
Wipro


20+ Wipro Senior Engineer Interview Questions and Answers
Q1. What is vpn and ipsec, ipsec tunnels troubleshooting
VPN is a secure connection between two networks. IPsec is a protocol used to secure the VPN connection.
VPN allows remote access to a network through a secure connection
IPsec provides encryption and authentication for the VPN connection
IPsec tunnels can be troubleshooted by checking the configuration, verifying the network topology, and checking for any firewall or NAT issues
Examples of VPN technologies include OpenVPN, Cisco AnyConnect, and Microsoft DirectAccess
Q2. Which routing protocal are you comfortable
I am comfortable with OSPF and BGP routing protocols.
I have experience in configuring and troubleshooting OSPF and BGP.
I am familiar with OSPF areas, LSAs, and BGP attributes.
I have worked with OSPF and BGP in both enterprise and service provider networks.
I understand the differences between OSPF and BGP and when to use each protocol.
I am also familiar with other routing protocols such as EIGRP and RIP.
Q3. What is difference between c and c++
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) while C does not.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
Q4. Explain STP , what is bpdu guard and bpdu filter
STP is a protocol used to prevent network loops. BPDU guard and filter are STP features to enhance network stability.
STP stands for Spanning Tree Protocol
It is used to prevent network loops by creating a loop-free logical topology
BPDU (Bridge Protocol Data Unit) is a message exchanged between switches to elect the root bridge and determine the best path to it
BPDU guard is a feature that disables a port if it receives a BPDU, preventing loops caused by unauthorized switches
BPD...read more
Q5. Identification mechanism in Tosca
Tosca uses unique identification mechanism called TBox to identify objects and their properties.
TBox is a unique identifier used by Tosca to identify objects and their properties
It is a combination of the object name and its properties
TBox is used to create reusable test cases and reduce maintenance efforts
Example: TBox for a button on a webpage could be 'Button_Login_Click'
Tosca also uses XScan to identify objects based on their visual appearance
Q6. are you written a playbooks rules
Yes, I have experience writing playbooks rules for automation in various engineering projects.
Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.
I have experience creating rule-based automation scripts to streamline engineering processes.
I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.
Q7. What is data abstraction
Data abstraction is the process of hiding implementation details and showing only the necessary information to the user.
It is a way of organizing complex systems
It allows users to interact with complex systems without needing to understand the underlying details
It helps to reduce complexity and increase efficiency
Examples include object-oriented programming and APIs
Q8. Different Manufacturing Process selection
Different manufacturing processes are selected based on factors like cost, quality, production volume, and material properties.
Consider cost implications of each manufacturing process
Evaluate quality requirements and capabilities of each process
Take into account production volume and efficiency of each process
Analyze material properties and compatibility with each process
Examples: Injection molding for high volume plastic parts, CNC machining for precision metal components
Q9. What is oops?
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs focuses on creating objects that contain both data and functions to manipulate that data.
It emphasizes on encapsulation, inheritance, and polymorphism.
Examples of OOPs languages are Java, C++, Python, etc.
Q10. Digital forensics working procedures
Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.
Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.
Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.
Analyzing the evidence using specialized tools and techniques to uncover relevant information.
Presenting the findings in a clear an...read more
Q11. What are Storage classes
Storage classes in programming define the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are local to a block and have automatic storage duration.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and can be accessed by multiple files.
Q12. What is polymorphism
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have different subclasses like circle, square, triangle, etc. and all of them can be treated as shapes.
Example: A method can have different implementations in different classes but can be called using the same name.
Example: The + o...read more
Q13. Find a duplicate character in a string
Find a duplicate character in a string
Iterate through the string and store each character in a hash set
If a character is already in the hash set, it is a duplicate
Q14. String reverse c program
A C program to reverse a given string.
Declare a character array to store the input string.
Use a loop to iterate through the string and swap the characters.
Print the reversed string.
Q15. What is n-tier architecture
n-tier architecture is a software design pattern that divides an application into logical layers.
It separates presentation, application processing, and data management functions.
Each layer can be developed and maintained independently.
Examples include 3-tier and 4-tier architectures.
It improves scalability, maintainability, and flexibility of the application.
Q16. SIEM tools and its use
SIEM tools are security information and event management tools used to collect, analyze, and report on security data.
SIEM tools help organizations to detect and respond to security incidents in real-time.
They collect data from various sources such as network devices, servers, and applications.
SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
SIEM tools provide...read more
Q17. Swap number in macro
Swapping two numbers using macro in C language
Use a temporary variable to store the value of one number
Assign the value of the second number to the first number
Assign the value of the temporary variable to the second number
Define a macro for swapping the numbers
Example: #define SWAP(a,b) {int temp; temp=a; a=b; b=temp;}
Q18. how we find MHR
MHR can be found using the formula 220 - age.
MHR = 220 - age
MHR stands for Maximum Heart Rate
It is a rough estimate of the maximum number of times your heart should beat per minute during exercise
Q19. Coding output on pointers
Coding output on pointers
Pointers are variables that store memory addresses
Dereferencing a pointer retrieves the value stored at the memory address
Pointer arithmetic can be used to access elements of an array
Null pointers point to no memory address
Wild pointers point to arbitrary memory addresses
Q20. Explain linked list
A linked list is a data structure where each element points to the next element in the sequence.
Consists of nodes where each node contains data and a reference to the next node
Can be singly linked (each node points to the next node) or doubly linked (each node points to both the next and previous nodes)
Allows for dynamic memory allocation and efficient insertion/deletion operations
Top HR Questions asked in Wipro Senior Engineer
Interview Process at Wipro Senior Engineer

Top Senior Engineer Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

