Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
Top trending discussions
I applied via Naukri.com and was interviewed before May 2018. There were 5 interview rounds.
I appeared for an interview in Sep 2019.
I applied via Recruitment Consultant and was interviewed before Jan 2020. There were 5 interview rounds.
I am proficient in Java, Python, and C++. I have 2 years of experience in software development. I have excellent communication skills for client interaction.
Proficient in Java, Python, and C++
2 years of software development experience
Excellent communication skills for client interaction
I applied via Company Website and was interviewed in Aug 2018. There were 4 interview rounds.
I appeared for an interview before Mar 2021.
Round duration - 60 Minutes
Round difficulty - Medium
This round started with 1 DSA question related to Dynamic Programming and then the interviewer switched to questions revolving around fundamentals of Java and OOPS.
You are provided with a number of stairs, and initially, you are located at the 0th stair. You need to reach the Nth stair, and you can climb one or tw...
The task is to determine the number of distinct ways to climb from the 0th to the Nth stair, where you can climb one or two steps at a time.
Use dynamic programming to solve this problem efficiently.
Define a recursive function to calculate the number of ways to reach each stair.
Consider base cases for 0 and 1 stairs, and then use the recursive formula to calculate for N stairs.
Use modulo 10^9+7 to handle large numbers a...
Access specifiers in Java control the visibility of classes, methods, and variables.
There are four access specifiers in Java: public, private, protected, and default.
Public: accessible from any other class.
Private: accessible only within the same class.
Protected: accessible within the same package and subclasses.
Default: accessible only within the same package.
JVM allocates 5 types of memory areas: Method Area, Heap, Stack, PC Register, and Native Method Stack.
Method Area stores class structures, method data, and runtime constants.
Heap is where objects are allocated and memory for new objects is dynamically allocated.
Stack stores local variables and partial results, and each thread has its own stack.
PC Register holds the address of the JVM instruction currently being execute...
Data encapsulation is the concept of bundling data with the methods that operate on that data, restricting access to the data from outside the bundle.
Data encapsulation is a fundamental principle of object-oriented programming.
It allows for the data to be hidden and only accessed through the defined methods.
Encapsulation helps in achieving data security and prevents accidental modification of data.
Example: In a class r...
No, static methods cannot be overridden in Java.
Static methods belong to the class itself, not to any specific instance of the class.
Subclasses can have static methods with the same signature as the parent class, but they are not considered overridden.
Example: Parent class has a static method 'display()', and subclass also has a static method 'display()'. These are two separate methods, not an override.
Round duration - 60 Minutes
Round difficulty - Medium
In this round, the interviewer first started asking questions related to Java and Spring Boot and then he switched to Hibernate. The interview however ended with the interviewer asking me some basic queries related to SQL.
Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
@ComponentScan is used in class files to enable component scanning for Spring beans.
Enables Spring to automatically detect and register Spring components (beans) within the specified package(s)
Reduces the need for manual bean registration in configuration files
Can specify base packages to scan for components, or use default behavior to scan the current package and its sub-packages
Yes, we can override or replace the embedded Tomcat server in Spring Boot.
Spring Boot allows for customization of embedded servers by excluding the default server dependency and adding a different server dependency.
For example, to replace Tomcat with Jetty, exclude Tomcat and add Jetty dependencies in the pom.xml file.
Configuration properties can also be used to customize the embedded server in Spring Boot applications
The starter dependency of the Spring Boot module is spring-boot-starter.
The starter dependency provides a set of common dependencies for a specific type of application.
It helps in reducing the configuration overhead and simplifies the setup process.
For example, 'spring-boot-starter-web' includes dependencies for building web applications.
Hibernate caching is a mechanism used to improve the performance of applications by reducing the number of database queries.
Hibernate caching stores frequently accessed data in memory to reduce the need for repeated database queries.
There are different levels of caching in Hibernate, such as first-level cache and second-level cache.
First-level cache is associated with the Session object and is enabled by default.
Second...
Hibernate provides optimistic and pessimistic concurrency control strategies.
Optimistic concurrency control: Uses versioning or timestamp to check for concurrent updates.
Pessimistic concurrency control: Locks the database records to prevent concurrent updates.
Examples: @Version annotation for optimistic concurrency, LockMode.UPGRADE for pessimistic concurrency.
Round duration - 30 Minutes
Round difficulty - Easy
This is a cultural fitment testing round. HR was very frank and asked standard questions. Then we discussed about my
role.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Naukri.com and was interviewed before Jun 2020. There were 3 interview rounds.
Spring is a framework for building Java applications, while Spring Boot is a tool for quickly creating Spring-based applications.
Spring provides a comprehensive framework for building Java applications, while Spring Boot is a tool that simplifies the process of creating Spring-based applications.
Spring requires more configuration and setup, while Spring Boot provides a more streamlined approach.
Spring Boot includes an ...
CORS (Cross-Origin Resource Sharing) is a security feature that allows or restricts access to resources from different domains.
CORS is used to prevent unauthorized access to resources from different domains
It is implemented by adding specific headers to HTTP responses
CORS can be configured to allow or restrict access based on the origin domain
Examples of CORS headers include Access-Control-Allow-Origin and Access-Contr
based on 1 interview
Interview experience
Consultant
619
salaries
| ₹6 L/yr - ₹22 L/yr |
Senior System Analyst
607
salaries
| ₹5 L/yr - ₹12.4 L/yr |
Software Engineer
377
salaries
| ₹2.8 L/yr - ₹13.1 L/yr |
System Analyst
315
salaries
| ₹3 L/yr - ₹10 L/yr |
Digital Engineer
312
salaries
| ₹2.6 L/yr - ₹10 L/yr |
ITC Infotech
3i Infotech
Cybage
Xoriant