Filter interviews by
I was interviewed in Jul 2024.
Number, percentage, profit and loss
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for better control over the data by preventing outside interference.
Encapsulation also helps in achieving data abstraction and information hiding.
Example: In object-oriented programming, a class encapsulates data (attri...
A copy constructor is a special type of constructor in object-oriented programming that creates a new object as a copy of an existing object.
Copy constructor is used to initialize a new object as a copy of an existing object.
It takes an object of the same class as a parameter.
It is typically used to create deep copies of objects to avoid shallow copy issues.
Yes, I am open to relocating for the right opportunity.
I am open to relocating for the right job opportunity
I am willing to consider moving for a better work-life balance
I am excited about the possibility of experiencing a new city or country
My salary expectation is based on my experience, skills, and the market rate for the position.
Consider my years of experience in software development
Research the average salary for Software Developers in this location
Factor in the benefits and perks offered by the company
Be open to negotiation based on the overall compensation package
Just some basic questions.
Total 6 questions. 4 basic and 2 advanced.
Program to generate Fibonacci series using Java
Use a loop to generate Fibonacci series
Start with 0 and 1 as the first two numbers
Add the previous two numbers to get the next number
Repeat the process until the desired number of terms
Inheritance in Java allows a class to inherit properties and behaviors from another class.
Create a parent class with common properties and methods
Create a child class that extends the parent class
Child class can access parent class properties and methods
5 coding question are from arrays, string , collection framework
Level- moderate
3 coding question was there
List, arrays, string , collection framework, hashmap
Level - hard
What people are saying about Virtusa Consulting Services
Delete and truncate are SQL commands used to remove data from a table, but they differ in their functionality.
DELETE is a DML command used to remove specific rows from a table based on a condition
TRUNCATE is a DDL command used to remove all rows from a table, resetting auto-increment values
DELETE can be rolled back, while TRUNCATE cannot be rolled back
DELETE triggers delete triggers, while TRUNCATE does not trigger any...
Null is a value that represents the absence of a value or a placeholder.
Null is often used in programming to indicate that a variable does not have a value assigned to it.
It is different from an empty string or zero, as it specifically means 'no value'.
For example, a database field may have a null value if no data has been entered for that field.
Virtusa Consulting Services interview questions for popular designations
Get interview-ready with Top Virtusa Consulting Services Interview Questions
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Functional testing is a type of software testing where the system is tested against the functional requirements/specifications.
Tests the functionality of the software application
Focuses on what the system does
Verifies that the system behaves as expected based on the requirements
Does not concern with the internal code structure
Examples: testing login functionality, search feature, data validation
posted on 12 Apr 2024
CyberArk tool manages password management for privilege functional Ids by securely storing, rotating, and controlling access to credentials.
CyberArk stores privileged account credentials in a secure vault
It automatically rotates passwords to reduce the risk of unauthorized access
Access to passwords is controlled through policies and workflows
It provides auditing and reporting capabilities for privileged account usage
In...
Cyber Ark components include Privileged Account Security, Endpoint Privilege Manager, and Privileged Session Manager.
Privileged Account Security: Manages and secures privileged accounts and credentials.
Endpoint Privilege Manager: Controls and monitors privileged access on endpoints.
Privileged Session Manager: Monitors and records privileged sessions for auditing purposes.
Static privilege accounts can be onboarded into CyberArk for automated password management by following these steps.
Identify the static privilege accounts that need to be onboarded into CyberArk.
Create a Safe in CyberArk to store the passwords for these accounts.
Define the policies and permissions for accessing and managing these accounts within CyberArk.
Use CyberArk's REST API or CLI to automate the onboarding process...
I applied via Naukri.com and was interviewed in Jun 2024. There were 3 interview rounds.
Coding test on collections and java 8 features
1 hour duration and covered all topics mentioned on resume
Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOP focuses on creating objects that interact with each other to solve problems
Encapsulation: Objects can hide their internal state and require interaction through well-defined interfaces
Inheritance: Objects can inherit attributes and methods from o...
Joins are used in SQL to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column between them
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
INNER JOIN returns rows when there is at least one match in both tables
LEFT JOIN returns all rows from the left table and the matched rows from the righ...
Reasoning, english knowledge, quantitative topics for first round
Pillars of OOPs include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary featur
Constructor is a special method used to initialize objects in a class, while destructor is a method used to clean up resources before an object is destroyed.
Constructor is called when an object is created, typically used to initialize variables and allocate memory.
Destructor is called when an object is destroyed, used to release resources like memory or close files.
In C++, constructor has the same name as the class and...
Some of the top questions asked at the Virtusa Consulting Services interview -
The duration of Virtusa Consulting Services interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 457 interviews
Interview experience
based on 4.8k reviews
Rating in categories
Senior Consultant
4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Consultant
3.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Consultant
3.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
2.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Cognizant
TCS
Infosys
Accenture