i
Quest Global
Filter interviews by
I manage the risk plan by identifying potential risks, assessing their impact and likelihood, developing mitigation strategies, and regularly monitoring and updating the plan.
Identify potential risks by conducting risk assessments and brainstorming sessions
Assess the impact and likelihood of each risk to prioritize them
Develop mitigation strategies to address high-priority risks
Regularly monitor and update the risk pla...
A mitigation plan is a strategy to reduce or eliminate the impact of potential risks or threats.
Identify potential risks or threats
Develop strategies to reduce or eliminate the impact of these risks
Implement the plan and monitor its effectiveness
Regularly review and update the plan as needed
Overloading is a feature in programming that allows a function to have multiple definitions with different parameters.
Overloading is used to provide different implementations of a function based on the number, type, or order of parameters.
It helps in writing cleaner and more readable code.
Examples of overloading include the '+' operator in C++ which can be used for addition of integers, floating-point numbers, and stri...
Polymorphisms are variations in DNA sequence that occur within a population.
Polymorphisms can be single nucleotide changes or larger structural variations.
They can be neutral or have functional consequences.
Examples include SNPs, insertions, deletions, and copy number variations.
Polymorphisms can be used as genetic markers for disease susceptibility or ancestry.
They can also affect drug metabolism and response.
The question is about finding missing and repeating numbers in an array and adding two numbers using linked lists.
To find missing and repeating numbers in an array, use a hash set to track the occurrence of each number.
To add two numbers using linked lists, traverse both lists simultaneously and keep track of carry.
Remember to handle edge cases like different lengths of linked lists or a carry at the end.
I applied via Recruitment Consultant and was interviewed before Sep 2019. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in May 2019. There were 4 interview rounds.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
I applied via Approached by Company and was interviewed in Nov 2017. There were 3 interview rounds.
We can achieve this by sending the data in chunks using pagination.
Implement pagination to limit the amount of data sent per request.
Use a cursor-based pagination approach to efficiently retrieve large amounts of data.
Consider compressing the data to reduce the size of each chunk.
Use HTTP range requests to retrieve specific chunks of data.
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechani...
Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.
Shared variables are used to share data between tasks in a process.
Job shared variables are used to share data between tasks in a specific job.
Shared variables can cause race conditions and should be used with caution.
Job shared variables are useful for passing data between tasks in a job
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
I applied via Naukri.com and was interviewed before Feb 2021. There were 3 interview rounds.
Subject
I applied via Naukri.com and was interviewed before Apr 2020. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed in Oct 2019. There were 3 interview rounds.
based on 2 interviews
Interview experience
based on 64 reviews
Rating in categories
Senior Software Engineer
2.4k
salaries
| ₹4.8 L/yr - ₹20 L/yr |
Senior Engineer
1.8k
salaries
| ₹4.9 L/yr - ₹18 L/yr |
Software Engineer
1.7k
salaries
| ₹2.8 L/yr - ₹9.5 L/yr |
Lead Engineer
1.7k
salaries
| ₹7.7 L/yr - ₹24 L/yr |
Design Engineer
632
salaries
| ₹2 L/yr - ₹8.2 L/yr |
TCS
Infosys
Wipro
HCLTech