i
Filter interviews by
I applied via Naukri.com and was interviewed before Dec 2022. There was 1 interview round.
S3 is a scalable storage service provided by AWS. Key-pairs are used for secure access to instances. EBS volumes are block storage volumes for EC2 instances.
S3 is a scalable storage service provided by AWS
Key-pairs are used for secure access to instances
EBS volumes are block storage volumes for EC2 instances
Top trending discussions
posted on 15 May 2024
posted on 8 Jun 2022
Pattern program and general output questions
posted on 2 Mar 2022
I appeared for an interview in Mar 2022.
An interceptor is a middleware component that intercepts incoming and outgoing HTTP requests in an application.
Interceptors can be used for logging, authentication, error handling, and modifying requests/responses.
In Angular, interceptors can be used to add headers to HTTP requests or handle errors globally.
In Spring framework, interceptors can be used for pre-processing and post-processing of requests.
Interceptors are...
Functional interfaces in Java are interfaces with a single abstract method, used for lambda expressions and method references.
Functional interfaces can be found in the java.util.function package.
Examples of functional interfaces include Consumer, Supplier, Predicate, and Function.
Functional interfaces can be identified by the @FunctionalInterface annotation.
Gateway implementation in Spring Boot allows for routing and filtering of incoming requests to different microservices.
Use Spring Cloud Gateway for implementing gateway in Spring Boot
Define routes and filters in application.properties or application.yml
Example: routes: - id: my_route uri: http://localhost:8080 predicates: - Path=/my_route/**
Example: filters: - AddRequestHeader=X-Request-Foo, Bar
posted on 2 Apr 2022
I applied via Approached by Company and was interviewed before Apr 2021. There were 4 interview rounds.
posted on 2 Sep 2022
I applied via Referral and was interviewed before Sep 2021. There were 5 interview rounds.
Angular is a front-end framework while Node.js is a back-end runtime environment.
Angular is used for building dynamic web applications with a focus on the client-side.
Node.js is used for building server-side applications with JavaScript.
Angular uses TypeScript for building applications while Node.js uses JavaScript.
Angular has a large community and a lot of pre-built components while Node.js has a vast library of modul...
posted on 29 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 5 interview rounds.
JUnit test cases for different scenarios
Identify different scenarios to be tested
Write test cases for each scenario
Ensure test cases cover all possible outcomes
Use assertions to verify expected results
Mock dependencies if necessary
posted on 31 Jan 2022
Instant clone is a feature in VMware Horizon that allows for rapid creation of virtual desktops.
Instant clones are created from a parent VM in a matter of seconds.
They share the same virtual disks as the parent VM, but have their own memory and virtual NICs.
Instant clones use a technology called VMFork to create a copy-on-write clone of the parent VM.
They are ideal for use cases where a large number of identical virtua...
Primary and secondary connections with port numbers are used for communication between client and agent machines.
Primary connection is established using a well-known port number, such as port 80 for HTTP.
Secondary connection is established using a random port number, which is assigned by the client machine.
Primary connection is used for initial communication and negotiation, while secondary connection is used for data ...
Yes, I have experience in deploying Horizon infrastructure.
I have deployed Horizon View infrastructure for virtual desktops.
I have configured and managed Horizon Connection Servers.
I have worked with Horizon Composer for image management.
I have experience in troubleshooting Horizon infrastructure issues.
I have implemented Horizon Workspace for application and data access.
Writable volumes are used to store user or application data separately from the OS and applications.
There are two types of writable volumes: User writable volumes and AppStack writable volumes.
User writable volumes are used to store user-specific data and settings.
AppStack writable volumes are used to store application-specific data and settings.
Writable volumes can be created using VMware App Volumes or Citrix App Lay...
Instant clone creates a copy of the VM while linked clone shares virtual disks with the parent VM.
Instant clone is faster to create than linked clone.
Instant clone uses a copy-on-write mechanism to create a new VM.
Linked clone shares virtual disks with the parent VM and only creates delta disks for changes.
Instant clone is useful for creating many identical VMs quickly.
Linked clone is useful for creating VMs with sligh
posted on 24 May 2021
Entity Framework is an Object-Relational Mapping (ORM) framework that enables developers to work with relational databases using .NET objects.
EF is a tool for creating data access layer in .NET applications
It allows developers to work with databases using C# or VB.NET code instead of SQL
EF supports LINQ queries and provides automatic change tracking
EF can generate database schema from code-first approach
EF can also gen...
Dependency injection is a design pattern used to remove hard-coded dependencies and make code more modular and testable.
Dependencies are injected into a class rather than being hard-coded
This allows for easier testing and swapping of dependencies
Commonly used in frameworks like Spring and Angular
Generics and collections are fundamental concepts in Java programming.
Generics allow for type safety and reusability of code.
Collections are data structures that store and manipulate groups of objects.
Examples of collections include ArrayList, LinkedList, and HashMap.
Generics can be used with collections to ensure type safety.
Collections provide methods for adding, removing, and accessing elements.
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQL injection attacks exploit vulnerabilities in web applications that do not properly validate user input.
Attackers can use SQL injection to steal sensitive data, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized querie...
Security in REST API can be handled by implementing authentication, authorization, encryption, and input validation.
Implement authentication using tokens or OAuth2
Implement authorization by defining roles and permissions
Encrypt sensitive data using SSL/TLS
Validate input data to prevent injection attacks
Implement rate limiting to prevent DDoS attacks
SOAP is a protocol for exchanging structured information in the implementation of web services. REST is an architectural style for building web services.
SOAP stands for Simple Object Access Protocol
SOAP uses XML for message exchange
SOAP requires more bandwidth and processing power than REST
REST uses HTTP for communication
REST is more flexible and scalable than SOAP
RESTful APIs are easier to implement and maintain than
Table data can be retrieved in store procedures using SELECT statement.
Use SELECT statement to retrieve data from table in store procedures.
Specify the table name and columns to retrieve data from.
Use WHERE clause to filter data based on conditions.
Use ORDER BY clause to sort data based on column values.
An index in a table is a data structure that improves the speed of data retrieval operations.
Indexes are created on one or more columns of a table.
They allow for faster searching and sorting of data.
Indexes can be unique or non-unique.
Examples of indexes include primary keys, foreign keys, and clustered indexes.
Adding index on all columns in a table can slow down write operations and increase storage space.
Adding index on all columns can increase the storage space required for the table.
It can also slow down write operations as the index needs to be updated for every write operation.
It may improve read performance for queries that use all columns in the table.
It is generally not recommended to add index on all columns in a ta
A trigger is a piece of code that automatically executes in response to a specific event or change in a system.
Triggers are commonly used in databases to automatically perform actions when certain data is inserted, updated, or deleted.
Triggers can be used to enforce business rules, validate data, or perform complex calculations.
Examples of triggers include sending an email notification when a new record is added to a d...
Stored procedures are precompiled and can return multiple result sets, while functions are not precompiled and can only return a single value.
Stored procedures are used to perform a set of operations and can return multiple result sets.
Functions are used to perform a single operation and can only return a single value.
Stored procedures are precompiled and stored in the database, while functions are compiled at runtime.
...
Action filter is a feature in ASP.NET MVC that allows you to execute code before or after an action method is executed.
Action filters are attributes that can be applied to controller actions or globally to all actions in the application.
They can be used for authentication, caching, logging, exception handling, and more.
Examples of action filters include AuthorizeAttribute, OutputCacheAttribute, HandleErrorAttribute, an
Sequence of filters in software development
Define the problem and requirements
Choose appropriate filters based on the problem
Implement and test the filters in sequence
Refine and optimize the filters as needed
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Softwaretest Engineer
39
salaries
| ₹3 L/yr - ₹4.6 L/yr |
Quality Analyst
5
salaries
| ₹3.3 L/yr - ₹3.9 L/yr |
Software Engineer
4
salaries
| ₹2.4 L/yr - ₹4.2 L/yr |
Manual Test Engineer
4
salaries
| ₹3.6 L/yr - ₹4.2 L/yr |
Devops Engineer
4
salaries
| ₹5.1 L/yr - ₹7 L/yr |
Softenger
Capital Numbers Infotech
JK Tech
DesignTech Systems