Filter interviews by
I applied via Naukri.com and was interviewed in Oct 2022. There were 2 interview rounds.
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
I applied via Recruitment Consulltant and was interviewed before Jun 2022. There were 3 interview rounds.
A linked list is a data structure consisting of nodes where each node points to the next node in the sequence.
Nodes contain data and a reference to the next node
Can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)
Operations include insertion, deletion, traversal, and searching
Example: Node { data: 5, next: Node { data: 10, next: null } }
Binary search is a divide and conquer algorithm that efficiently finds the target value in a sorted array.
Start by defining the low and high indices of the array.
Calculate the mid index as (low + high) / 2.
Compare the target value with the value at the mid index and adjust the low and high indices accordingly.
Repeat the process until the target value is found or the low index surpasses the high index.
Use a modified version of Merge Sort or Tim Sort for efficient sorting when 70% of numbers are already sorted.
Consider using Merge Sort with optimizations for nearly sorted arrays, such as checking for already sorted subarrays before merging.
Tim Sort, a hybrid sorting algorithm derived from Merge Sort and Insertion Sort, is also a good choice for partially sorted arrays.
Both algorithms have a time complexity of O(n log...
A virtual destructor in C++ is used to ensure that the correct destructor is called when deleting an object through a base class pointer.
Virtual destructors are necessary when deleting an object through a pointer to a base class in order to properly call the derived class destructor.
Without a virtual destructor, only the base class destructor would be called, potentially leading to memory leaks or undefined behavior.
Ex...
Overflow in C++ occurs when a value is too large to be stored in the data type, leading to unexpected behavior.
Overflow can happen when adding two large numbers, causing the result to exceed the maximum value that can be stored in the data type.
For example, adding 2147483647 + 1 to an int data type in C++ will result in overflow, wrapping around to -2147483648.
To prevent overflow, it is important to check for potential...
Sonata Software interview questions for popular designations
I applied via Approached by Company and was interviewed before Dec 2023. There were 2 interview rounds.
Asked basic questions
Get interview-ready with Top Sonata Software Interview Questions
Sanity test is a narrow regression test while Smoke test is a broader test to check if the application is stable enough for further testing.
Sanity test is a quick test to check if the critical functionalities are working after a small change in the code.
Smoke test is a broader test to check if the application is stable enough for further testing.
Sanity test is usually performed by developers while Smoke test is perform...
I applied via Campus Placement and was interviewed in Jun 2022. There were 4 interview rounds.
Basic questions with questions related to percentages , Simple Interests, Speed and distances etc
Basic coding questions you can write in any coding languages of your wish
I applied via Walk-in and was interviewed before Apr 2023. There were 3 interview rounds.
I applied via Referral and was interviewed before May 2023. There were 2 interview rounds.
Basic logical reasoning questions
Top trending discussions
The duration of Sonata Software interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 96 interviews
Interview experience
based on 1.1k reviews
Rating in categories
Hyderabad / Secunderabad,
Chennai
+18-13 Yrs
Not Disclosed
Hyderabad / Secunderabad,
Chennai
+14-9 Yrs
Not Disclosed
Consultant
649
salaries
| ₹6 L/yr - ₹22 L/yr |
Senior System Analyst
576
salaries
| ₹3.9 L/yr - ₹16.1 L/yr |
Software Engineer
401
salaries
| ₹3 L/yr - ₹12.8 L/yr |
Technical Lead
312
salaries
| ₹10 L/yr - ₹32 L/yr |
Digital Engineer
304
salaries
| ₹2.6 L/yr - ₹10.2 L/yr |
LTIMindtree
Persistent Systems
TCS
Wipro