Filter interviews by
I applied via Approached by Company and was interviewed in Jun 2022. There were 4 interview rounds.
I applied via Referral and was interviewed before Mar 2023. There were 2 interview rounds.
I applied via Referral and was interviewed in Jul 2021. There were 3 interview rounds.
Yes, it is possible to work with multiple threads in core data.
Use NSManagedObjectContextConcurrencyType to specify concurrency type
Create a separate managed object context for each thread
Use performBlock or performBlockAndWait to execute tasks on the correct context
Merge changes from other contexts using NSManagedObjectContextDidSaveNotification
Memory leaks occur when a program fails to release memory that is no longer needed.
Memory leaks can happen due to programming errors such as not freeing allocated memory
Leaked memory can accumulate over time and cause the program to crash or slow down
Memory leaks can be detected using tools such as valgrind or by analyzing the program's behavior
Examples of memory leaks include forgetting to free memory allocated for a ...
The optimal algorithm for finding common elements in two arrays is using a hash table.
Create a hash table for one of the arrays.
Iterate through the other array and check if each element exists in the hash table.
If it does, add it to the result array.
Time complexity is O(n) and space complexity is O(n).
Top trending discussions
I was interviewed in Dec 2024.
I was interviewed in Oct 2024.
To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.
Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.
Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.
Ensure that the IPsec tunnel is properly configured and tested for secure d...
To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.
Check the IPsec configuration on both ends to ensure they match
Verify that the tunnel endpoints can reach each other
Monitor logs on both devices for any error messages related to the tunnel
Use packet capture tools like Wireshark to analyze traffic going through the tunnel
SSL VPN allows remote users to securely access the network from any location.
SSL VPN uses encryption to secure the connection between the remote user and the network.
It authenticates users before granting access to resources.
SSL VPN can be set up using a web browser or a client application.
It provides a secure way for remote employees to access company resources.
SSL VPN can be configured to restrict access based on use
Configuring IPsec tunnel for 3 different locations and explaining traffic flow
Configure IPsec tunnel on routers/firewalls at each location
Set up IPsec policies for encryption and authentication
Define IPsec tunnel endpoints and establish secure communication
Ensure proper routing between locations for traffic flow
Monitor and troubleshoot the IPsec tunnel for any issues
To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.
Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.
Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...
To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.
Check the IPsec configurations on both ends to ensure they match
Verify network connectivity between the two locations
Check firewall and security policies to ensure they are not blocking the IPsec traffic
Review logs on both ends for any error messages or indications of the issue
Restart the IPsec serv
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Ai interview backend microservices core java
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based applications.
Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.
It allows for easy setup of Spring projects with minimal configuration.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.
It provides product...
Serialisation is the process of converting an object into a stream of bytes to store or transmit data.
Serialisation is used to save the state of an object and recreate it when needed.
It allows objects to be converted into a format that can be easily stored or transmitted.
Common examples include JSON, XML, and binary serialisation.
Serialisation is important for data persistence and inter-process communication.
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Binary search is a fast search algorithm that finds the position of a target value within a sorted array.
Ensure the array is sorted before performing binary search.
Compare the target value with the middle element of the array.
If the target value is less than the middle element, search the left half of the array. If greater, search the right half.
Repeat the process until the target value is found or the subarray is empt
Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them, and then merges them back together.
Divide the array into two halves recursively
Sort each half separately
Merge the sorted halves back together
I was interviewed in Sep 2024.
Hackerrank coding & techinical interview test
based on 1 interview
Interview experience
based on 29 reviews
Rating in categories
Senior Engineer
197
salaries
| ₹6.2 L/yr - ₹16.4 L/yr |
Senior Software Engineer
122
salaries
| ₹6.2 L/yr - ₹17 L/yr |
Lead Engineer
110
salaries
| ₹10.4 L/yr - ₹24 L/yr |
Software Engineer
106
salaries
| ₹4 L/yr - ₹12.1 L/yr |
Engineer
83
salaries
| ₹4.7 L/yr - ₹11 L/yr |
TCS
Infosys
Wipro
HCLTech