Wipro
30+ Exeltis Interview Questions and Answers
Q1. What are the difference between EDR and antivirus? What is unique in EDR and also disadvantages of EDR compare AV.
EDR and antivirus differ in their approach to threat detection and response.
EDR focuses on detecting and responding to advanced threats that may evade traditional antivirus solutions.
EDR uses behavioral analysis and machine learning to identify suspicious activity and respond in real-time.
Antivirus primarily relies on signature-based detection to identify known threats.
EDR provides more detailed information about the nature and scope of an attack, allowing for more effective ...read more
Q2. What is Javascript and how it is different from other programming languages?
JavaScript is a scripting language used for web development.
JavaScript is used to add interactivity to web pages.
It is a client-side language that runs on the user's browser.
JavaScript is different from other programming languages as it is interpreted rather than compiled.
It is also a loosely typed language, meaning variables can change data types.
Examples of JavaScript frameworks include React, Angular, and Vue.
Q3. Why do you prefer react native and how it is different from Angular?
React Native is preferred for its cross-platform capabilities and ease of use. It differs from Angular in its component-based architecture.
React Native allows for building mobile apps for both iOS and Android platforms using a single codebase.
React Native uses a component-based architecture, making it easier to manage and reuse code.
Angular is a full-fledged framework with a steeper learning curve compared to React Native.
React Native has a larger community and more resources...read more
Q4. What is load balancer how it works and how many types of load banancer
A load balancer is a device or software that distributes incoming network traffic across multiple servers to prevent overload and ensure high availability.
Load balancers can be hardware-based or software-based.
They work by monitoring servers and distributing traffic based on factors like server health and current load.
Types of load balancers include round-robin, least connections, IP hash, and more.
Examples of load balancers include F5 BIG-IP, NGINX, and HAProxy.
Q5. What is Stylesheet.create function in react native?
Stylesheet.create is a function in React Native used to create a stylesheet object.
It takes an object as an argument and returns a stylesheet object.
The stylesheet object can be used to style components in React Native.
It is a recommended way to define styles in React Native.
Example: const styles = StyleSheet.create({ container: { flex: 1, backgroundColor: '#fff' } })
The styles object can then be used in components like
Q6. What is redux and how do you use it in react?
Redux is a state management library for JavaScript applications.
Redux helps manage the state of an application in a predictable way.
It uses a single source of truth, called the store, to hold the state of the application.
Actions are dispatched to the store, which then updates the state using reducers.
React components can subscribe to the store to receive updates to the state.
Redux can be used with React using the react-redux library.
Q7. How do create immutable class in java ?
Immutable class in Java can be created by declaring all fields as final and not providing any setters.
Declare all fields as final
Do not provide any setters
Make the class final to prevent subclassing
Ensure that mutable objects passed to the constructor are not modified
Return a new instance of the class instead of modifying the existing one
Q8. How is test strategy different from test plan document
Test strategy defines the overall approach for testing, while the test plan document outlines the specific details and activities of testing.
Test strategy focuses on high-level goals and objectives of testing.
Test plan document provides detailed information on test scope, test objectives, test schedule, test resources, etc.
Test strategy is created early in the project lifecycle.
Test plan document is created after the test strategy is defined.
Test strategy guides the developme...read more
Q9. How do you break a singleton class?
Breaking a singleton class means violating its design pattern by creating multiple instances.
One way to break a singleton class is by using reflection to access its private constructor and creating a new instance.
Another way is by using serialization and deserialization to create multiple instances.
Subclassing the singleton class and creating instances of the subclass can also break the singleton pattern.
Using multithreading and creating instances in different threads can als...read more
Q10. Write a SQL query to get a particular employee's details according to name.
SQL query to retrieve employee details by name
Use SELECT statement to retrieve data
Specify the columns to be selected
Use WHERE clause to filter results by employee name
Q11. Are you aware of script / terraform
Yes, I am aware of both script and Terraform.
I have experience writing scripts in languages like Python, Bash, and PowerShell.
I have used Terraform to automate infrastructure provisioning and management.
I am familiar with creating and managing infrastructure as code using Terraform.
Q12. SpringBoot Rest service produce and consume
SpringBoot Rest service allows producing and consuming data through RESTful APIs.
SpringBoot provides a framework for building RESTful web services.
RESTful APIs allow for easy communication between different systems.
SpringBoot's annotations and auto-configuration make it easy to set up RESTful endpoints.
Examples of producing and consuming data include sending and receiving JSON or XML payloads.
SpringBoot also provides tools for testing and documenting RESTful APIs.
Q13. Project explanation with in detail program examples
I have successfully managed and executed multiple engineering projects, including designing and implementing programs for automation and efficiency.
Managed and executed engineering projects from conception to completion
Designed and implemented programs for automation and efficiency
Utilized project management tools and techniques to ensure successful outcomes
Q14. Application of solid principles, design patterns
Solid principles and design patterns are essential for creating maintainable and scalable software.
Solid principles help in creating modular and flexible code.
Design patterns provide proven solutions to common software design problems.
Examples of solid principles include Single Responsibility Principle, Open-Closed Principle, and Liskov Substitution Principle.
Examples of design patterns include Singleton, Factory, and Observer.
Applying solid principles and design patterns can...read more
Q15. Different types of Transformation used in SSIS
SSIS uses various transformations like Derived Column, Lookup, Merge, etc.
Derived Column: Adds new columns or modifies existing ones based on expressions
Lookup: Retrieves data from a related table based on a common key
Merge: Combines data from multiple sources based on a common key
Aggregate: Performs calculations like sum, average, count, etc. on grouped data
Conditional Split: Routes data based on specified conditions
Q16. How to delete duplicate in Sql
Use the DISTINCT keyword or GROUP BY clause to delete duplicates in SQL.
Use the DISTINCT keyword in a SELECT statement to retrieve unique values.
Use the GROUP BY clause with an aggregate function like COUNT() to remove duplicates.
Consider using the ROW_NUMBER() function to assign a unique number to each row and then filter out duplicates.
Q17. Have you worked on Integration?
Yes, I have worked on Integration in various projects.
I have experience integrating different systems and technologies to work together seamlessly.
I have worked on integrating third-party APIs into existing systems.
I have implemented data integration solutions to streamline processes and improve efficiency.
Q18. Write a Java program for palindrome number
Java program to check if a number is a palindrome
Convert the number to a string for easier comparison
Reverse the string and compare it with the original string
If they are the same, the number is a palindrome
Q19. Internet and future plans in security.
Internet security is crucial for future plans as technology advances.
Internet security threats are increasing with the advancement of technology.
Future plans should include measures to prevent cyber attacks and data breaches.
Encryption and multi-factor authentication are important tools for internet security.
Regular updates and patches should be applied to software and systems to prevent vulnerabilities.
Training and awareness programs should be implemented to educate employee...read more
Q20. For each loop container in SSIS
Loop container in SSIS is used to iterate through a set of tasks or data flow components multiple times.
Loop containers can be used to repeat a set of tasks until a specified condition is met.
They can be configured to loop based on a predefined number of iterations or until a specific condition is true.
Variables can be used within the loop container to control the iteration process.
Common use cases include processing multiple files, rows in a database, or executing a set of t...read more
Q21. Write Java Program for Pallindrum number
Java program to check if a number is a palindrome
Create a function to reverse the number
Compare the reversed number with the original number to check if it is a palindrome
Use modulo and division to extract digits from the number
Q22. Explain Internal working of an hashmap
HashMap is a data structure that stores key-value pairs and uses hashing to map keys to values.
HashMap internally uses an array to store key-value pairs called buckets.
When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.
In case of hash collisions, separate chaining or open addressing techniques are used to handle multiple values at the same index.
HashMap uses a load factor to determine when to resize the array to...read more
Q23. Write String Reversal using recursion
A recursive function to reverse a string.
The base case is when the string is empty or has only one character.
In the recursive case, call the function with the substring excluding the first character and concatenate the first character to the end.
Return the reversed string.
Example: reverseString('hello') returns 'olleh'.
Q24. Skip rows in an excel in SSIS
Use Conditional Split transformation in SSIS to skip rows in Excel
Use Conditional Split transformation in SSIS to evaluate a condition for each row
Set up the condition to skip rows based on a specific criteria, such as row number or value in a column
Redirect the rows that meet the condition to a different output path to effectively skip them
Q25. How start docker containers
Docker containers can be started using the 'docker start' command.
Use the 'docker start' command followed by the container name or ID to start a container.
If the container was previously stopped, use 'docker restart' to start it again.
Containers can also be started with specific options using the 'docker run' command.
For example, to start a container with a specific port mapping: 'docker run -p 8080:80 myimage'
Q26. What is ingress in kubernetes
Ingress in Kubernetes is a way to expose HTTP and HTTPS routes from outside the cluster to services within the cluster.
Ingress is a Kubernetes resource that defines rules for routing external traffic to internal services.
It allows for multiple services to share a single IP address and port combination.
Ingress controllers are responsible for implementing the rules defined in the Ingress resource.
Examples of Ingress controllers include Nginx, Traefik, and Istio.
Ingress can be u...read more
Q27. sql queries for oracle db
SQL queries for Oracle database
Use SELECT statement to retrieve data from tables
Use WHERE clause to filter data based on specific conditions
Use JOIN clause to combine data from multiple tables
Use GROUP BY clause to group data based on specific columns
Use ORDER BY clause to sort data in ascending or descending order
Q28. annotation in spring boot
Annotation in Spring Boot is used to provide metadata about the application's components.
Annotations are used to configure Spring Boot applications and simplify development.
Annotations like @RestController, @Autowired, @RequestMapping are commonly used in Spring Boot.
Annotations help in defining the behavior of components like controllers, services, and repositories.
Q29. Core skill explanation
Core skill explanation
Core skill is a fundamental ability or expertise that is essential for success in a specific role or industry
It is a skill that is central to performing the duties and responsibilities of the job
Examples of core skills for a Senior Project Engineer may include project management, technical expertise, problem-solving, and communication skills
Q30. Flexibility about learning,
I am very flexible and open to learning new things in order to grow and improve in my role as a Senior Project Engineer.
I am always eager to learn new technologies and methodologies to enhance my skills.
I actively seek out training opportunities and workshops to stay current in the field.
I am open to feedback and constructive criticism to continuously improve my work.
I adapt quickly to changing project requirements and am able to pivot when necessary.
For example, I recently t...read more
Top HR Questions asked in Exeltis
Interview Process at Exeltis
Reviews
Interviews
Salaries
Users/Month