Filter interviews by
Just some basic questions.
Total 6 questions. 4 basic and 2 advanced.
Program to generate Fibonacci series using Java
Use a loop to generate Fibonacci series
Start with 0 and 1 as the first two numbers
Add the previous two numbers to get the next number
Repeat the process until the desired number of terms
Inheritance in Java allows a class to inherit properties and behaviors from another class.
Create a parent class with common properties and methods
Create a child class that extends the parent class
Child class can access parent class properties and methods
I applied via Campus Placement and was interviewed before Jul 2022. There were 3 interview rounds.
Probability, Logical Reasoning, etc.
4 Basic coding questions
You can choose any language you want to code from.
Questions like palindrome and string reverse were asked.
Easy
Java
What people are saying about Virtusa Consulting Services
I applied via Job Portal and was interviewed in Dec 2024. There was 1 interview round.
OWASP features are security standards and best practices for web applications.
OWASP Top 10 is a list of the top 10 most critical web application security risks.
OWASP ZAP is a popular security tool for finding vulnerabilities in web applications.
OWASP ASVS provides a framework for building secure applications.
OWASP SAMM is a maturity model for software assurance that helps organizations assess and improve their security
I applied via LinkedIn and was interviewed in Apr 2024. There were 2 interview rounds.
React is a JavaScript library for building user interfaces. Deployment can be done using various methods.
React features include virtual DOM, component-based architecture, JSX syntax, and state management.
Deployment can be done using tools like Heroku, Netlify, AWS, or manually by building and serving static files.
Continuous integration and deployment (CI/CD) pipelines can be set up to automate the deployment process.
Se...
posted on 15 Feb 2022
1)Driffience between Abstract class &
Interface.
-abstract class
represents property
&
behaviour of an object
whereas
interface
represents
behaviour
of an object.
2)Driffience between equal() vs ==operator.
equal() is
an object class method
whereas
equal() of string class
override
the object class equal().
3)can we use pointer's in Java.
Not explicitly but implicitly we can use pointer's in java.
Dynamic m/m refers with help of pointer's but java does not support the pointer's.
when we r creating an object in java refrence varaible of an object holds the identity that is nothing but an implicit pointer that holds an unique identity of an object.
4)How we can print object ID.
-Object ID printed with help of object class which is a service provider class having 9().
5)what is object class.
-it is a super class of all predefined & userdefined class.
6)Write a prog to get name of main thread in java.
-class A
{
psvm(String args [])
{
s.o.pln(Thread.currentThread().getName());
}
}
7)length vs length()
-length
is
data menmber
of proxy class
whereas
length() is a string class().
JVM is an abstract machine that executes Java bytecode.
JVM stands for Java Virtual Machine.
It is responsible for interpreting and executing Java bytecode.
JVM provides platform independence to Java programs.
It has its own memory management system and garbage collector.
JVM can be implemented on different operating systems.
Examples of JVM languages include Java, Kotlin, and Scala.
It was easy to answer all the questions,basics of aptitude
There were 10 members in the gd and it went smoothly
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
based on 2 interviews
Interview experience
based on 1 review
Rating in categories
Senior Consultant
3.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Lead Consultant
3.4k
salaries
| ₹10.5 L/yr - ₹34.6 L/yr |
Software Engineer
3.3k
salaries
| ₹3.5 L/yr - ₹13.1 L/yr |
Consultant
3.3k
salaries
| ₹6 L/yr - ₹20 L/yr |
Associate Consultant
2.7k
salaries
| ₹4.7 L/yr - ₹15.1 L/yr |
Cognizant
TCS
Infosys
Accenture