Filter interviews by
I applied via Approached by Company and was interviewed in Nov 2023. There were 3 interview rounds.
Digital marketing is the practice of promoting products or services using digital channels and technologies.
It involves various strategies like search engine optimization (SEO), social media marketing, email marketing, and content marketing.
Digital marketing aims to reach and engage with a target audience through online platforms.
It includes activities such as creating and optimizing websites, running online advertisin...
Top trending discussions
I was interviewed in Jan 2025.
1. Explain about framework architecture and from that all questions derived. asked to write diagram and explain the structure.
2. Difference between class variable and instance variable.
3. what is ITestListener why used and when used in framework.
4. architecture of selenium 4 (geckodriver, chromium driver)
5. what is BDD and cucumber, how both are related to.
6. which kind of framework you go, either POM or Page factory for with testNg/junit?
7. asked to write query on sql joins and how you fetch the second lowest of salary from each department.
8. DDL, DML statements.
9. pathquery and query parameters differences(API)
10. How the responses you are validating in automation framework for Json response file.
11. status code of Https
12. serialization and deserialization difference
13. String Builder, String Buffer and String difference? which is better and which is safe to use.
14. Dropdown in selenium how you handle, how to check which is already selected?
15. multiple data provider in testng and how you pass parameter and how you retrive from excel sheet? Asked to write code!
16.what is flaky testing?
17.Asked to write first code of JDBC connecting establishment with framework.
18. Code execution: input ="aabbabcbb"; output = a:3 , b:5, c:1 like this if they give name also it should count. Tip : HashMap you can write the code.
19. Code execution: a[]={1,2,3,4,0,0,0} b={5,6,7} output need to print as remove all 0's from first array and replace 1,2,3,4 with 5,6,7 some crazy questions.
20. Git cmds and CI/CD tool.
1. asked about architecture and where you used oops concepts?
2. abstract class and interfaces
3. select drop down all options
4. find scrape links from webpage write the code
5. asked for writing xpath for any element random website.
6. asked about following-sibling, descendent and preceding-sibling, normalise-space locators.
7. jdbc connection code.
8. API JSON file - how you done validation in automation testing.
I was interviewed in Jan 2025.
posted on 25 Jan 2025
I was interviewed in Dec 2024.
A standardized assessment that measures a person's skills, cognitive abilities, and potential to perform in a specific role.
posted on 2 Feb 2025
I was interviewed in Jan 2025.
posted on 18 Feb 2025
I was interviewed in Aug 2024.
I was interviewed in Jan 2025.
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Sales Manager
4
salaries
| ₹2 L/yr - ₹2.4 L/yr |
Digital Marketing Executive
3
salaries
| ₹1.5 L/yr - ₹3 L/yr |
Wipro
Infosys
Tech Mahindra
WNS