i
Verizon
Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
User stories should be written in a simple and concise manner, focusing on the user's needs and goals.
Start with 'As a [user], I want [goal], so that [reason]' format
Include acceptance criteria for developers to understand the requirements
Use personas to create realistic user stories
Prioritize user stories based on business value and complexity
Collaborate with stakeholders to refine and validate user stories
I applied via Referral and was interviewed before Jun 2021. There were 2 interview rounds.
I applied via Approached by Company and was interviewed before Feb 2021. There were 4 interview rounds.
UX case study showcase. Try to show different case studies and explain on of them in details. Focus more on what were the design challenges and how you solved them.
I applied via Campus Placement and was interviewed before Jun 2021. There were 4 interview rounds.
Amcat aptitude tests
Gd on online/offline shopping
Verizon interview questions for popular designations
Excel formulas are used to perform calculations and manipulate data in spreadsheets.
Formulas start with an equal sign (=)
Functions can be used in formulas to perform specific calculations
Cell references can be used in formulas to reference data in other cells
Formulas can be copied and pasted to other cells
Examples: SUM, AVERAGE, IF, VLOOKUP
Get interview-ready with Top Verizon Interview Questions
I applied via Job Portal and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2020. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed in Oct 2019. There were 3 interview rounds.
Security groups control inbound/outbound traffic while NAT gateway allows instances in private subnets to access internet.
Security groups act as a virtual firewall for instances and control inbound/outbound traffic based on rules defined by the user.
NAT gateway allows instances in private subnets to access the internet while keeping them secure by not exposing their IP addresses to the internet.
Security groups are asso...
A pem file contains both the private key and the certificate, while a key file only contains the private key.
A pem file is used for SSL/TLS certificates
A key file is used for SSH authentication
Pem files can be converted to key files using OpenSSL
Pem files are often used in web servers like Apache and Nginx
I applied via Naukri.com and was interviewed before Mar 2020. There were 5 interview rounds.
I applied via Recruitment Consultant and was interviewed in Jun 2018. There were 6 interview rounds.
Interview experience
based on 1.3k reviews
Rating in categories
Software Engineer
560
salaries
| ₹4.8 L/yr - ₹18.4 L/yr |
Software Developer
268
salaries
| ₹5.6 L/yr - ₹20.1 L/yr |
Senior Software Engineer
259
salaries
| ₹9.8 L/yr - ₹35 L/yr |
Analyst
251
salaries
| ₹4 L/yr - ₹16.3 L/yr |
Devops Engineer
236
salaries
| ₹5.5 L/yr - ₹18.9 L/yr |
AT&T
Vodafone Idea
Bharti Airtel
Jio