NTT
40+ Cipla Interview Questions and Answers
Q1. Why do you want to join NTT? What is the function of Pre-sales? Which project management tools used? And lots of other project management related to the point questions and some behaviour questions were asked.
Q2. What are the model of software engineerwat
The models of software engineering refer to different approaches or methodologies used in software development.
Waterfall model
Agile model
Iterative model
Spiral model
V-model
Q3. What is DATA structure
A data structure is a way of organizing and storing data in a computer so that it can be accessed and manipulated efficiently.
Data structures provide a means to manage and organize data in a logical and efficient manner.
They define the relationship between the data, allowing for easy retrieval and modification.
Examples of data structures include arrays, linked lists, stacks, queues, trees, and graphs.
Q4. Definition of java and benifit of java
Java is a popular programming language known for its platform independence and extensive libraries.
Java is an object-oriented language that allows developers to write code once and run it on any platform.
It provides a robust and secure environment for developing and executing applications.
Java has a vast collection of libraries and frameworks that simplify development and enhance productivity.
It supports multithreading, allowing concurrent execution of tasks.
Java is widely us...read more
Q5. How to allow or disallow a networking port in Azure server
To allow or disallow a networking port in Azure server, you can use Network Security Groups (NSG) to control inbound and outbound traffic.
Create a Network Security Group (NSG) in Azure portal
Associate the NSG with the Azure server or subnet
Define inbound and outbound security rules to allow or disallow specific ports
Priority of rules determines which rule takes precedence
Use Azure PowerShell or Azure CLI to manage NSG rules
Q6. What is software engineer (se)
A software engineer is a professional who designs, develops, and maintains software applications.
Software engineers use programming languages and tools to create software solutions.
They analyze user requirements and design software architecture.
Software engineers write code, test and debug software, and ensure its functionality.
They collaborate with other team members and follow software development best practices.
Examples of software engineers include backend developers, fro...read more
Q7. What is operating system
An operating system is a software that manages computer hardware and software resources and provides common services for computer programs.
Manages computer hardware and software resources
Provides common services for computer programs
Controls and coordinates computer operations
Acts as an intermediary between users and computer hardware
Examples: Windows, macOS, Linux, Android, iOS
Q8. Explain resk management system
A risk management system is a software tool or platform that helps organizations identify, assess, and mitigate risks.
A risk management system helps organizations identify potential risks and their impact on business operations.
It assesses the likelihood of risks occurring and the severity of their impact.
The system provides tools for documenting and tracking risks, assigning responsibilities, and implementing mitigation strategies.
It may include features like risk assessment...read more
Q9. Characters of java script
JavaScript characters include letters, numbers, symbols, and special characters.
JavaScript characters can be used to create strings, numbers, and perform operations.
Examples of JavaScript characters include 'a', '1', '$', and '&'.
Q10. What are FSMO roles and state the functions
FSMO roles are Flexible Single Master Operations roles in Active Directory that perform specific functions.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master - Controls all updates and modifications to the schema.
Domain Naming Master - Manages the addition or removal of domains in the forest.
RID Master - Allocates unique Relative Identifier (RID) pools to domain controllers.
PDC Emulator - Provides bac...read more
Q11. Explain bgp , brief introduction of mpls , basic router command, etc
BGP is a routing protocol used to exchange routing information between different networks. MPLS is a protocol used for efficient data transfer. Basic router commands include show ip route, show interfaces, etc.
BGP stands for Border Gateway Protocol and is used to exchange routing information between different networks.
MPLS stands for Multiprotocol Label Switching and is used for efficient data transfer.
Basic router commands include show ip route, show interfaces, show running...read more
Q12. defiNe software testing
Software testing is the process of evaluating a software system to identify defects or errors.
Software testing is essential to ensure the quality and reliability of software.
It involves executing the software with the intention of finding bugs or issues.
Testing can be done manually or using automated tools.
Different types of testing include unit testing, integration testing, system testing, and acceptance testing.
Examples of software testing tools include Selenium, JUnit, and...read more
Q13. Exception handling in Java. How do you use it in selenium?
Q14. What is network and basic things which u will use
A network is a group of interconnected devices that communicate with each other to share resources and information.
Basic things used in networking include routers, switches, hubs, and cables.
Network protocols such as TCP/IP, DNS, and DHCP are also essential.
Network security measures like firewalls and VPNs are important to protect against unauthorized access.
Monitoring tools like Wireshark and Nagios are used to troubleshoot network issues.
Networking concepts like subnetting,...read more
Q15. State the process to build a server in Azure
To build a server in Azure, you need to follow a process involving creating a virtual machine, configuring settings, and deploying the server.
Create a virtual machine in the Azure portal
Choose the appropriate size and configuration for the server
Configure networking settings and security options
Deploy the virtual machine and install necessary software
Monitor the server performance and manage resources
Q16. What is the function of domain
A domain is a group of network resources and devices that are managed by a centralized authority.
Domains help to organize and manage network resources such as computers, users, and printers.
They provide a centralized authentication and authorization mechanism for users to access resources.
Domains can be used to apply group policies and security settings across multiple devices.
Examples of domain controllers include Active Directory in Windows Server environments.
Q17. what is regression testing and performance testing
Regression testing is retesting of software to ensure new code changes do not adversely affect existing functionality. Performance testing is testing to assess the speed, responsiveness, and stability of a system under a particular workload.
Regression testing ensures that new code changes do not introduce new bugs or issues in existing functionality.
Performance testing evaluates the speed, responsiveness, and stability of a system under specific workloads.
Regression testing i...read more
Q18. Tell me about Yourself Tell me about NTT What is networking What is router 7layer of OSI model
I am a network enthusiast with a passion for learning and problem-solving. NTT is a global technology services company. Networking involves connecting devices to share information. A router is a device that forwards data packets between computer networks. The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
NTT is a leading global technology services company providing networking solutions.
Networki...read more
Q19. What AWS tools are you familiar with?
I am familiar with AWS tools such as AWS CodePipeline, AWS CodeBuild, AWS CodeDeploy, AWS CloudFormation, AWS Config, and AWS Security Hub.
AWS CodePipeline
AWS CodeBuild
AWS CodeDeploy
AWS CloudFormation
AWS Config
AWS Security Hub
Q20. Explain detailed working of UPS, DG, Transformer.
UPS, DG, and Transformer are electrical devices used for power backup and voltage regulation.
UPS (Uninterruptible Power Supply) provides backup power during power outages and voltage fluctuations.
DG (Diesel Generator) is used as a backup power source when the main power supply fails.
Transformer is used to step up or step down the voltage of an alternating current (AC) power supply.
UPS and DG are commonly used in data centers, hospitals, and other critical facilities to ensure...read more
Q21. What is APD situation
APD situation refers to All Paths Down situation in VMware environments.
APD situation occurs when a storage device becomes inaccessible to the ESXi host.
This can lead to data corruption or loss if not handled properly.
Common causes of APD include storage array failures, network issues, or misconfigurations.
To handle APD situations, VMware recommends setting up proper monitoring and alerting systems.
It is important to have a solid disaster recovery plan in place to mitigate th...read more
Q22. How can you convince a customer?
By understanding their needs, building trust, providing solutions, and offering value.
Listen actively to understand their needs and concerns.
Build trust by being knowledgeable, reliable, and transparent.
Provide tailored solutions that address their specific challenges.
Demonstrate the value of your product or service through case studies or testimonials.
Offer exceptional customer service to ensure satisfaction and loyalty.
Q23. What is group policy
Group Policy is a feature in Windows Server that allows administrators to manage user and computer settings centrally.
Group Policy allows administrators to set rules and configurations for users and computers in a Windows Server environment
It helps in enforcing security settings, software installation policies, and other configurations across a network
Group Policy settings are applied to users and computers based on their membership in Active Directory groups
Administrators ca...read more
Q24. Write java code to get the Fibonacci series
Q25. Share experience Arcsight & Splunk tool
Arcsight & Splunk are SIEM tools used for log management and security analytics.
Arcsight is a legacy SIEM tool used for log management and security analytics.
Splunk is a modern SIEM tool used for log management, security analytics, and data visualization.
Both tools are used to collect, analyze, and correlate log data from various sources to detect security threats and incidents.
Arcsight has a complex architecture and requires more resources to manage compared to Splunk.
Splunk...read more
Q26. what is the defect life cycle
Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing software defects.
Defect identification: Defects are identified through testing or user feedback.
Defect reporting: Defects are reported in a defect tracking system with details like steps to reproduce, severity, and priority.
Defect fixing: Developers analyze and fix the reported defects.
Defect retesting: Testers verify that the fixed defects are resolved.
Defect closing: Once the defects ...read more
Q27. why we use Ping command
Ping command is used to test the reachability of a host on an IP network.
Ping command sends ICMP echo request packets to the target host
It waits for ICMP echo reply packets to confirm the host's availability
Ping command helps in troubleshooting network connectivity issues
It can also be used to measure round-trip time between the source and target host
Q28. What is LDAP server
LDAP server stands for Lightweight Directory Access Protocol server, used for accessing and managing directory information.
LDAP server is a protocol used for accessing and managing directory information.
It allows users to query and update information in a directory service.
Commonly used for authentication and authorization purposes in network environments.
Examples of LDAP servers include Microsoft Active Directory and OpenLDAP.
Q29. difference between ipv4vand ipv6
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv4 supports around 4.3 billion unique addresses while IPv6 supports an astronomical number of unique addresses.
IPv4 has a header length of 20 bytes while IPv6 has a fixed header length of 40 bytes.
IPv4 uses ARP (Address Resolution Protocol) for mappin...read more
Q30. Forecasting techniques
Forecasting techniques involve using historical data and statistical models to predict future demand.
Time series analysis
Regression analysis
Exponential smoothing
Moving averages
Seasonal decomposition
Judgmental forecasting
Collaborative forecasting
Q31. Explain working of HVAC system.
HVAC system regulates temperature, humidity and air quality in a building.
HVAC stands for Heating, Ventilation and Air Conditioning.
It uses a network of ducts and vents to circulate air throughout the building.
The system can be centralized or decentralized.
It can be controlled by a thermostat or a building automation system.
Examples of HVAC equipment include air handlers, chillers, boilers, and heat pumps.
Q32. Do you program in Python
Yes, I am proficient in Python programming.
Yes, I have experience programming in Python for various projects.
I have used Python for automation, scripting, web development, and data analysis.
Familiar with popular Python libraries and frameworks like Django, Flask, and NumPy.
Q33. What are the layers of tcp
TCP has four layers: Application, Transport, Internet, and Network Interface.
Application layer: Responsible for interacting with the user and providing network services.
Transport layer: Manages end-to-end communication and ensures data delivery.
Internet layer: Handles routing of data packets between networks.
Network Interface layer: Deals with the physical connection to the network.
Q34. What is windows patching
Windows patching is the process of applying updates, fixes, and security patches to the Windows operating system.
Windows patching helps to keep the operating system secure and up-to-date.
Patches can include bug fixes, security updates, and new features.
Regular patching is important to protect against vulnerabilities and cyber attacks.
Examples of patching tools include Windows Update, WSUS (Windows Server Update Services), and SCCM (System Center Configuration Manager).
Q35. what is quality
Quality is the measure of excellence or superiority in a product, service, or process.
Quality refers to meeting or exceeding customer expectations.
It involves consistent performance and reliability.
Quality can be measured through various metrics such as defect rates, customer satisfaction, and adherence to standards.
Examples of quality include a durable and well-designed product, efficient and error-free processes, and exceptional customer service.
Q36. what is 7 qc tools
The 7 QC tools are a set of problem-solving techniques used in quality management.
The 7 QC tools are: Check Sheet, Pareto Chart, Cause and Effect Diagram, Histogram, Scatter Diagram, Control Chart, and Flowchart.
These tools help identify, analyze, and solve quality-related issues in a systematic manner.
For example, a Check Sheet can be used to collect data on defects, while a Pareto Chart helps prioritize the most significant problems.
The Cause and Effect Diagram (also known ...read more
Q37. what is kaizen in
Kaizen is a Japanese business philosophy that focuses on continuous improvement in all aspects of an organization.
Kaizen emphasizes small, incremental changes over time rather than large, drastic changes.
It involves all employees in the organization and encourages them to identify and implement improvements.
Kaizen aims to eliminate waste, improve efficiency, and enhance quality.
Examples of kaizen practices include 5S methodology, value stream mapping, and daily team huddles.
K...read more
Q38. Explain STLC in SOftware Testing
Q39. Explain the StaleElementException
Q40. What is Hard assert
Hard assert is a type of assertion in test automation that stops the test execution immediately when a failure occurs.
Hard assert is used to validate the expected outcome of a test case
If the assertion fails, the test execution is halted and marked as failed
It is commonly used in automated test scripts to ensure the correctness of the application under test
Q41. What is soft assert
Soft assert is a way to continue the execution of a test case even after an assertion failure.
Soft assert does not stop the execution of the test case when an assertion fails.
It is useful when you want to log the failure but continue with the remaining test steps.
Soft assert is commonly used in test automation frameworks like TestNG in Java.
Q42. What is ip address
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address
It is used to identify and locate devices on a network
There are two types of IP addresses - IPv4 and IPv6
Example of IPv4 address: 192.168.1.1
Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Q43. What is DHCP ?
DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol used to automatically assign IP addresses to devices on a network.
Automatically assigns IP addresses to devices on a network
Helps in managing and organizing network resources efficiently
Reduces the need for manual configuration of IP addresses
Ensures that each device on the network has a unique IP address
DHCP server leases IP addresses to devices for a specific period of time
Q44. What is LAN ?
LAN stands for Local Area Network, a network that connects computers and devices within a limited area such as a home, office, or building.
LAN is a network that covers a small geographic area, typically within a single building or campus.
It allows connected devices to communicate with each other and share resources such as files, printers, and internet access.
LANs are commonly used in homes, offices, schools, and other small-scale environments.
Ethernet and Wi-Fi are common te...read more
Q45. Reason for switching
Seeking new challenges and growth opportunities in a larger organization.
Desire for career advancement
Opportunity to work with a larger team
Seeking new challenges and learning opportunities
Q46. write a x path
An x path is a way to navigate through elements in XML or HTML documents.
Start with a forward slash (/) to indicate the root element
Use element names to navigate through the document
Use square brackets to specify conditions for selecting elements
Use @ symbol to select attributes of elements
More about working at NTT
Top HR Questions asked in Cipla
Interview Process at Cipla
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month