Upload Button Icon Add office photos

Filter interviews by

SISA Information Security Developer Associate Interview Questions and Answers

Updated 5 Jul 2021

SISA Information Security Developer Associate Interview Experiences

1 interview found

Interview Questionnaire 

5 Questions

  • Q1. I was asked questions on C#.
  • Ans. Make sure your basics are strong. Const vs Readonly, Out vs Ref, Multi threading.
  • Answered Anonymously
  • Q2. MVC questions: Routing, Page life cycle, Exception Handling, Filters.
  • Ans. Answers you can find on Google.
  • Answered Anonymously
  • Q3. Linq questions: First vs Firstordefault, single vs singleordefault, convert generic list to non generic type.
  • Ans. 

    Explanation of Linq methods First, FirstOrDefault, Single, SingleOrDefault and converting generic list to non generic type.

    • First returns the first element of a sequence, throws an exception if sequence is empty.

    • FirstOrDefault returns the first element of a sequence or default value if sequence is empty.

    • Single returns the only element of a sequence, throws an exception if sequence has more than one element or is empty.

    • S...

  • Answered by AI
  • Q4. Google the answers or email me: *****
  • Q5. Questions on SQL, AWS, WEB API

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via campus placement at Vellore Institute of Technology (VIT) and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Aptitude Test 

It included mcqs and multiple coding questions.

Round 2 - Technical 

(2 Questions)

  • Q1. Yours technical skillls related questions
  • Q2. Managerial questions

Interview Preparation Tips

Topics to prepare for Aptos Software Developer interview:
  • Full Stack
Interview preparation tips for other job seekers - It was an on campus opportunity. Technical and managerial round happened together. The process was very smooth. The interviewers were professional yet friendly and made everything very comfortable. You should know the basics at least.
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.

Round 1 - Coding Test 

2-3 basic dsa questions

Round 2 - One-on-one 

(2 Questions)

  • Q1. Basic dsaquestions basic dsa
  • Q2. Basic dsa questions basic dsa
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Sep 2024. There were 2 interview rounds.

Round 1 - Group Discussion 

OOPS , DBMS , OS , and DSA concepts

Round 2 - Technical 

(2 Questions)

  • Q1. DBMS related concepts
  • Q2. Networking and Network Security
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(1 Question)

  • Q1. What is the difference between .Net core and .Net Framework
  • Ans. 

    The main difference between .Net Core and .Net Framework is that .Net Core is cross-platform and open-source, while .Net Framework is Windows-only.

    • Net Core is cross-platform and can run on Windows, macOS, and Linux, while .Net Framework is limited to Windows.

    • .Net Core is open-source and actively developed by Microsoft, while .Net Framework is a closed-source framework.

    • .Net Core is modular and lightweight, allowing deve...

  • Answered by AI
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via LinkedIn and was interviewed in May 2024. There were 2 interview rounds.

Round 1 - Coding Test 

Building small UI screen application in 1 hr for frontend developer

Round 2 - One-on-one 

(3 Questions)

  • Q1. Graph traversal question
  • Q2. React js questions
  • Q3. Javascript output guessing question
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Define Object-oriented programming
  • Ans. 

    Object-oriented programming is a programming paradigm based on the concept of objects, which can contain data and code.

    • Objects are instances of classes, which define the structure and behavior of the objects.

    • Encapsulation, inheritance, and polymorphism are key principles of OOP.

    • Example: In Java, a class 'Car' can have attributes like 'color' and 'model', and methods like 'drive' and 'stop'.

  • Answered by AI
  • Q2. What is Default method in Java?
  • Ans. 

    Default method in Java is a method defined in an interface with a default implementation.

    • Introduced in Java 8 to allow adding new methods to interfaces without breaking existing implementations

    • Default methods are declared with the 'default' keyword

    • They can be overridden in implementing classes if needed

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Need to have Deep knowledge of Java

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-

I applied via Naukri.com

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

Personal information, qualification,working or not

Round 3 - One-on-one 

(3 Questions)

  • Q1. Job related questions
  • Q2. Salary discussion and job description
  • Q3. Role of the working and project discussion

Interview Preparation Tips

Interview preparation tips for other job seekers - No any advice
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Mar 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(12 Questions)

  • Q1. 1. What are the advantages of Microservices?
  • Ans. 

    Microservices offer advantages such as scalability, flexibility, and easier maintenance.

    • Scalability: Microservices allow for individual components to be scaled independently, making it easier to handle high traffic.

    • Flexibility: Microservices can be developed and deployed independently, allowing for faster development and deployment cycles.

    • Easier maintenance: Microservices are smaller and more focused, making it easier ...

  • Answered by AI
  • Q2. 2. What are the disadvantages?
  • Ans. 

    Disadvantages of what? Please specify.

    • Answered by AI
    • Q3. 3. How hashmap internally works?
    • Ans. 

      HashMap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.

      • HashMap uses hashing to store and retrieve values quickly

      • It uses an array of buckets to store key-value pairs

      • The hash code of the key is used to determine the bucket where the key-value pair is stored

      • If two keys have the same hash code, they are stored in the same bucket as a linked list

      • When retrieving a value, the hash ...

    • Answered by AI
    • Q4. 4.Linked list Vs Arraylist
    • Ans. 

      Linked list is dynamic and efficient for insertion/deletion, while ArrayList is faster for random access.

      • Linked list uses pointers to connect nodes, while ArrayList uses an underlying array.

      • Linked list is better for frequent insertion/deletion, while ArrayList is better for frequent random access.

      • Linked list has O(1) time complexity for insertion/deletion, while ArrayList has O(n) time complexity.

      • Example: Linked list i...

    • Answered by AI
    • Q5. 5. Write a program to get the middle of the linked list in a single iteration? Ans - Two pointers , slow fast
    • Ans. 

      Program to get the middle of a linked list in a single iteration using two pointers.

      • Use two pointers, slow and fast, to traverse the linked list

      • Move slow pointer one step at a time and fast pointer two steps at a time

      • When fast pointer reaches the end, slow pointer will be at the middle node

    • Answered by AI
    • Q6. 6. Stack peek vs Stack pop?
    • Ans. 

      Stack peek returns the top element without removing it, while stack pop removes and returns the top element.

      • Stack peek is used to check the top element of the stack without removing it.

      • Stack pop is used to remove and return the top element of the stack.

      • Both methods operate on the top element of the stack.

    • Answered by AI
    • Q7. 7. RequestMapping vs Postmapping?
    • Ans. 

      RequestMapping is used for all HTTP methods while PostMapping is specifically for POST requests.

      • RequestMapping is a general-purpose annotation for mapping HTTP requests to handler methods.

      • PostMapping is a specialized version of RequestMapping that only maps POST requests.

      • RequestMapping can be used for GET, POST, PUT, DELETE, and other HTTP methods.

      • PostMapping is useful when you want to handle only POST requests and ign...

    • Answered by AI
    • Q8. 8. Singleton in java . And how singleton can be broken
    • Ans. 

      Singleton is a design pattern that restricts the instantiation of a class to one object.

      • Singleton pattern is used when we need to ensure that only one instance of a class is created and used throughout the application.

      • To implement Singleton, we make the constructor private and provide a static method to get the instance of the class.

      • Singleton can be broken by using reflection, serialization, and cloning.

      • Reflection can ...

    • Answered by AI
    • Q9. 9. What is @SpringBootApplication?
    • Ans. 

      A convenience annotation that combines @Configuration, @EnableAutoConfiguration, and @ComponentScan.

      • Used to bootstrap a Spring Boot application.

      • Automatically configures the Spring application based on the dependencies added to the classpath.

      • Scans the package and its sub-packages for components and services.

      • Example: @SpringBootApplication public class MyApplication { public static void main(String[] args) { SpringApplic

    • Answered by AI
    • Q10. 10. RestController vs Controller?
    • Ans. 

      RestController is used for RESTful web services while Controller is used for traditional web applications.

      • RestController returns data in JSON or XML format while Controller returns data in HTML format.

      • RestController uses @RestController annotation while Controller uses @Controller annotation.

      • RestController is used for building RESTful web services while Controller is used for building traditional web applications.

      • RestC...

    • Answered by AI
    • Q11. 11. Why do we need maven clean and install?
    • Ans. 

      Maven clean removes target directory and install compiles and packages the project

      • Maven clean removes the target directory and all the compiled classes and resources

      • Maven install compiles and packages the project and installs the resulting artifact into the local repository

      • Maven clean and install together ensure that the project is built from scratch and all dependencies are resolved

      • Useful when there are changes in the

    • Answered by AI
    • Q12. 12. How to switch from one branch to other in git?
    • Ans. 

      To switch from one branch to another in git, use the 'git checkout' command.

      • Use 'git checkout' followed by the name of the branch you want to switch to.

      • Make sure to commit or stash any changes before switching branches.

      • Example: 'git checkout new-branch'

    • Answered by AI
    Round 3 - Technical 

    (8 Questions)

    • Q1. 1. How do you secure your APIs?
    • Ans. 

      APIs can be secured using various methods such as authentication, encryption, rate limiting, and input validation.

      • Implement authentication using OAuth or JWT

      • Use HTTPS encryption to protect data in transit

      • Implement rate limiting to prevent DDoS attacks

      • Validate input data to prevent injection attacks

      • Regularly update and patch software to prevent vulnerabilities

    • Answered by AI
    • Q2. 2. What is deadlock? How to resolve it?
    • Ans. 

      Deadlock is a situation where two or more threads are blocked and waiting for each other to release resources.

      • Deadlock occurs when two or more threads are waiting for each other to release resources.

      • It can be resolved by using techniques like resource allocation graph, timeout, and prevention.

      • Prevention can be done by avoiding circular wait, hold and wait, and no preemption.

      • Example: Thread A holds resource X and waits ...

    • Answered by AI
    • Q3. 3. What is spring filter ?
    • Ans. 

      Spring filter is an interface used to intercept HTTP requests and responses.

      • Spring filter is used to perform tasks such as logging, security, and caching.

      • It can be used to modify the request or response before it reaches the controller.

      • Examples of Spring filters include CharacterEncodingFilter, CorsFilter, and CsrfFilter.

    • Answered by AI
    • Q4. 4. What is future object in java?
    • Ans. 

      A Future object represents the result of an asynchronous computation in Java.

      • Future objects are used to retrieve the result of an asynchronous computation when it becomes available.

      • They provide a way to check if the computation is complete, cancel the computation, and retrieve the result.

      • They are commonly used in multithreaded programming and in Java's Executor framework.

      • Example: Future future = executor.submit(new Cal...

    • Answered by AI
    • Q5. 5. Lifecycle of object in hibernate ?
    • Ans. 

      Hibernate manages object lifecycle through three states: transient, persistent, and detached.

      • When an object is created, it is in the transient state.

      • When the object is saved using session.save() method, it becomes persistent.

      • When the session is closed or the object is explicitly detached using session.evict() method, it becomes detached.

      • Detached objects can be re-attached to a new session using session.update() or sess...

    • Answered by AI
    • Q6. 6. Save vs Persist in hibernate ?
    • Ans. 

      Save() method inserts a new record into the database, while persist() method can also be used to update an existing record.

      • save() method is used to insert a new record into the database

      • persist() method can also be used to insert a new record, but it can also be used to update an existing record

      • save() method returns the generated ID immediately, while persist() method does not

      • save() method can be called outside of a tra...

    • Answered by AI
    • Q7. 7. Merge intervals problem in java
    • Ans. 

      Merge overlapping intervals in Java

      • Sort the intervals based on their start time

      • Iterate through the intervals and merge overlapping ones

      • Use a stack to keep track of merged intervals

    • Answered by AI
    • Q8. 8. Scopes of bean ?
    • Ans. 

      Scopes of bean refer to the visibility and lifecycle of a bean in a Spring application.

      • There are four scopes of bean in Spring: singleton, prototype, request, and session.

      • Singleton scope creates only one instance of a bean and is the default scope.

      • Prototype scope creates a new instance of a bean every time it is requested.

      • Request scope creates a new instance of a bean for each HTTP request.

      • Session scope creates a new i...

    • Answered by AI

    Interview Preparation Tips

    Topics to prepare for Hughes Systique Corporation Java Developer interview:
    • Core java
    • Spring boot
    • Hibernate
    • Data Structures
    • Microservices
    Interview preparation tips for other job seekers - Just be strong in core java , spring boot and microservices.

    Practicing DSA is must for this company

    Skills evaluated in this interview

    Interview experience
    4
    Good
    Difficulty level
    -
    Process Duration
    -
    Result
    -
    Round 1 - Technical 

    (1 Question)

    • Q1. You have a hotel and how will you create a complete schema for hotel
    • Ans. 

      To create a complete schema for a hotel, you need to consider various entities like rooms, guests, reservations, staff, amenities, etc.

      • Entities to include: rooms, guests, reservations, staff, amenities, invoices, payments

      • Relationships between entities: guest stays in a room, staff manages reservations, amenities are available in rooms

      • Attributes for each entity: room number, guest name, reservation date, staff ID, ameni

    • Answered by AI

    SISA Information Security Interview FAQs

    How to prepare for SISA Information Security Developer Associate interview?
    Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at SISA Information Security. The most common topics and skills that interviewers at SISA Information Security expect are .Net Core, ASP, ASP.Net, C# and Design Patterns.
    What are the top questions asked in SISA Information Security Developer Associate interview?

    Some of the top questions asked at the SISA Information Security Developer Associate interview -

    1. Linq questions: First vs Firstordefault, single vs singleordefault, convert gen...read more
    2. MVC questions: Routing, Page life cycle, Exception Handling, Filte...read more
    3. I was asked questions on ...read more

    Tell us how to improve this page.

    Interview Questions from Similar Companies

    Zeta Interview Questions
    3.3
     • 65 Interviews
    embedUR Systems Interview Questions
    3.5
     • 46 Interviews
    Subex Interview Questions
    3.4
     • 33 Interviews
    CoinDCX Interview Questions
    3.7
     • 26 Interviews
    Seclore Interview Questions
    4.0
     • 25 Interviews
    XenonStack Interview Questions
    3.3
     • 25 Interviews
    MoEngage Interview Questions
    4.0
     • 23 Interviews
    View all
    SISA Information Security Developer Associate Salary
    based on 5 salaries
    ₹6 L/yr - ₹13 L/yr
    10% less than the average Developer Associate Salary in India
    View more details
    Associate Consultant
    82 salaries
    unlock blur

    ₹3.8 L/yr - ₹16.3 L/yr

    Security Analyst
    59 salaries
    unlock blur

    ₹2.5 L/yr - ₹8.4 L/yr

    Senior Security Analyst
    22 salaries
    unlock blur

    ₹4 L/yr - ₹16.8 L/yr

    Senior Associate Consultant
    19 salaries
    unlock blur

    ₹7 L/yr - ₹22.5 L/yr

    SOC Analyst
    14 salaries
    unlock blur

    ₹3 L/yr - ₹6.1 L/yr

    Explore more salaries
    Compare SISA Information Security with

    Paladion Networks

    4.0
    Compare

    Kratikal Tech Private Limited

    3.6
    Compare

    Instasafe Technologies

    2.8
    Compare

    Safe Security

    2.9
    Compare

    Calculate your in-hand salary

    Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
    Did you find this page helpful?
    Yes No
    write
    Share an Interview