Filter interviews by
Agentic AI refers to autonomous systems capable of making decisions and taking actions independently.
Agentic AI systems can operate without human intervention, such as self-driving cars.
They utilize machine learning algorithms to adapt and improve over time.
Examples include virtual personal assistants like Siri or Alexa that learn user preferences.
Agentic AI can be applied in various fields, including finance for ...
SOX ensures financial transparency and compliance, while internal audit evaluates risk management and operational efficiency.
SOX (Sarbanes-Oxley Act) focuses on financial reporting and accountability for public companies.
Internal audit assesses the effectiveness of internal controls and risk management processes.
SOX compliance requires external audits to verify financial statements, while internal audits are condu...
IT General Controls (ITGC) ensure the integrity and security of IT systems, categorized into preventive, detective, and corrective controls.
Preventive Controls: Aim to prevent errors or fraud. Example: Access controls that restrict unauthorized users.
Detective Controls: Identify and alert on errors or irregularities. Example: Audit logs that track user activities.
Corrective Controls: Address and rectify issues aft...
Object-Oriented Programming (OOP) is a programming paradigm based on the concept of objects, encapsulating data and behavior.
Encapsulation: OOP allows bundling of data and methods that operate on that data within a single unit, or class. For example, a 'Car' class can encapsulate properties like 'color' and methods like 'drive()'.
Inheritance: This principle enables a new class to inherit properties and methods fro...
Scala is a powerful programming language that combines object-oriented and functional programming paradigms.
Scala runs on the Java Virtual Machine (JVM) and is interoperable with Java.
It supports both object-oriented and functional programming styles.
Example of a simple Scala function: `def add(a: Int, b: Int): Int = a + b`.
Scala has a strong static type system, which helps catch errors at compile time.
Collections...
A closure in Python is a function that retains access to its lexical scope, even when the function is executed outside that scope.
A closure is created when a nested function captures the local variables from its enclosing function.
Example: def outer_func(x): def inner_func(y): return x + y; return inner_func; closure = outer_func(10); closure(5) returns 15.
Closures help in data hiding and encapsulation, allowing f...
Monitoring network performance involves tracking metrics like bandwidth, latency, and packet loss to ensure optimal operation.
Use network monitoring tools like Nagios or Zabbix to track performance metrics.
Implement SNMP (Simple Network Management Protocol) for real-time monitoring of network devices.
Analyze traffic patterns with tools like Wireshark to identify bottlenecks.
Set up alerts for unusual activity or pe...
Design a credit card fraud detection system using machine learning techniques to identify and prevent fraudulent transactions.
Data Collection: Gather historical transaction data, including features like transaction amount, location, time, and user behavior.
Feature Engineering: Create features such as transaction frequency, average transaction amount, and user spending patterns.
Model Selection: Use algorithms like ...
I possess a diverse skill set in various technologies, with a strong focus on software development and system architecture.
Proficient in Python and Java, having developed multiple web applications using Django and Spring frameworks.
Experienced in cloud technologies like AWS and Azure, successfully migrating on-premise applications to the cloud.
Skilled in database management with SQL and NoSQL databases, including ...
Pubsub is a messaging pattern where senders (publishers) distribute messages to multiple receivers (subscribers) through a central hub.
Pubsub allows for decoupling of components in a system.
Messages are typically sent asynchronously.
Common implementations include Kafka, RabbitMQ, and Google Cloud Pub/Sub.
I appeared for an interview in Jun 2017.
REST is lightweight and uses HTTP while SOAP is XML-based and has more features.
REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.
REST is stateless while SOAP can maintain state.
REST is faster and easier to use while SOAP is more secure and reliable.
REST is used for web services while SOAP is used for enterprise-level services.
Example of REST: Twitter API. Example of SOAP: Amazon Web Serv...
Observer pattern is a design pattern in which an object maintains a list of its dependents and notifies them automatically of any state changes.
Also known as publish-subscribe pattern
Used in event-driven systems
Allows loose coupling between objects
Example: A weather station broadcasts weather updates to multiple displays
Example: A stock market ticker notifies multiple investors of stock price changes
Singleton is a design pattern that restricts the instantiation of a class to a single object.
Singleton ensures that only one instance of a class exists in the entire application.
It provides a global point of access to the instance.
Commonly used in scenarios where a single instance needs to coordinate actions across the system.
Example: Database connection manager, logger, configuration manager.
Creating immutable in Java
Use final keyword to make variables immutable
Use private constructor to prevent object modification
Use defensive copying to prevent modification of mutable objects
Use enum to create immutable objects
Use String class to create immutable strings
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
It helps to decouple the code and makes it more testable and maintainable.
It allows for easier swapping of dependencies without changing the code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database co...
CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.
CORS allows web servers to specify which origins are allowed to access its resources
It is implemented using HTTP headers
CORS prevents malicious websites from accessing sensitive data from other websites
Examples of resources that may be restricted by CORS include cook...
CORS can be overcome by configuring the server to allow cross-origin requests.
Configure the server to include the Access-Control-Allow-Origin header
Use JSONP (JSON with Padding) to bypass CORS restrictions
Use a proxy server to make the request on behalf of the client
Use a browser extension to disable CORS restrictions during development
Use a server-side proxy to forward requests to the target server
I appeared for an interview in Dec 2024, where I was asked the following questions.
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Vulnerability management involves identifying, assessing, and mitigating security weaknesses in systems and applications.
Conduct regular vulnerability assessments using tools like Nessus or Qualys.
Prioritize vulnerabilities based on risk and impact, such as CVSS scores.
Implement patch management processes to address identified vulnerabilities promptly.
Utilize threat intelligence to stay informed about emerging vulnerab...
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how...
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user...
I applied via Job Portal
React lifecycle functions are methods that are automatically called at specific points in a component's life cycle.
Mounting: constructor, render, componentDidMount
Updating: render, componentDidUpdate
Unmounting: componentWillUnmount
Padding is the space inside the border of an element, while margin is the space outside the border.
Padding is used to create space between the content and the border of an element.
Margin is used to create space between the border of an element and other elements.
Padding affects the size of the content area, while margin affects the positioning of the element.
Example: padding: 10px will create 10 pixels of space inside ...
Yes, I am open to relocating for the right opportunity, as it can enhance my career and personal growth.
Relocation can provide exposure to new technologies and methodologies.
Living in a different city can broaden my professional network.
I am adaptable and enjoy new experiences, which relocation offers.
For example, moving to a tech hub can lead to better career prospects.
I appeared for an interview in Apr 2025, where I was asked the following questions.
SOX ensures financial transparency and compliance, while internal audit evaluates risk management and operational efficiency.
SOX (Sarbanes-Oxley Act) focuses on financial reporting and accountability for public companies.
Internal audit assesses the effectiveness of internal controls and risk management processes.
SOX compliance requires external audits to verify financial statements, while internal audits are conducted ...
ITAC refers to Information Technology Application Controls, ensuring data integrity in financial processes.
ITACs are controls within IT systems that ensure the accuracy and reliability of financial data.
They are scoped in by identifying critical processes and assessing risks associated with data integrity.
Example of a three-way match: verifying that the purchase order, invoice, and receiving report all match before pro...
Key reports are essential financial documents that provide insights for decision-making and performance evaluation.
Key reports include financial statements, variance analysis, and budget forecasts.
Scoping involves identifying the report's purpose, audience, and key metrics to be included.
Testing key reports includes validating data accuracy, ensuring calculations are correct, and confirming that the report meets user r...
IT General Controls (ITGC) ensure the integrity and security of IT systems, categorized into preventive, detective, and corrective controls.
Preventive Controls: Aim to prevent errors or fraud. Example: Access controls that restrict unauthorized users.
Detective Controls: Identify and alert on errors or irregularities. Example: Audit logs that track user activities.
Corrective Controls: Address and rectify issues after th...
Create a function to generate a transaction bin column based on transaction amounts.
Create bins based on transaction amounts (e.g. $0-$100, $101-$200, etc.)
Use pandas cut() function in Python to create bins
Assign bin labels to the transactions based on the bin ranges
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
To center a div in CSS3, use the 'margin: auto;' property along with a set width.
Set the width of the div
Use 'margin: auto;' to center the div horizontally
Make sure the parent container has a defined width
call, bind, and apply are methods used to manipulate the context of a function in JavaScript.
call() is used to invoke a function with a specified 'this' value and arguments provided individually.
bind() is used to create a new function with a specified 'this' value and initial arguments.
apply() is used to invoke a function with a specified 'this' value and arguments provided as an array.
Impairment refers to a reduction in the value of an asset on the balance sheet.
Impairment occurs when the carrying amount of an asset exceeds its recoverable amount.
It is typically recorded as a non-cash charge on the income statement.
Common examples include impairment of goodwill, intangible assets, and property, plant, and equipment.
Reconciling GL and subledger involves identifying and resolving discrepancies between the two accounts.
Compare transactions in GL and subledger to identify discrepancies
Investigate any differences in balances or transactions
Adjust entries in GL or subledger to reconcile the accounts
Ensure proper documentation of reconciliation process
Communicate with relevant stakeholders to resolve discrepancies
Develop a product strategy to enable mass migration in the market.
Conduct market research to identify target segments and their needs
Create a roadmap for product development and deployment
Implement marketing campaigns to educate and attract customers
Provide training and support for users transitioning to the new product
Monitor and analyze feedback to make continuous improvements
Create a Project Plan and Presentation on a Market Migration Case Study
posted on 25 Sep 2024
1. medium dp question on busrst ballon
2. graph quetion on flood fill
Design a file search feature for a software application.
Implement a search bar where users can input keywords or phrases to search for files.
Include filters for file type, date modified, and other relevant criteria.
Display search results in a user-friendly format with relevant file details.
Allow users to preview files before opening or downloading them.
Consider implementing search suggestions or autocomplete functional...
Design a ticket booking platform for movies, events, and shows with user-friendly features and robust backend architecture.
User Registration: Allow users to create accounts using email or social media.
Search Functionality: Implement a search bar for users to find movies or events by name, genre, or location.
Event Listings: Display a list of available movies/events with details like time, venue, and ticket prices.
Seat S...
TrieNode common prefix
Graph dkistra algo find least time to fill
Top trending discussions
Some of the top questions asked at the Visa interview -
The duration of Visa interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 110 interview experiences
Difficulty level
Duration
Senior Software Engineer
699
salaries
| ₹14 L/yr - ₹45 L/yr |
Software Engineer
440
salaries
| ₹9 L/yr - ₹30 L/yr |
Staff Software Engineer
213
salaries
| ₹24.7 L/yr - ₹65 L/yr |
Senior Data Engineer
108
salaries
| ₹20 L/yr - ₹45 L/yr |
Director
95
salaries
| ₹33.6 L/yr - ₹127 L/yr |
MasterCard
American Express
Paytm
FIS