Add office photos
Engaged Employer

Wipro

3.7
based on 54.4k Reviews
Video summary
Filter interviews by

20+ Sri Sainath International School Interview Questions and Answers

Updated 23 Mar 2025
Popular Designations

Q1. What is vpn and ipsec, ipsec tunnels troubleshooting

Ans.

VPN is a secure connection between two networks. IPsec is a protocol used to secure the VPN connection.

  • VPN allows remote access to a network through a secure connection

  • IPsec provides encryption and authentication for the VPN connection

  • IPsec tunnels can be troubleshooted by checking the configuration, verifying the network topology, and checking for any firewall or NAT issues

  • Examples of VPN technologies include OpenVPN, Cisco AnyConnect, and Microsoft DirectAccess

Add your answer

Q2. Which routing protocal are you comfortable

Ans.

I am comfortable with OSPF and BGP routing protocols.

  • I have experience in configuring and troubleshooting OSPF and BGP.

  • I am familiar with OSPF areas, LSAs, and BGP attributes.

  • I have worked with OSPF and BGP in both enterprise and service provider networks.

  • I understand the differences between OSPF and BGP and when to use each protocol.

  • I am also familiar with other routing protocols such as EIGRP and RIP.

Add your answer

Q3. What is difference between c and c++

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports classes and objects while C does not.

  • C++ has better support for polymorphism and inheritance.

  • C++ has a standard template library (STL) while C does not.

  • C++ allows function overloading while C does not.

  • C++ has exception handling while C does not.

Add your answer

Q4. Explain STP , what is bpdu guard and bpdu filter

Ans.

STP is a protocol used to prevent network loops. BPDU guard and filter are STP features to enhance network stability.

  • STP stands for Spanning Tree Protocol

  • It is used to prevent network loops by creating a loop-free logical topology

  • BPDU (Bridge Protocol Data Unit) is a message exchanged between switches to elect the root bridge and determine the best path to it

  • BPDU guard is a feature that disables a port if it receives a BPDU, preventing loops caused by unauthorized switches

  • BPD...read more

Add your answer
Discover Sri Sainath International School interview dos and don'ts from real experiences

Q5. Identification mechanism in Tosca

Ans.

Tosca uses unique identification mechanism called TBox to identify objects and their properties.

  • TBox is a unique identifier used by Tosca to identify objects and their properties

  • It is a combination of the object name and its properties

  • TBox is used to create reusable test cases and reduce maintenance efforts

  • Example: TBox for a button on a webpage could be 'Button_Login_Click'

  • Tosca also uses XScan to identify objects based on their visual appearance

Add your answer

Q6. are you written a playbooks rules

Ans.

Yes, I have experience writing playbooks rules for automation in various engineering projects.

  • Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.

  • I have experience creating rule-based automation scripts to streamline engineering processes.

  • I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.

Add your answer
Are these interview questions helpful?

Q7. What is data abstraction

Ans.

Data abstraction is the process of hiding implementation details and showing only the necessary information to the user.

  • It is a way of organizing complex systems

  • It allows users to interact with complex systems without needing to understand the underlying details

  • It helps to reduce complexity and increase efficiency

  • Examples include object-oriented programming and APIs

Add your answer

Q8. Different Manufacturing Process selection

Ans.

Different manufacturing processes are selected based on factors like cost, quality, production volume, and material properties.

  • Consider cost implications of each manufacturing process

  • Evaluate quality requirements and capabilities of each process

  • Take into account production volume and efficiency of each process

  • Analyze material properties and compatibility with each process

  • Examples: Injection molding for high volume plastic parts, CNC machining for precision metal components

Add your answer
Share interview questions and help millions of jobseekers šŸŒŸ

Q9. What is oops?

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPs focuses on creating objects that contain both data and functions to manipulate that data.

  • It emphasizes on encapsulation, inheritance, and polymorphism.

  • Examples of OOPs languages are Java, C++, Python, etc.

Add your answer

Q10. Digital forensics working procedures

Ans.

Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.

  • Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.

  • Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.

  • Analyzing the evidence using specialized tools and techniques to uncover relevant information.

  • Presenting the findings in a clear an...read more

Add your answer

Q11. What are Storage classes

Ans.

Storage classes in programming define the scope and lifetime of variables.

  • Storage classes include auto, register, static, and extern.

  • Auto variables are local to a block and have automatic storage duration.

  • Register variables are stored in CPU registers for faster access.

  • Static variables retain their value between function calls.

  • Extern variables are declared outside of any function and can be accessed by multiple files.

Add your answer

Q12. What is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms.

  • It allows objects of different classes to be treated as if they were objects of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A shape class can have different subclasses like circle, square, triangle, etc. and all of them can be treated as shapes.

  • Example: A method can have different implementations in different classes but can be called using the same name.

  • Example: The + o...read more

Add your answer

Q13. Find a duplicate character in a string

Ans.

Find a duplicate character in a string

  • Iterate through the string and store each character in a hash set

  • If a character is already in the hash set, it is a duplicate

Add your answer

Q14. String reverse c program

Ans.

A C program to reverse a given string.

  • Declare a character array to store the input string.

  • Use a loop to iterate through the string and swap the characters.

  • Print the reversed string.

Add your answer

Q15. What is n-tier architecture

Ans.

n-tier architecture is a software design pattern that divides an application into logical layers.

  • It separates presentation, application processing, and data management functions.

  • Each layer can be developed and maintained independently.

  • Examples include 3-tier and 4-tier architectures.

  • It improves scalability, maintainability, and flexibility of the application.

Add your answer

Q16. SIEM tools and its use

Ans.

SIEM tools are security information and event management tools used to collect, analyze, and report on security data.

  • SIEM tools help organizations to detect and respond to security incidents in real-time.

  • They collect data from various sources such as network devices, servers, and applications.

  • SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.

  • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

  • SIEM tools provide...read more

Add your answer

Q17. Swap number in macro

Ans.

Swapping two numbers using macro in C language

  • Use a temporary variable to store the value of one number

  • Assign the value of the second number to the first number

  • Assign the value of the temporary variable to the second number

  • Define a macro for swapping the numbers

  • Example: #define SWAP(a,b) {int temp; temp=a; a=b; b=temp;}

Add your answer

Q18. how we find MHR

Ans.

MHR can be found using the formula 220 - age.

  • MHR = 220 - age

  • MHR stands for Maximum Heart Rate

  • It is a rough estimate of the maximum number of times your heart should beat per minute during exercise

Add your answer

Q19. What is san and nas

Ans.

SAN (Storage Area Network) and NAS (Network Attached Storage) are both storage solutions for managing data in networks.

  • SAN provides block-level storage, ideal for high-performance applications like databases.

  • NAS offers file-level storage, suitable for sharing files across multiple users and devices.

  • Example of SAN: Fibre Channel SAN used in enterprise data centers.

  • Example of NAS: A Synology NAS used for home media storage.

Add your answer

Q20. What is netapp

Ans.

NetApp is a data management and storage solutions company, specializing in cloud data services and enterprise storage systems.

  • Founded in 1992, NetApp is known for its innovative data storage solutions.

  • Their flagship product, ONTAP, provides data management across on-premises and cloud environments.

  • NetApp offers cloud services like Cloud Volumes ONTAP, enabling seamless data migration to the cloud.

  • They focus on data protection, backup, and recovery solutions, ensuring business...read more

Add your answer

Q21. Coding output on pointers

Ans.

Coding output on pointers

  • Pointers are variables that store memory addresses

  • Dereferencing a pointer retrieves the value stored at the memory address

  • Pointer arithmetic can be used to access elements of an array

  • Null pointers point to no memory address

  • Wild pointers point to arbitrary memory addresses

Add your answer

Q22. Explain linked list

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Consists of nodes where each node contains data and a reference to the next node

  • Can be singly linked (each node points to the next node) or doubly linked (each node points to both the next and previous nodes)

  • Allows for dynamic memory allocation and efficient insertion/deletion operations

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Sri Sainath International School

based on 25 interviews
4 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Engineer Interview Questions from Similar Companies

3.3
Ā ā€¢Ā 30 Interview Questions
3.7
Ā ā€¢Ā 25 Interview Questions
3.7
Ā ā€¢Ā 25 Interview Questions
4.2
Ā ā€¢Ā 18 Interview Questions
3.8
Ā ā€¢Ā 15 Interview Questions
3.8
Ā ā€¢Ā 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ā¤ļø in India. Trademarks belong to their respective owners. All rights reserved Ā© 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter