is $100,000 and Total Credit Sales are $1,000,000 over 30 days, DSO = (100,000 / 1,000,000) x 30 = 3 days.
Monitoring DSO helps in cash flow management...
Experienced in software development, focusing on system analysis, design, and implementation of robust solutions.
Led a team in developing a healthcare management system, improving patient data accessibility by 30%.
Implemented Agile methodologies, resulting in a 25% increase in project delivery speed.
Collaborated with cross-functional teams to gather requirements and design user-friendly interfaces.
Utilized data an...
DoRA (Dynamic Resource Allocation) optimizes network resource usage based on real-time demand.
DoRA adjusts bandwidth allocation dynamically based on current network traffic.
Example: In a video conference, DoRA can allocate more bandwidth to users with poor connections.
It helps in reducing latency and improving overall user experience.
DoRA can be implemented in various network types, including cellular and Wi-Fi ne...
Transformers architecture refers to the structure and components of transformer models used in natural language processing.
Transformers consist of an encoder and a decoder, each made up of multiple layers of self-attention and feedforward neural networks.
The encoder processes the input sequence, while the decoder generates the output sequence.
Transformer models have achieved state-of-the-art performance in various...
Different types of rags can be built using various materials and techniques.
Use different materials such as cotton, linen, or microfiber to create different types of rags.
Consider the intended use of the rag - for cleaning, polishing, or absorbing spills.
Experiment with different sizes and shapes of rags for specific tasks.
Try different techniques like cutting, folding, or stitching to customize the rag.
Examples: ...
Defect tracking is the process of identifying, documenting, prioritizing, and resolving issues or bugs in software.
Defect tracking involves recording details of defects found during testing.
Each defect is assigned a unique identifier for tracking purposes.
Defects are categorized based on severity and priority to determine the order in which they should be fixed.
Defect tracking tools like Jira, Bugzilla, or HP ALM are c...
Regression testing is the process of retesting a software application to ensure that new code changes have not adversely affected existing functionality.
Regression testing is performed after code changes to verify that the existing functionality still works correctly.
It helps in identifying any defects introduced by new code changes.
Automated testing tools are often used for regression testing to save time and effort.
R...
Test scenarios for an elevator to ensure proper functionality and safety
Test the elevator buttons for all floors
Test emergency stop button functionality
Test door opening and closing mechanism
Test elevator capacity by loading it with maximum weight limit
Test response time for elevator arrival at different floors
I appeared for an interview in Jan 2025.
Reasoning Quantitative English
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Developed a web-based inventory management system for a retail company
Utilized Java for backend development
Implemented responsive design using HTML, CSS, and JavaScript
Integrated barcode scanning functionality for efficient inventory tracking
I was responsible for providing technical support to end users and troubleshooting application issues within the team.
Providing technical support to end users
Troubleshooting application issues
Collaborating with team members to resolve issues
Documenting solutions and best practices
Attitude Test Then one a one
Current CTC is confidential, Expected CTC is negotiable based on role and responsibilities.
Current CTC is confidential information and not disclosed during interviews.
Expected CTC is based on the seniority of the role, responsibilities, market standards, and negotiation.
I am open to discussing the expected CTC based on the specifics of the role and benefits package.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 3 interview rounds.
End to end process refers to the complete process from start to finish, including all steps and stakeholders involved.
Identify all key steps in the process
Map out the flow of activities from beginning to end
Ensure all stakeholders are involved and informed throughout the process
Implement feedback loops to continuously improve the process
I appeared for an interview in Dec 2024.
Transformers architecture refers to the structure and components of transformer models used in natural language processing.
Transformers consist of an encoder and a decoder, each made up of multiple layers of self-attention and feedforward neural networks.
The encoder processes the input sequence, while the decoder generates the output sequence.
Transformer models have achieved state-of-the-art performance in various NLP ...
Different types of rags can be built using various materials and techniques.
Use different materials such as cotton, linen, or microfiber to create different types of rags.
Consider the intended use of the rag - for cleaning, polishing, or absorbing spills.
Experiment with different sizes and shapes of rags for specific tasks.
Try different techniques like cutting, folding, or stitching to customize the rag.
Examples: micro...
I applied via Naukri.com and was interviewed in Jul 2024. There were 3 interview rounds.
Shared mailbox is used for multiple users to access and manage emails, while distribution list is used to send emails to a group of recipients.
Shared mailbox allows multiple users to access and manage emails in a single mailbox.
Distribution list is used to send emails to a group of recipients by using a single email address.
Shared mailbox is typically used for collaboration within a team or department.
Distribution list...
A VPN, or Virtual Private Network, is a secure connection that allows users to access the internet privately and securely.
Creates a secure encrypted connection over a less secure network, such as the internet
Helps protect sensitive data and online privacy
Allows users to access restricted websites or content
Commonly used by remote workers to securely connect to their company's network
Seeking new challenges and growth opportunities in a different environment.
Desire for new challenges and growth opportunities
Interest in expanding skill set and knowledge
Seeking a change in work environment or company culture
I will remain calm, empathize with the user, actively listen to their concerns, and work towards finding a solution.
Remain calm and composed
Empathize with the user's frustration
Actively listen to their concerns
Work towards finding a solution
Offer alternative solutions if necessary
I appeared for an interview in Feb 2025.
DoRA (Dynamic Resource Allocation) optimizes network resource usage based on real-time demand.
DoRA adjusts bandwidth allocation dynamically based on current network traffic.
Example: In a video conference, DoRA can allocate more bandwidth to users with poor connections.
It helps in reducing latency and improving overall user experience.
DoRA can be implemented in various network types, including cellular and Wi-Fi network...
Managed healthcare and insurance operations in a senior analyst role
Analyzed claims data to identify trends and areas for improvement
Collaborated with cross-functional teams to streamline processes and reduce costs
Developed and implemented strategies to enhance efficiency and accuracy in claims processing
Conducted audits to ensure compliance with regulatory requirements
posted on 11 Jan 2025
I appeared for an interview in Apr 2025, where I was asked the following questions.
I applied via Approached by Company and was interviewed in Dec 2024. There were 2 interview rounds.
I have over 5 years of experience in software development with expertise in Java, Python, and SQL.
Proficient in Java, Python, and SQL programming languages
Experienced in developing web applications using frameworks like Spring and Django
Skilled in database design and optimization
Familiar with Agile development methodologies
Strong problem-solving and analytical skills
Overall GD knowledge check
Top trending discussions
The duration of NTT DATA, Inc. interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 111 interview experiences
Difficulty level
Duration
based on 3.2k reviews
Rating in categories
Gurgaon / Gurugram
1-5 Yrs
Not Disclosed
Senior Associate
479
salaries
| ₹3.2 L/yr - ₹7 L/yr |
Software Development Senior Analyst
362
salaries
| ₹8.1 L/yr - ₹14.6 L/yr |
Senior Software Engineer
308
salaries
| ₹10.8 L/yr - ₹25.4 L/yr |
Software Development Analyst
298
salaries
| ₹5.2 L/yr - ₹11.5 L/yr |
Software Development Specialist
290
salaries
| ₹11.5 L/yr - ₹19.4 L/yr |
Accenture
Wipro
Cognizant
Capgemini