Filter interviews by
I applied via Company Website and was interviewed in Mar 2023. There were 2 interview rounds.
HAProxy is a free, open-source load balancer and proxy server software.
HAProxy stands for High Availability Proxy.
It is used to distribute traffic across multiple servers to ensure high availability and scalability.
It supports TCP and HTTP-based applications.
It can perform SSL/TLS termination, content switching, and request routing.
It is highly configurable and can be used in various deployment scenarios.
Examples of co...
REST API is a web-based API that uses HTTP requests to access and manipulate data.
REST stands for Representational State Transfer
It is an architectural style for building web services
It uses HTTP methods like GET, POST, PUT, DELETE to perform operations on resources
Responses are usually in JSON or XML format
Examples include Twitter API, Facebook API, and Google Maps API
TCP for reliable data transfer, UDP for low latency and loss tolerance
TCP is used when reliable data transfer is required, such as in file transfers or email communication
UDP is used when low latency and loss tolerance are more important than reliability, such as in online gaming or video streaming
TCP is connection-oriented while UDP is connectionless
TCP provides flow control and congestion control while UDP does not
TC...
SHA is a cryptographic hash function used for data integrity and security.
SHA stands for Secure Hash Algorithm
It generates a fixed-length hash value from input data
Used for data integrity, digital signatures, and password storage
Examples include SHA-1, SHA-256, SHA-512
Top trending discussions
I was interviewed in Jan 2025.
Online test was hackerrank was was og avg difficulty
Assignment was straightforward which could be done using trie. Did it in 1/6th throughout time for given queries then mentioned allowed still no reply. Keep on asking engineering manager and hr to which they replied not upto the mark.
I was interviewed before Mar 2021.
To check if a number is a power of 2, we can use bitwise operations.
A power of 2 has only one bit set to 1, so we can use the bitwise AND operator to check if the number is a power of 2.
If n is a power of 2, then n & (n-1) will be 0.
For example, 8 (1000 in binary) is a power of 2, and 8 & 7 (0111 in binary) is 0.
Sort a stack without using another data structure
Use recursion to pop the top element and insert it at the bottom of the remaining stack
Repeat until the stack is sorted in ascending order
Time complexity: O(n^2), space complexity: O(n) due to recursion
Check if array has continuous increasing and decreasing values
Loop through the array and check if each element is greater than the previous one
Once you find the maximum element, check if the remaining elements are in decreasing order
If yes, return true else false
Design a cricinfo (LLD)
Identify the entities: players, teams, matches, scorecards, tournaments, etc.
Define the relationships between entities
Create a database schema to store the data
Implement APIs to fetch and update data
Design a UI to display the information
Consider scalability and performance
Ensure data security and privacy
posted on 9 Aug 2023
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 5 interview rounds.
Coding string related programming
Hacker rank data structure linked list
Hacker rank data structure trees
posted on 5 Mar 2025
Was asked to understand a project in python and translate it to NodeJS. This had to be done during the interview with you explaining you thought process through every step.
I applied via Referral and was interviewed before Jun 2023. There were 2 interview rounds.
One hour Leet code medium question
Reverse a linked list using recursion
Create a recursive function that takes the head of the linked list as input
Base case: if the head is null or the next node is null, return the head
Recursively call the function with the next node as input
Set the next node's next pointer to the current node
Set the current node's next pointer to null
Return the new head of the reversed linked list
To find max number in linked list using stack.
Create an empty stack.
Traverse the linked list and push each element onto the stack.
Pop elements from the stack and compare with max value.
Return the max value.
I applied via LinkedIn and was interviewed before Feb 2022. There were 5 interview rounds.
Hacker rank codinv problems level medium
I applied via Naukri.com and was interviewed before Apr 2022. There were 3 interview rounds.
Aptitude relates questions... It was modratley difficult
Reverse a linked list using recursion
Create a recursive function that takes the head of the linked list as input
Base case: if the head is null or the next node is null, return the head
Recursively call the function with the next node as input
Set the next node's next pointer to the current node
Set the current node's next pointer to null
Return the new head of the reversed linked list
Mutex is a locking mechanism to ensure exclusive access to a shared resource, while semaphore is a signaling mechanism to control access to a shared resource.
Mutex allows only one thread to access the shared resource at a time, while semaphore can allow multiple threads to access the shared resource simultaneously.
Mutex is binary, meaning it has only two states - locked and unlocked, while semaphore can have multiple s...
I applied via Referral and was interviewed before Oct 2022. There were 5 interview rounds.
Checked general aptitude
Multiple coding rounds each tougher than the last
based on 1 interview
Interview experience
Senior Staff Engineer
48
salaries
| ₹0 L/yr - ₹0 L/yr |
TAC Engineer
31
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
30
salaries
| ₹0 L/yr - ₹0 L/yr |
Principal Engineer
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Staff Engineer
27
salaries
| ₹0 L/yr - ₹0 L/yr |
Check Point Software Technologies
Fortinet
FireEye
Gen