Add office photos
Wipro logo
Engaged Employer

Wipro

Verified
3.7
based on 53.2k Reviews
Video summary
Filter interviews by
Senior Engineer
Fresher
Experienced
Clear (1)

20+ Wipro Senior Engineer Interview Questions and Answers

Updated 24 Jun 2024

Q1. What is vpn and ipsec, ipsec tunnels troubleshooting

Ans.

VPN is a secure connection between two networks. IPsec is a protocol used to secure the VPN connection.

  • VPN allows remote access to a network through a secure connection

  • IPsec provides encryption and authentication for the VPN connection

  • IPsec tunnels can be troubleshooted by checking the configuration, verifying the network topology, and checking for any firewall or NAT issues

  • Examples of VPN technologies include OpenVPN, Cisco AnyConnect, and Microsoft DirectAccess

Add your answer
right arrow

Q2. Which routing protocal are you comfortable

Ans.

I am comfortable with OSPF and BGP routing protocols.

  • I have experience in configuring and troubleshooting OSPF and BGP.

  • I am familiar with OSPF areas, LSAs, and BGP attributes.

  • I have worked with OSPF and BGP in both enterprise and service provider networks.

  • I understand the differences between OSPF and BGP and when to use each protocol.

  • I am also familiar with other routing protocols such as EIGRP and RIP.

Add your answer
right arrow
Wipro Senior Engineer Interview Questions and Answers for Freshers
illustration image

Q3. What is difference between c and c++

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports classes and objects while C does not.

  • C++ has better support for polymorphism and inheritance.

  • C++ has a standard template library (STL) while C does not.

  • C++ allows function overloading while C does not.

  • C++ has exception handling while C does not.

Add your answer
right arrow

Q4. Explain STP , what is bpdu guard and bpdu filter

Ans.

STP is a protocol used to prevent network loops. BPDU guard and filter are STP features to enhance network stability.

  • STP stands for Spanning Tree Protocol

  • It is used to prevent network loops by creating a loop-free logical topology

  • BPDU (Bridge Protocol Data Unit) is a message exchanged between switches to elect the root bridge and determine the best path to it

  • BPDU guard is a feature that disables a port if it receives a BPDU, preventing loops caused by unauthorized switches

  • BPD...read more

Add your answer
right arrow
Discover Wipro interview dos and don'ts from real experiences

Q5. Identification mechanism in Tosca

Ans.

Tosca uses unique identification mechanism called TBox to identify objects and their properties.

  • TBox is a unique identifier used by Tosca to identify objects and their properties

  • It is a combination of the object name and its properties

  • TBox is used to create reusable test cases and reduce maintenance efforts

  • Example: TBox for a button on a webpage could be 'Button_Login_Click'

  • Tosca also uses XScan to identify objects based on their visual appearance

Add your answer
right arrow

Q6. are you written a playbooks rules

Ans.

Yes, I have experience writing playbooks rules for automation in various engineering projects.

  • Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.

  • I have experience creating rule-based automation scripts to streamline engineering processes.

  • I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.

Add your answer
right arrow
Are these interview questions helpful?

Q7. What is data abstraction

Ans.

Data abstraction is the process of hiding implementation details and showing only the necessary information to the user.

  • It is a way of organizing complex systems

  • It allows users to interact with complex systems without needing to understand the underlying details

  • It helps to reduce complexity and increase efficiency

  • Examples include object-oriented programming and APIs

Add your answer
right arrow

Q8. Different Manufacturing Process selection

Ans.

Different manufacturing processes are selected based on factors like cost, quality, production volume, and material properties.

  • Consider cost implications of each manufacturing process

  • Evaluate quality requirements and capabilities of each process

  • Take into account production volume and efficiency of each process

  • Analyze material properties and compatibility with each process

  • Examples: Injection molding for high volume plastic parts, CNC machining for precision metal components

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. What is oops?

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPs focuses on creating objects that contain both data and functions to manipulate that data.

  • It emphasizes on encapsulation, inheritance, and polymorphism.

  • Examples of OOPs languages are Java, C++, Python, etc.

Add your answer
right arrow

Q10. Digital forensics working procedures

Ans.

Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.

  • Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.

  • Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.

  • Analyzing the evidence using specialized tools and techniques to uncover relevant information.

  • Presenting the findings in a clear an...read more

Add your answer
right arrow

Q11. What are Storage classes

Ans.

Storage classes in programming define the scope and lifetime of variables.

  • Storage classes include auto, register, static, and extern.

  • Auto variables are local to a block and have automatic storage duration.

  • Register variables are stored in CPU registers for faster access.

  • Static variables retain their value between function calls.

  • Extern variables are declared outside of any function and can be accessed by multiple files.

Add your answer
right arrow

Q12. What is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms.

  • It allows objects of different classes to be treated as if they were objects of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A shape class can have different subclasses like circle, square, triangle, etc. and all of them can be treated as shapes.

  • Example: A method can have different implementations in different classes but can be called using the same name.

  • Example: The + o...read more

Add your answer
right arrow

Q13. Find a duplicate character in a string

Ans.

Find a duplicate character in a string

  • Iterate through the string and store each character in a hash set

  • If a character is already in the hash set, it is a duplicate

Add your answer
right arrow

Q14. String reverse c program

Ans.

A C program to reverse a given string.

  • Declare a character array to store the input string.

  • Use a loop to iterate through the string and swap the characters.

  • Print the reversed string.

Add your answer
right arrow

Q15. What is n-tier architecture

Ans.

n-tier architecture is a software design pattern that divides an application into logical layers.

  • It separates presentation, application processing, and data management functions.

  • Each layer can be developed and maintained independently.

  • Examples include 3-tier and 4-tier architectures.

  • It improves scalability, maintainability, and flexibility of the application.

Add your answer
right arrow

Q16. SIEM tools and its use

Ans.

SIEM tools are security information and event management tools used to collect, analyze, and report on security data.

  • SIEM tools help organizations to detect and respond to security incidents in real-time.

  • They collect data from various sources such as network devices, servers, and applications.

  • SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.

  • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

  • SIEM tools provide...read more

Add your answer
right arrow

Q17. Swap number in macro

Ans.

Swapping two numbers using macro in C language

  • Use a temporary variable to store the value of one number

  • Assign the value of the second number to the first number

  • Assign the value of the temporary variable to the second number

  • Define a macro for swapping the numbers

  • Example: #define SWAP(a,b) {int temp; temp=a; a=b; b=temp;}

Add your answer
right arrow

Q18. how we find MHR

Ans.

MHR can be found using the formula 220 - age.

  • MHR = 220 - age

  • MHR stands for Maximum Heart Rate

  • It is a rough estimate of the maximum number of times your heart should beat per minute during exercise

Add your answer
right arrow

Q19. Coding output on pointers

Ans.

Coding output on pointers

  • Pointers are variables that store memory addresses

  • Dereferencing a pointer retrieves the value stored at the memory address

  • Pointer arithmetic can be used to access elements of an array

  • Null pointers point to no memory address

  • Wild pointers point to arbitrary memory addresses

Add your answer
right arrow

Q20. Explain linked list

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Consists of nodes where each node contains data and a reference to the next node

  • Can be singly linked (each node points to the next node) or doubly linked (each node points to both the next and previous nodes)

  • Allows for dynamic memory allocation and efficient insertion/deletion operations

Add your answer
right arrow
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Wipro Senior Engineer

based on 23 interviews
4 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Engineer Interview Questions from Similar Companies

LTIMindtree Logo
3.8
 • 25 Interview Questions
Target Logo
4.2
 • 18 Interview Questions
Senvion Logo
4.0
 • 12 Interview Questions
Adani Infra Logo
3.9
 • 12 Interview Questions
View all
Recently Viewed
INTERVIEWS
GE Healthcare
No Interviews
INTERVIEWS
E-RING IT SOLUTIONS
No Interviews
SALARIES
DeCurtis Corporation
INTERVIEWS
E-RING IT SOLUTIONS
No Interviews
SALARIES
GE Healthcare
INTERVIEWS
Huawei Technologies
No Interviews
INTERVIEWS
Ramco Systems
No Interviews
INTERVIEWS
Cerium Systems
No Interviews
INTERVIEWS
Ramco Systems
No Interviews
INTERVIEWS
GE Healthcare
No Interviews
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter