Quest Global
Geodis Overseas Interview Questions and Answers
Q1. How would you explain the importance of addressing vulnerabilities to a developer who is reluctant to implement patches?
Addressing vulnerabilities is crucial for software security, protecting users and maintaining trust in the application.
Vulnerabilities can lead to data breaches; for example, the Equifax breach exposed sensitive data of 147 million people.
Ignoring patches can result in exploitations; the WannaCry ransomware attack exploited unpatched Windows systems globally.
Addressing vulnerabilities enhances the application's reputation; companies like Microsoft regularly patch to maintain ...read more
Q2. What is your approach to application security in product engineering?
My approach to application security integrates best practices throughout the product lifecycle, ensuring robust protection against threats.
Implement security by design: Incorporate security measures from the initial design phase, such as threat modeling.
Conduct regular security assessments: Use tools like static and dynamic analysis to identify vulnerabilities early in the development process.
Adopt secure coding practices: Train developers on OWASP guidelines to prevent commo...read more
Q3. explain ?? in javascript
?? is a logical operator in JavaScript that returns true if either of the operands is true.
?? is also known as the 'logical OR' operator.
It is represented by two question marks (??).
Example: let result = a ?? b; // result will be the value of a if a is not null or undefined, otherwise it will be the value of b.
Q4. explain node vs java
Node.js is a runtime environment for executing JavaScript code outside of a browser, while Java is a general-purpose programming language often used for building enterprise applications.
Node.js is based on JavaScript and is single-threaded, event-driven, and non-blocking.
Java is a statically typed language with a strong emphasis on object-oriented programming.
Node.js is commonly used for building server-side applications and real-time web applications.
Java is often used for b...read more
Q5. explain 1nf 2nf 3nf
1NF, 2NF, and 3NF are different normal forms in database normalization.
1NF (First Normal Form) - Each column in a table must contain atomic values. No repeating groups of columns.
2NF (Second Normal Form) - Meets 1NF and all non-key attributes are fully functional dependent on the primary key.
3NF (Third Normal Form) - Meets 2NF and all non-key attributes are non-transitively dependent on the primary key.
Q6. explain asynchronus
Asynchronous refers to a programming model where tasks can be executed independently without waiting for each other to complete.
Asynchronous programming allows tasks to run concurrently, improving performance and responsiveness.
It is commonly used in web development for handling tasks like fetching data from servers without blocking the user interface.
Examples include JavaScript's asynchronous functions like setTimeout() and fetch() for making API calls.
Q7. explain graphql
GraphQL is a query language for APIs and a runtime for executing those queries.
GraphQL allows clients to request only the data they need.
It provides a single endpoint for all data requests.
Clients can specify the structure of the response they want.
It is strongly typed and introspective.
Interview Process at Geodis Overseas
Top Technical Lead Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month