Upload Button Icon Add office photos

Filter interviews by

Stress Consulting Interview Questions and Answers

Updated 30 Apr 2021

Stress Consulting Interview Experiences

1 interview found

Interview Questionnaire 

1 Question

  • Q1. They asked just tech related questions.

Software Engineer Interview Questions asked at other Companies

Q1. Bridge and torch problem : Four people come to a river in the night. There is a narrow bridge, but it can only hold two people at a time. They have one torch and, because it's night, the torch has to be used when crossing the bridge. Person... read more
View answer (171)

Interview questions from similar companies

Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.

Round 1 - Technical 

(15 Questions)

  • Q1. What is split horison? How can we resolve it?
  • Ans. 

    Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.

    • Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.

    • It works by not advertising routes back to the same interface they were learned from.

    • Split horizon with poison reverse takes this a step further by advertising the route w...

  • Answered by AI
  • Q2. What is BGP? How BGP works?
  • Ans. 

    BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.

    • BGP is an exterior gateway protocol used to make routing decisions on the internet.

    • It operates by exchanging routing information between different autonomous systems (AS).

    • BGP uses TCP port 179 for communication.

    • BGP routers maintain a table of IP prefixes and their paths to reach them.

    • BGP can be configured to influenc...

  • Answered by AI
  • Q3. What are the type of BGP and their AD value?
  • Ans. 

    There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.

    • eBGP (External BGP) - AD value: 20

    • iBGP (Internal BGP) - AD value: 200

  • Answered by AI
  • Q4. What is routing protocol? What are the types of routing protocol?
  • Ans. 

    Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.

    • Routing protocols help routers communicate with each other to dynamically update routing tables.

    • Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).

    • Distance-vector protocols determine the best path based on hop count.

    • Link-state protocols use a more complex a...

  • Answered by AI
  • Q5. What is ospf?
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

    • OSPF is a link-state routing protocol

    • It uses Dijkstra's algorithm to calculate the shortest path

    • OSPF routers exchange link-state advertisements (LSAs) to build a topology map

    • It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)

    • OSPF divides the network into areas to re

  • Answered by AI
  • Q6. How do we prevent loop avoidance in BGP?
  • Ans. 

    Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.

    • Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.

    • Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.

    • Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.

    • Regularly monit...

  • Answered by AI
  • Q7. What is OSI model? What are the layers of OSI model?
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It helps in understanding how data is transferred from one computer to another over a network.

    • The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has speci...

  • Answered by AI
  • Q8. How does tracerout works?
  • Ans. 

    Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.

    • Traceroute sends packets with increasing TTL values to determine the path to a destination.

    • Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.

    • The final destination sends an ICMP Port Unreachable message, indicating the end of the route.

    • Traceroute helps i...

  • Answered by AI
  • Q9. If we see "*****" in tracerout, what it means?
  • Ans. 

    The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.

    • The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.

    • This could be due to the router being configured to block ICMP traffic for security reasons.

    • It can also be caused by a firewall or network filtering rules blocking the ICMP packets.

    • In some cases, the '***...

  • Answered by AI
  • Q10. What are the states in BGP?
  • Ans. 

    BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.

    • Idle - Initial state when BGP is not yet established

    • Connect - Attempting to establish a TCP connection

    • Active - Waiting for a TCP connection to be completed

    • OpenSent - Sent an Open message to peer

    • OpenConfirm - Received an Open message and waiting for confirmation

    • Established - BGP peers are fully established and can exchange routing information

  • Answered by AI
  • Q11. If there is a non tech guys on site to replace faulty router with new router, how do you configure the new router?
  • Ans. 

    The new router can be configured remotely using a laptop or mobile device with access to the network.

    • Access the router's web interface by entering its IP address in a web browser

    • Login using default credentials or credentials provided by the company

    • Configure basic settings such as SSID, password, and security settings

    • Update firmware if necessary

    • Test the connection to ensure it is working properly

  • Answered by AI
  • Q12. What are CE and PE routers?
  • Ans. 

    CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.

    • CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.

    • PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.

    • CE routers are...

  • Answered by AI
  • Q13. What is the command to assign an IP address on Juniper router interface?
  • Ans. 

    The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'

    • Use the 'set' command to configure the interface

    • Specify the interface name and unit number

    • Use the 'family inet' statement to configure an IPv4 address

    • Specify the IP address and subnet mask

  • Answered by AI
  • Q14. What are the parameters should match in BGP neighbourship?
  • Ans. 

    Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.

    • AS number must match on both neighbors

    • IP address must be reachable between neighbors

    • Subnet mask should be the same on both neighbors

    • BGP version should be compatible between neighbors

  • Answered by AI
  • Q15. What is tftp?
  • Ans. 

    tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.

    • tftp is a lightweight protocol used for transferring files between devices on a network.

    • It operates on UDP port 69.

    • tftp does not require user authentication, making it less secure compared to FTP.

    • It is commonly used for booting devices over a network, such as in diskless workstations or routers.

    • An example of tft...

  • Answered by AI
Round 2 - Technical 

(8 Questions)

  • Q1. What is loop avoidance mechanism in BGP?
  • Ans. 

    Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.

    • BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.

    • Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.

    • BGP Confederations can also be used to prevent loops by dividing the AS into sm

  • Answered by AI
  • Q2. How tracerout works? What is source and destination IP?
  • Ans. 

    Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.

    • Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.

    • The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.

    • Traceroute displays the IP addresses of the routers in the p...

  • Answered by AI
  • Q3. What is public IP and private IP?
  • Ans. 

    Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.

    • Public IP is unique and can be accessed from anywhere on the internet

    • Private IP is used within a local network and is not directly accessible from the internet

    • Public IP is assigned by the Internet Service Provider (ISP)

    • Private IP addresses are typically in the ranges of 192.168.

  • Answered by AI
  • Q4. How can we configure and a router with support of non tech guy onsite?
  • Ans. 

    To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.

    • Create a simple, easy-to-follow guide with step-by-step instructions.

    • Use visual aids such as diagrams or videos to demonstrate the process.

    • Provide clear explanations of each step and troubleshoot common issues.

    • Offer remote support or a helpline for additional assistance if needed.

  • Answered by AI
  • Q5. What is firewall?
  • Ans. 

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

    • Acts as a barrier between a trusted internal network and untrusted external network

    • Filters network traffic based on rules set by the administrator

    • Can be hardware-based or software-based

    • Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall

  • Answered by AI
  • Q6. What are the difference between router and switch?
  • Ans. 

    Routers connect multiple networks together while switches connect devices within a single network.

    • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

    • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

    • Routers can determine the best path for data to travel between networks, while...

  • Answered by AI
  • Q7. What is mpls?
  • Ans. 

    MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.

    • MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.

    • It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.

    • MPLS operates at layer 2.5 of t...

  • Answered by AI
  • Q8. How ftp and tftp works?
  • Ans. 

    FTP and TFTP are protocols used for transferring files over a network.

    • FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.

    • TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.

    • FTP requires authentication (username and password) for access, while TFTP does not ...

  • Answered by AI
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.

Round 1 - Technical 

(6 Questions)

  • Q1. What is the difference between a development dependency and a regular dependency in software development?
  • Ans. 

    Development dependencies are needed for development and testing, while regular dependencies are needed for the application to run.

    • Development dependencies are used during the development process, such as testing frameworks or build tools.

    • Regular dependencies are required for the application to function properly in production.

    • Development dependencies are typically listed in the devDependencies section of package.json, w...

  • Answered by AI
  • Q2. What do the symbols ^ and ~ represent in the package.json file?
  • Ans. 

    Symbols ^ and ~ in package.json represent version ranges for dependencies.

    • The symbol ^ represents a range that allows minor version updates.

    • The symbol ~ represents a range that allows only patch updates.

    • For example, ^1.2.3 allows any version from 1.2.3 to <2.0.0, while ~1.2.3 allows any version from 1.2.3 to <1.3.0.

  • Answered by AI
  • Q3. How can a 404 page be handled in React routing?
  • Ans. 

    404 page can be handled in React routing by creating a Route component with a path of '*' at the end of all other routes.

    • Create a Route component with a path of '*' at the end of all other routes in the Switch component.

    • Inside the '*' Route component, render a custom 404 page component.

    • Use the Switch component to ensure that only one Route is rendered at a time.

  • Answered by AI
  • Q4. Some Javascript coding questions.
  • Q5. What is the component lifecycle in functional components?
  • Ans. 

    Component lifecycle in functional components involves useEffect hook for side effects.

    • Functional components use useEffect hook to handle side effects like fetching data, subscribing to events, etc.

    • useEffect hook can be used to mimic componentDidMount, componentDidUpdate, and componentWillUnmount lifecycle methods.

    • useEffect hook takes a callback function as its first argument and an optional array of dependencies as its...

  • Answered by AI
  • Q6. Explain redux data flow
  • Ans. 

    Redux data flow is a unidirectional flow of data in React applications using a centralized store.

    • Actions are dispatched to the store

    • Reducers update the state based on the action

    • Components subscribe to the store to access the updated state

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Infosys Reactjs Developer interview:
  • Javascript
  • React.Js
Interview preparation tips for other job seekers - Get your basic cleared and be prepared
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Referral and was interviewed in Dec 2024. There were 2 interview rounds.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Tell me about yourself?
  • Q2. Why ADP?
Round 2 - Technical 

(3 Questions)

  • Q1. What do you know about SQL?
  • Q2. How can you write a query to retrieve details from two tables and present them in a single table format?
  • Q3. What is the SQL query to retrieve the number of students grouped by their respective streams?
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Jul 2024. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Questions related to the CMS which I worked on.
  • Q2. Questions related to the CMS
Round 2 - Behavioral 

(2 Questions)

  • Q1. What kind of role do you want
  • Q2. What kind of work you were doing

Interview Preparation Tips

Interview preparation tips for other job seekers - Please please get into Wipro only after confirming if you are going into a project. If not, better avoid as we might end up in bench. If the Technical manager says there are projects. Confirm with them if they are active projects or projects in negotiation phase.

Data Engineering Lead - BCG X Interview Questions & Answers

BCG user image Anonymous

posted on 13 Jan 2025

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Not Selected

I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.

Round 1 - Coding Test 

Asked coding questions on Python and SQL
Python - find longest non repeating substring
SQL - join and window function

Round 2 - Assignment 

Develop a production-grade application in Python that analyzes data and provides answers to questions based on the dataset.

Round 3 - Technical 

(2 Questions)

  • Q1. System design and project based questions
  • Q2. Scenario-based questions that can help assess how you handle various situations

Interview Preparation Tips

Topics to prepare for BCG Data Engineering Lead - BCG X interview:
  • Coding
  • System Design
  • Managerial
Interview preparation tips for other job seekers - You need to be thorough with coding, technical depth in projects and scenario based solutions for various difficult situations that one might have to face a a lead
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Approached by Company and was interviewed in Dec 2024. There was 1 interview round.

Round 1 - One-on-one 

(3 Questions)

  • Q1. Introduce yourself. Roles and Projects you were part of.
  • Q2. SQL joins, CTEs, Snowflake
  • Q3. Python libraries, data cleaning techniques

Interview Preparation Tips

Topics to prepare for IQVIA Technical Analyst interview:
  • MySQL
  • Python
  • Power Bi
Interview preparation tips for other job seekers - Basic to medium level questions were asked in SQL, Python and Power BI.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-

I applied via Campus Placement

Round 1 - Aptitude Test 

It was a technicaL + aptitude test with 60 minutes duration.

Round 2 - Technical 

(2 Questions)

  • Q1. Basic questions regarding the projects that i have done.
  • Q2. They asked me about my favourite subjects and then they asked some basic questions regarding those subjects.
Round 3 - HR 

(1 Question)

  • Q1. HR round in TCE is not an interview round rather it is a video assessment wherein we were given with two HR questions and we have to record a video answering the questions. maximum duration of the video sh...

Interview Preparation Tips

Interview preparation tips for other job seekers - Revise the core subjects of your field as it will help you during your technical test or interview as well. Feel confident while answering the question during Technical/HR interview.
Interview experience
2
Poor
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Campus Placement and was interviewed in Dec 2024. There were 4 interview rounds.

Round 1 - Coding Test 

Two coding questions related to matrices and heaps.

Round 2 - Technical 

(1 Question)

  • Q1. Python and SQL coding
Round 3 - Technical 

(1 Question)

  • Q1. Same questions like tech 1
Round 4 - HR 

(2 Questions)

  • Q1. Self intro , why tiger
  • Q2. Relocation

Interview Preparation Tips

Topics to prepare for Tiger Analytics Data Analyst interview:
  • Python
  • SQL
Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
-
Result
-
Round 1 - One-on-one 

(6 Questions)

  • Q1. What are the aml and kyc requirements?
  • Ans. 

    AML and KYC requirements are regulations that financial institutions must follow to prevent money laundering and verify the identity of their customers.

    • AML (Anti-Money Laundering) requirements involve monitoring transactions, reporting suspicious activities, and conducting customer due diligence.

    • KYC (Know Your Customer) requirements involve verifying the identity of customers, assessing their risk level, and maintainin...

  • Answered by AI
  • Q2. Why should we hire you, briefly describe a scenario where you would showcase a different skill or talent compared with your fellow employees?
  • Ans. 

    I have a strong attention to detail and analytical skills that set me apart from my colleagues.

    • I have a proven track record of accurately identifying and resolving discrepancies in KYC documentation.

    • I excel at conducting thorough research and analysis to ensure compliance with regulations.

    • My ability to effectively communicate complex information to stakeholders sets me apart in team collaborations.

  • Answered by AI
  • Q3. Strength and weakness?
  • Ans. 

    Strength: attention to detail, Weakness: perfectionism

    • Strength: Ability to meticulously review documents and identify discrepancies

    • Strength: Strong analytical skills to detect potential risks or fraudulent activities

    • Weakness: Striving for perfection may lead to spending too much time on a task

    • Weakness: Difficulty in delegating tasks due to desire for everything to be done perfectly

  • Answered by AI
  • Q4. Project and achievements?
  • Ans. 

    Implemented a new KYC process resulting in 30% reduction in onboarding time and 20% decrease in errors.

    • Led a team to revamp KYC procedures and systems

    • Introduced automation tools to streamline verification process

    • Trained staff on updated KYC regulations and best practices

  • Answered by AI
  • Q5. Are you a team player? What do you do when you don’t get along with certain colleagues? How do you manage conflict resolution?
  • Ans. 

    Yes, I am a team player. I believe in open communication and collaboration. When conflicts arise, I address them directly and seek resolution.

    • I believe in open communication and collaboration within the team.

    • I address conflicts directly and seek resolution through constructive conversations.

    • I focus on finding common ground and working towards a solution that benefits the team as a whole.

  • Answered by AI
  • Q6. Provide a situation where you might have failed previously? What has that experience taught you?
  • Ans. 

    I failed to meet a deadline due to poor time management.

    • Underestimated the time needed for a project

    • Did not prioritize tasks effectively

    • Learned to create a detailed schedule and set realistic deadlines

  • Answered by AI
Round 2 - Aptitude Test 

General English grammar knowledge and some calculations

Round 3 - HR 

(6 Questions)

  • Q1. CTC and expected salary details?
  • Q2. No you cannot negotiate and end up taking what they give you!
  • Q3. No relocation time, do it during weekends
  • Q4. No target compensation or other benefits
  • Q5. If ur employed through agency or consultancy you will be always a contingent and treated less than permanent employees
  • Q6. 12 hours a day, 6 days a week, no social or life balance

Interview Preparation Tips

Interview preparation tips for other job seekers - The experience is good overall 120 candidates only 2 of us got selected but the politics is bad

Stress Consulting Interview FAQs

How to prepare for Stress Consulting interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Stress Consulting. The most common topics and skills that interviewers at Stress Consulting expect are DFT, Design Engineering, Design Verification, Digital Design and IC Design.

Tell us how to improve this page.

Interview Questions from Similar Companies

Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
WNS Interview Questions
3.4
 • 958 Interviews
IQVIA Interview Questions
3.9
 • 453 Interviews
Goldman Sachs Interview Questions
3.6
 • 404 Interviews
Atos Interview Questions
3.9
 • 362 Interviews
TCE Interview Questions
3.8
 • 240 Interviews
Mu Sigma Interview Questions
2.7
 • 222 Interviews
View all

Stress Consulting Reviews and Ratings

based on 4 reviews

1.9/5

Rating in categories

2.3

Skill development

1.8

Work-Life balance

1.8

Salary & Benefits

1.5

Job Security

1.8

Company culture

1.8

Promotions/Appraisal

1.8

Work Satisfaction

Explore 4 Reviews and Ratings
HR Recruiter
8 salaries
unlock blur

₹1.7 L/yr - ₹2 L/yr

Information Technology Recruiter
5 salaries
unlock blur

₹1 L/yr - ₹3 L/yr

Salesforce Consultant
3 salaries
unlock blur

₹6 L/yr - ₹7.8 L/yr

Explore more salaries
Compare Stress Consulting with

Wipro

3.7
Compare

Infosys

3.7
Compare

Tech Mahindra

3.6
Compare

WNS

3.4
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview