i
NTT Data
Filter interviews by
Top trending discussions
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Verification is the process of evaluating whether a system or component meets specified requirements and criteria.
Verification involves checking if the system is being built right.
It focuses on ensuring that the software is being developed according to the requirements.
Examples of verification activities include code reviews, walkthroughs, and inspections.
posted on 1 Jul 2024
At my previous company, we used a variety of technologies including AWS, Docker, Kubernetes, Jenkins, and Ansible.
AWS (Amazon Web Services) for cloud computing services
Docker for containerization of applications
Kubernetes for container orchestration
Jenkins for continuous integration and continuous deployment
Ansible for automation of IT tasks
posted on 10 Mar 2024
I applied via Hirepro and was interviewed in Feb 2024. There were 3 interview rounds.
1)Binary searching
2) cloud technology
posted on 16 Mar 2023
Aptitude TesT - logically things, IQ level
Given one topic. Need to discussion. And Debet
I applied via Job Fair and was interviewed before May 2023. There were 3 interview rounds.
Coding test was a bit tough. The test included objective questions on Java, Python3, SQL, C++. It was a bit lengthy exam than usual.
I applied via Naukri.com and was interviewed in May 2022. There were 2 interview rounds.
posted on 13 Mar 2024
I applied via Referral and was interviewed before Mar 2023. There were 2 interview rounds.
Data cleaning is the process of identifying and correcting errors or inconsistencies in data to improve its quality.
Removing duplicate entries
Correcting spelling errors
Handling missing values
Standardizing data formats
Identifying and removing outliers
I applied via Referral and was interviewed in Apr 2021. There was 1 interview round.
Use Group Policy to deploy printer to multiple computers simultaneously.
Create a shared printer on the network
Create a Group Policy Object (GPO) in Active Directory
Under Computer Configuration, go to Policies > Windows Settings > Deployed Printers
Add the shared printer and configure any necessary settings
Link the GPO to the appropriate Organizational Unit (OU) containing the computers
Restart the computers or run gpupda
To install an OS in a server, you need to boot from the installation media and follow the prompts to complete the installation.
Insert the installation media (CD, DVD, USB) into the server
Boot the server from the installation media
Follow the prompts to select language, time zone, and partition the hard drive
Enter the product key and create a user account
Wait for the installation to complete and reboot the server
I applied via Naukri.com and was interviewed in Aug 2020. There was 1 interview round.
Anypoint Runtime Manager is a cloud-based tool for managing and monitoring Mule applications.
It provides real-time visibility into application performance and health.
It allows for easy deployment and scaling of applications.
It offers centralized logging and alerting for quick issue resolution.
It integrates with other Anypoint Platform tools for end-to-end application management.
Example: Anypoint Runtime Manager can be ...
Runtime fabric is a platform that enables the deployment and management of distributed applications.
It provides a unified view of the distributed application
It manages the deployment and scaling of application components
It enables communication between application components across different environments
Examples include MuleSoft's Anypoint Runtime Fabric and Microsoft's Azure Service Fabric
Mule 4 is a major upgrade from Mule 3 with improved performance, simplified development, and enhanced security features.
Mule 4 has a new simplified syntax for dataweave
Mule 4 has a new error handling mechanism
Mule 4 has improved performance with reduced memory usage
Mule 4 has enhanced security features with TLS 1.2 support
Mule 4 has a new deployment model with standalone and cluster modes
Secure properties in Mule are used to store sensitive information such as passwords and API keys.
Secure properties are encrypted and can only be accessed by authorized users.
They are commonly used to store credentials for external systems such as databases and APIs.
Secure properties can be defined in a separate file or in the Mule configuration file.
They can be accessed in Mule flows using the secure:: prefix.
Examples ...
Some of the top questions asked at the NTT Data Senior System Administrator Associate interview for experienced candidates -
Network Engineer
290
salaries
| ₹1.8 L/yr - ₹9.2 L/yr |
Senior Network Engineer
107
salaries
| ₹3.7 L/yr - ₹15.2 L/yr |
Network Engineer L1
52
salaries
| ₹2 L/yr - ₹7 L/yr |
Technical Specialist
48
salaries
| ₹9.5 L/yr - ₹30 L/yr |
Softwaretest Engineer
39
salaries
| ₹4.8 L/yr - ₹9.2 L/yr |
Tata Communications
Bharti Airtel
Reliance Communications
Vodafone Idea