i
NTT
Data
Filter interviews by
Lease duration defines how long an IP address is assigned, while reservation ensures a specific IP is always assigned to a device.
Lease Duration: The time period an IP address is assigned to a device before it must be renewed.
Example: A lease duration of 24 hours means the device must renew its IP after that period.
Reservation: A fixed IP address assigned to a specific device based on its MAC address.
Example: A pr...
Active Directory FSMO roles are specialized tasks assigned to domain controllers for efficient directory management.
There are five FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
The Schema Master manages changes to the Active Directory schema, ensuring consistency across the forest.
The Domain Naming Master controls the addition and removal of domains in the for...
Phasing a problem involves identifying, analyzing, and addressing issues systematically to find effective solutions.
Identify the problem: Clearly define what the issue is, e.g., a software bug causing crashes.
Gather data: Collect relevant information, such as error logs and user feedback.
Analyze the root cause: Use techniques like the 5 Whys or Fishbone diagram to understand underlying issues.
Develop a plan: Creat...
A service program in AS400 is a collection of reusable procedures and functions that can be called by other programs.
Service programs encapsulate business logic, making it reusable across multiple applications.
They allow for better modularization of code, improving maintainability.
Example: A service program could contain common functions like date calculations or data validation.
Service programs can be versioned, ...
What people are saying about NTT Data
Chain retrieves a record based on a key, while Read fetches the next record in a file sequentially.
Chain is used to access a specific record by its key, e.g., 'Chain (KeyField) MyFile'.
Read retrieves the next record in the file, e.g., 'Read MyFile'.
Chain can skip to a specific record, while Read processes records in order.
Chain can be used with keyed files, whereas Read is typically used with sequential files.
Exam...
I am drawn to data entry for its precision, organization, and the opportunity to contribute to efficient data management.
I enjoy working with data and find satisfaction in ensuring accuracy and detail in my work.
Data entry allows me to utilize my strong typing skills and attention to detail, which I have honed through previous experiences.
I appreciate the structured nature of data entry tasks, as they provide a cl...
I approach repetitive tasks with organization, focus, and a positive mindset to maintain efficiency and accuracy.
I create a structured workflow to streamline the process, ensuring each step is clear and efficient.
I utilize tools like spreadsheets or databases to automate data entry, reducing manual effort.
I take regular breaks to maintain focus and prevent fatigue, which helps in sustaining productivity.
I set smal...
I have a typing speed of 70 words per minute with 98% accuracy, ensuring efficient and precise data entry.
Consistently achieve 70 WPM during practice sessions.
Maintain an accuracy rate of 98% by double-checking entries.
Utilize typing software to improve speed and accuracy.
Experience in data entry roles where speed and precision are crucial.
OOPs (Object-Oriented Programming) is a programming paradigm based on objects and classes, promoting code reusability and organization.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class using properties and methods of an existing class (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present ...
A stack is a linear data structure that follows the Last In First Out (LIFO) principle for managing data.
Elements are added and removed from the top of the stack.
Common operations include push (adding) and pop (removing) elements.
Example: A stack of plates where you can only add or remove the top plate.
Used in function call management in programming languages.
Can be implemented using arrays or linked lists.
As a Senior Associate, my job responsibility was to oversee project management, client communication, and team coordination.
Managed project timelines and deliverables
Communicated with clients to ensure satisfaction and address any issues
Coordinated team members to ensure tasks were completed efficiently
Provided guidance and support to junior associates
Analyzed data and prepared reports for senior management
My previous job experience involved managing large-scale construction projects for commercial buildings.
Managed construction projects from start to finish
Coordinated with architects, engineers, contractors, and clients
Ensured projects were completed on time and within budget
Handled permits, inspections, and compliance with building codes
Examples: Office building renovation, retail store construction
Programming languages and tools like C++, Java, Python, and SQL are crucial for software development, data analysis, and machine learning.
C++: Used for system/software development and performance-critical applications like game engines.
C: Foundation for many languages; ideal for embedded systems and low-level programming.
Java: Widely used in enterprise applications, Android development, and large-scale systems.
Python: ...
Computer networks are crucial for communication, data sharing, and resource management in various sectors.
Facilitates communication: Enables instant messaging, video conferencing, and emails, enhancing collaboration.
Data sharing: Allows multiple users to access and share files, improving efficiency in workplaces.
Resource management: Centralizes resources like printers and servers, reducing costs and improving accessibi...
The aptitude test were of logical reasoning, mathematics etc.
I appeared for an interview in Jan 2025.
Interfaces allow multiple inheritance, abstract classes do not.
Interfaces can be implemented by multiple classes, allowing for multiple inheritance.
Abstract classes can only be extended by one class, limiting inheritance.
Interfaces promote loose coupling and flexibility in design.
Abstract classes provide a common base implementation for subclasses.
Program to find occurrences of a specified character in a string, excluding spaces and special symbols.
Iterate through each character in the string
Check if the character is the specified character and not a space or special symbol
Store the occurrences in an array of strings
Autowired annotation in Spring framework injects dependencies automatically
Autowired annotation is used for automatic dependency injection in Spring framework
It eliminates the need for explicit bean wiring in XML configuration files
Autowired annotation can be used on fields, constructors, or methods
It searches for a bean of the same type and injects it into the annotated field
Spring Boot uses @Primary annotation to determine which data source to use when multiple are available.
Spring Boot uses the @Primary annotation to specify the primary bean to be used when multiple beans of the same type are present.
If no specific profile is defined, Spring Boot will use the bean marked with @Primary as the default data source.
Developers can also use @Qualifier annotation to specify which bean to use if...
Qualifier annotation is used in Spring framework to distinguish between beans of the same type.
Qualifier annotation is used in Spring framework to resolve ambiguity when multiple beans of the same type are present.
It is used in conjunction with Autowired annotation to specify which bean should be injected.
For example, @Qualifier("myBean") can be used to specify a particular bean named 'myBean' to be injected.
I appeared for an interview in Jun 2025, where I was asked the following questions.
Yes, I have reviewed my resume and am well-prepared to discuss my skills and experiences in detail.
I have extensive experience in system integration, particularly with cloud-based solutions, such as AWS and Azure.
My resume highlights my proficiency in scripting languages like Python and PowerShell, which I have used to automate deployment processes.
I have successfully led integration projects that improved system effic...
The role involves integrating complex systems, ensuring seamless communication and functionality across various platforms.
Collaborate with cross-functional teams to design and implement integration solutions, such as connecting CRM systems with ERP software.
Analyze system requirements and specifications to ensure compatibility and performance, like assessing data flow between legacy systems and new applications.
Trouble...
I appeared for an interview in Jan 2025.
Managed a team to implement a new claims processing system
Led a team of 10 employees to successfully implement a new claims processing system
Coordinated with IT department to ensure system compatibility and functionality
Provided training and support to staff during system transition
Monitored project progress and addressed any issues that arose
Completed project on time and within budget
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There was 1 interview round.
I have 5 years of experience as a Talent Acquisition Specialist in a Fortune 500 company.
Led recruitment efforts for various departments, including IT, finance, and marketing.
Implemented innovative sourcing strategies to attract top talent.
Conducted interviews, negotiated offers, and onboarded new hires.
Collaborated with hiring managers to understand their needs and provide tailored recruitment solutions.
Talent Acquisition Specialists are responsible for sourcing, attracting, and hiring top talent for an organization.
Developing and implementing recruitment strategies
Sourcing candidates through various channels such as job boards, social media, and networking events
Screening resumes and conducting interviews
Collaborating with hiring managers to understand staffing needs
Negotiating job offers and managing the onboarding ...
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A SOC analyst monitors, detects, and responds to security incidents to protect an organization's information systems.
Monitor security alerts and logs to identify potential threats.
Analyze security incidents to determine their impact and origin, e.g., investigating a phishing attack.
Respond to security breaches by implementing containment and remediation strategies.
Collaborate with IT teams to enhance security measures ...
I bring a strong analytical mindset, relevant skills, and a passion for cybersecurity to excel as a SOC Analyst 1.
Proficient in security monitoring tools like SIEM, enabling quick identification of threats.
Completed a cybersecurity certification, demonstrating my commitment to the field.
Experience in incident response during an internship, where I helped mitigate a simulated attack.
Strong communication skills, allowing...
Creating an EC2 instance involves several steps such as selecting an AMI, choosing an instance type, configuring instance details, adding storage, configuring security groups, and launching the instance.
Select an AMI (Amazon Machine Image) - Choose the operating system and software that will be pre-installed on the instance.
Choose an instance type - Select the hardware configuration (CPU, memory, storage, etc.) for the...
I applied via Naukri.com and was interviewed in Sep 2024. There were 3 interview rounds.
Data analysis is crucial for making informed decisions, identifying trends, and solving complex problems.
Helps in making informed decisions based on data-driven insights
Identifies trends and patterns that can lead to strategic business decisions
Aids in solving complex problems by analyzing data to find root causes
Improves efficiency and effectiveness of processes through data-driven optimizations
To become a data analyst, one should focus on acquiring relevant education, gaining experience with data analysis tools, and developing strong analytical and problem-solving skills.
Obtain a degree in a related field such as statistics, mathematics, computer science, or data science.
Gain experience with data analysis tools such as SQL, Python, R, and Excel.
Develop strong analytical and problem-solving skills by working ...
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There was 1 interview round.
Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).
Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.
Logs can be viewed and analyzed using Azure Monitor Logs queries.
Logs can also be integrated with other Azure services for monitoring and alerting purposes.
Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.
Use the ORDER BY clause to sort the data in descending order.
Use the OFFSET clause to skip the first 4 rows.
Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.
Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.
Create a class that implements the IMiddleware interface
Implement the InvokeAsync method in the middleware class to handle the request processing logic
Add the custom middleware to the application pipeline in the Configure method of the Startup class
Authentication verifies the identity of a user, while authorization determines what resources a user can access.
Authentication confirms the identity of a user through credentials like username and password.
Authorization determines the permissions and access levels of a user based on their authenticated identity.
In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.
Authorizati...
Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.
Session data is stored on the server side by default in ASP.NET Core
Session data can be accessed and manipulated using the HttpContext.Session property
Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server
Session data is typically used to...
Some of the top questions asked at the NTT Data interview -
The duration of NTT Data interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 528 interview experiences
Difficulty level
Duration
based on 4.3k reviews
Rating in categories
Software Engineer
1.2k
salaries
| ₹5.9 L/yr - ₹24 L/yr |
Senior Associate
844
salaries
| ₹3.5 L/yr - ₹7 L/yr |
Network Engineer
754
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Senior Software Engineer
750
salaries
| ₹12.2 L/yr - ₹26.5 L/yr |
Software Developer
689
salaries
| ₹5.1 L/yr - ₹27.2 L/yr |
Accenture
Wipro
Cognizant
Capgemini