Filter interviews by
Be the first one to contribute and help others!
posted on 25 Jan 2025
I was interviewed in Dec 2024.
A standardized assessment that measures a person's skills, cognitive abilities, and potential to perform in a specific role.
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I was interviewed in Dec 2024.
I am a dedicated and detail-oriented business analyst with a strong background in data analysis and problem-solving.
Experienced in conducting market research and analyzing trends
Skilled in creating detailed reports and presentations for stakeholders
Proficient in using data analysis tools such as Excel and SQL
Implicit enhancements are enhancements that are automatically applied to a program without any explicit coding, while explicit enhancements are enhancements that are manually added to a program through coding.
Implicit enhancements are activated by SAP without any additional coding from the developer.
Explicit enhancements require the developer to manually add code to enhance the program.
Implicit enhancements are often u...
Different types of enhancements include functional, performance, security, and usability enhancements.
Functional enhancements improve the core functionality of a system or product.
Performance enhancements focus on improving speed, efficiency, and scalability.
Security enhancements aim to protect the system from potential threats and vulnerabilities.
Usability enhancements enhance the user experience and make the system m
Debugging background jobs involves checking logs, monitoring job status, and using debugging tools.
Check the logs for any error messages or warnings
Monitor the job status to see if it is running or stuck
Use debugging tools like debugger or profiler to analyze the code execution
Check for any dependencies or external factors affecting the job
Debugging smartforms involves identifying and fixing errors in the form design or code.
Check for syntax errors in the smartform code
Verify data binding and field mappings
Use debugging tools like breakpoints and watchpoints
Test the smartform with sample data to identify issues
Consult documentation or seek help from experienced developers
I have used the BAPI_MATERIAL_GET_DETAIL to retrieve material details in SAP system.
BAPI_MATERIAL_GET_DETAIL is used to fetch material master data in SAP
It can be used to retrieve information such as material description, unit of measure, and plant data
Example: BAPI_MATERIAL_GET_DETAIL('MaterialNumber')
File handling is the process of managing and manipulating files on a computer system.
File handling involves tasks such as creating, reading, writing, and deleting files.
It also includes operations like opening and closing files, as well as moving and copying files.
Examples of file handling functions include fopen(), fread(), fwrite(), and fclose() in programming languages like C or Python.
The FM used to upload data is 'UPLOAD_DATA'
The FM 'UPLOAD_DATA' is commonly used in SAP systems to upload data from external sources
It is often used in data migration projects or when bulk data needs to be imported into the system
The 'UPLOAD_DATA' FM typically requires input parameters such as file path, data format, and target table
To make a table field case sensitive, you can change the collation of the column to a case-sensitive collation.
Change the collation of the column to a case-sensitive collation like Latin1_General_CS or SQL_Latin1_General_CP1_CS_AS
For example, ALTER TABLE table_name ALTER COLUMN column_name COLLATE Latin1_General_CS_AS
BSPI is used instead of Update query for real-time data processing and to ensure data consistency.
BSPI (Business Service Provider Interface) is used for real-time data processing in SAP systems.
BSPI ensures data consistency by providing a standardized way to update data across different systems.
Update queries can be risky for real-time data processing as they may lead to data inconsistencies.
BSPI allows for better erro...
I am a detail-oriented business analyst with experience in data analysis and process improvement.
Experienced in data analysis and reporting
Skilled in process improvement and optimization
Strong attention to detail and problem-solving skills
Explicit enhancements are modifications made directly to a standard SAP object, while implicit enhancements are modifications made using enhancement points provided by SAP.
Explicit enhancements involve directly modifying the standard SAP object code.
Implicit enhancements involve using enhancement points provided by SAP to add custom code.
Explicit enhancements can be risky as they may be overwritten during system upgrad...
Customer Exit requirements involve defining conditions under which a customer can end their relationship with a company.
Identifying reasons why customers may want to exit the relationship
Defining the process for customers to formally request an exit
Determining any penalties or fees associated with exiting
Ensuring data privacy and security during the exit process
Developing strategies to retain customers before they exit
FM stands for Facilities Management, which includes various types such as Hard FM and Soft FM.
Hard FM involves physical assets like buildings and equipment maintenance.
Soft FM focuses on non-physical assets like cleaning, security, and catering services.
Other types include Integrated FM, Total FM, and Strategic FM.
Examples: Hard FM - HVAC maintenance, Soft FM - janitorial services.
BAPIs are created using transaction code BAPI in SAP system.
BAPIs are created using transaction code BAPI in SAP system.
BAPIs are defined using Function Modules in SAP.
BAPIs are used to integrate SAP systems with external systems.
BAPIs can be created for both standard SAP functions and custom functions.
Tcode for code optimization is SE30 in SAP
SE30 is a transaction code in SAP used for performance trace and analysis
It helps in identifying performance bottlenecks in ABAP code
SE30 provides detailed analysis of runtime, database, and memory consumption
Code optimization involves improving code efficiency and performance.
Identify and remove unnecessary code
Use efficient data structures and algorithms
Minimize the number of function calls
Optimize loops and conditional statements
Use caching and memoization techniques
Profile and analyze code for bottlenecks
The Tcode for ADOBE Form is SFP.
Tcode SFP is used to create and maintain Adobe Forms in SAP systems.
Adobe Forms are used for designing and formatting business documents like invoices, purchase orders, etc.
Yes, I have worked on Module Pool in SAP ABAP development.
I have experience creating interactive screens using Module Pool programming in SAP ABAP.
I have worked on designing screens with input fields, buttons, and logic to process user input.
I have implemented navigation between screens and data validation in Module Pool.
I have integrated Module Pool programs with backend ABAP logic for data processing.
I have experienc...
Commit statement is used to permanently save changes made in a transaction in a database.
Commits all changes made in a transaction to the database
Permanently saves the changes
Ends the transaction and makes the changes visible to other transactions
To gain practical experience and skills through internships, certifications, and volunteer work before securing a full-time job.
Took time to gain practical experience through internships, certifications, and volunteer work
Focused on developing skills and knowledge in relevant areas
Used the gap year to explore different career options and industries
Took time to travel or pursue personal interests before committing to a
I am open to relocation for the right opportunity.
Open to relocation for career growth
Interested in exploring new cities
Flexible with location preferences
posted on 18 Dec 2024
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.
Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.
It works by not advertising routes back to the same interface they were learned from.
Split horizon with poison reverse takes this a step further by advertising the route w...
BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.
BGP is an exterior gateway protocol used to make routing decisions on the internet.
It operates by exchanging routing information between different autonomous systems (AS).
BGP uses TCP port 179 for communication.
BGP routers maintain a table of IP prefixes and their paths to reach them.
BGP can be configured to influenc...
There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.
eBGP (External BGP) - AD value: 20
iBGP (Internal BGP) - AD value: 200
Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.
Routing protocols help routers communicate with each other to dynamically update routing tables.
Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).
Distance-vector protocols determine the best path based on hop count.
Link-state protocols use a more complex a...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to re
Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.
Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.
Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.
Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.
Regularly monit...
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has speci...
Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.
Traceroute sends packets with increasing TTL values to determine the path to a destination.
Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.
The final destination sends an ICMP Port Unreachable message, indicating the end of the route.
Traceroute helps i...
The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.
The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.
This could be due to the router being configured to block ICMP traffic for security reasons.
It can also be caused by a firewall or network filtering rules blocking the ICMP packets.
In some cases, the '***...
BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.
Idle - Initial state when BGP is not yet established
Connect - Attempting to establish a TCP connection
Active - Waiting for a TCP connection to be completed
OpenSent - Sent an Open message to peer
OpenConfirm - Received an Open message and waiting for confirmation
Established - BGP peers are fully established and can exchange routing information
The new router can be configured remotely using a laptop or mobile device with access to the network.
Access the router's web interface by entering its IP address in a web browser
Login using default credentials or credentials provided by the company
Configure basic settings such as SSID, password, and security settings
Update firmware if necessary
Test the connection to ensure it is working properly
CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.
CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.
PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.
CE routers are...
The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'
Use the 'set' command to configure the interface
Specify the interface name and unit number
Use the 'family inet' statement to configure an IPv4 address
Specify the IP address and subnet mask
Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.
AS number must match on both neighbors
IP address must be reachable between neighbors
Subnet mask should be the same on both neighbors
BGP version should be compatible between neighbors
tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.
tftp is a lightweight protocol used for transferring files between devices on a network.
It operates on UDP port 69.
tftp does not require user authentication, making it less secure compared to FTP.
It is commonly used for booting devices over a network, such as in diskless workstations or routers.
An example of tft...
Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.
BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.
Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.
BGP Confederations can also be used to prevent loops by dividing the AS into sm
Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.
Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.
The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.
Traceroute displays the IP addresses of the routers in the p...
Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.
Public IP is unique and can be accessed from anywhere on the internet
Private IP is used within a local network and is not directly accessible from the internet
Public IP is assigned by the Internet Service Provider (ISP)
Private IP addresses are typically in the ranges of 192.168.
To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.
Create a simple, easy-to-follow guide with step-by-step instructions.
Use visual aids such as diagrams or videos to demonstrate the process.
Provide clear explanations of each step and troubleshoot common issues.
Offer remote support or a helpline for additional assistance if needed.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall
Routers connect multiple networks together while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers can determine the best path for data to travel between networks, while...
MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.
It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.
MPLS operates at layer 2.5 of t...
FTP and TFTP are protocols used for transferring files over a network.
FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.
TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.
FTP requires authentication (username and password) for access, while TFTP does not ...
I was interviewed in Dec 2024.
Our team follows a CI/CD workflow that includes automated testing, code reviews, and continuous integration.
Automated testing is run on every code change to catch bugs early.
Code reviews are conducted before merging changes to ensure code quality.
Continuous integration is used to automatically build and test code changes in a shared repository.
Deployment pipelines are set up to automate the release process.
Version cont...
Yes, there have been security incidents and I have handled them effectively.
Implemented security protocols to prevent future incidents
Conducted thorough investigation to identify the root cause
Collaborated with IT team to strengthen security measures
Communicated with stakeholders to ensure transparency and trust
Provided training to employees on cybersecurity best practices
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization determines the level of access or permissions a user has once their identity is confirmed.
Authentication is the process of logging in, while authorization is the process of granting or denyin...
LLD for an authentication and authorization system
Separate modules for authentication and authorization
Use of secure hashing algorithms for storing passwords
Role-based access control implementation
Audit logging for tracking user actions
Integration with external identity providers
Design a document managed storage like Google Drive as an E2E solution.
Implement user authentication and authorization for secure access.
Create a user-friendly interface for uploading, organizing, and sharing documents.
Include features like version control, file syncing, and search functionality.
Utilize cloud storage for scalability and accessibility.
Implement encryption for data security.
Integrate with third-party app
AML and KYC requirements are regulations that financial institutions must follow to prevent money laundering and verify the identity of their customers.
AML (Anti-Money Laundering) requirements involve monitoring transactions, reporting suspicious activities, and conducting customer due diligence.
KYC (Know Your Customer) requirements involve verifying the identity of customers, assessing their risk level, and maintainin...
I have a strong attention to detail and analytical skills that set me apart from my colleagues.
I have a proven track record of accurately identifying and resolving discrepancies in KYC documentation.
I excel at conducting thorough research and analysis to ensure compliance with regulations.
My ability to effectively communicate complex information to stakeholders sets me apart in team collaborations.
Strength: attention to detail, Weakness: perfectionism
Strength: Ability to meticulously review documents and identify discrepancies
Strength: Strong analytical skills to detect potential risks or fraudulent activities
Weakness: Striving for perfection may lead to spending too much time on a task
Weakness: Difficulty in delegating tasks due to desire for everything to be done perfectly
Implemented a new KYC process resulting in 30% reduction in onboarding time and 20% decrease in errors.
Led a team to revamp KYC procedures and systems
Introduced automation tools to streamline verification process
Trained staff on updated KYC regulations and best practices
Yes, I am a team player. I believe in open communication and collaboration. When conflicts arise, I address them directly and seek resolution.
I believe in open communication and collaboration within the team.
I address conflicts directly and seek resolution through constructive conversations.
I focus on finding common ground and working towards a solution that benefits the team as a whole.
I failed to meet a deadline due to poor time management.
Underestimated the time needed for a project
Did not prioritize tasks effectively
Learned to create a detailed schedule and set realistic deadlines
General English grammar knowledge and some calculations
It was basic questions of maths and logical reasoning
It’s related to behavioural question fully
I applied via Campus Placement
It was a technicaL + aptitude test with 60 minutes duration.
I applied via Walk-in and was interviewed in Dec 2024. There were 3 interview rounds.
Sactions are penalties imposed on individuals or entities for violating laws or regulations. PEP refers to politically exposed persons. Red flags indicate potential suspicious activity. CIP stands for customer identification program. EDD is enhanced due diligence.
Sanctions are penalties imposed on individuals or entities for violating laws or regulations
Types of sanctions include financial sanctions, trade sanctions, a...
Relationship, reasoning and apti
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
Asked coding questions on Python and SQL
Python - find longest non repeating substring
SQL - join and window function
Develop a production-grade application in Python that analyzes data and provides answers to questions based on the dataset.
based on 4 reviews
Rating in categories
Sr. CAD Engineer
4
salaries
| ₹5 L/yr - ₹8 L/yr |
CAD Engg
4
salaries
| ₹3.6 L/yr - ₹5.7 L/yr |
Wipro
Infosys
Tech Mahindra
WNS