Wipro
60+ Corporate Minds Interview Questions and Answers
Q1. What automation framework have you worked on?
I have worked on multiple automation frameworks including Selenium, Appium, and TestNG.
I have experience in creating and maintaining automated test scripts using Selenium WebDriver for web applications.
I have also worked with Appium for mobile automation testing.
TestNG has been my preferred choice for test management and reporting.
I have also integrated automation scripts with CI/CD pipelines using tools like Jenkins.
I have experience in creating custom frameworks using Java ...read more
Q2. How to make a thread safe object in Java?
To make a thread safe object in Java, use synchronization or locks.
Use synchronized keyword to ensure only one thread can access the object at a time.
Use locks to provide more fine-grained control over synchronization.
Use thread-safe data structures like ConcurrentHashMap or AtomicInteger.
Avoid using static variables or mutable shared state.
Consider using immutable objects or thread-local variables.
Test the thread safety of your code using tools like JUnit or stress testing.
D...read more
Q3. How to achieve parallel testing in selenium using Java?
Achieve parallel testing in Selenium using Java
Use TestNG framework to execute tests in parallel
Create multiple instances of WebDriver
Use ThreadLocal to maintain thread safety
Use Selenium Grid to distribute tests across multiple machines
Configure TestNG XML file to specify parallel execution mode
Q4. 5) what all db activities can be part of transaction group ?
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
Q5. What is Singleton pattern and how to implement it?
Singleton pattern restricts the instantiation of a class to one object.
Create a private constructor to restrict object creation.
Create a static method to return the single instance of the class.
Use lazy initialization to create the instance only when needed.
Ensure thread safety by using synchronized keyword or double-checked locking.
Commonly used in database connections, logging, and configuration settings.
Q6. what is EC2 ? why you used it ? How you build and deploy on AWS ?
EC2 is a web service that provides resizable compute capacity in the cloud.
EC2 stands for Elastic Compute Cloud
It allows users to rent virtual computers on which to run their own applications
EC2 instances can be easily scaled up or down based on demand
To build and deploy on AWS, one can use services like AWS CodeDeploy, AWS CodePipeline, and AWS Elastic Beanstalk
Q7. Explain about Adapter Design pattern ? Why you have used it and explain in depth ? Is it possible to replace it ?
Adapter pattern converts the interface of a class into another interface that clients expect.
Adapter pattern is used to make incompatible interfaces work together.
It is used when we want to reuse an existing class that doesn't have the interface we need.
It involves creating a wrapper class that translates the interface of one class into another interface.
An example is using a USB to Ethernet adapter to connect a computer to a network.
It is possible to replace it with other pa...read more
Q8. 3) how to achieve load balance and fault tolerance while deploying an application ?
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechanisms like automatic failover and replication.
Regularly moni...read more
Q9. How can you replace exists legacy monolithic application with microservices ?
Legacy monolithic applications can be replaced with microservices by breaking down the application into smaller, independent services.
Identify the different functionalities of the monolithic application
Break down the application into smaller, independent services
Use APIs to communicate between the services
Implement containerization and orchestration for scalability and reliability
Gradually migrate functionality to microservices while maintaining backwards compatibility
Example...read more
Q10. WHAT IS HASHING ? AND HASH MAP IN DETAILS ALONG WITH Balanced tree
Hashing is a technique to map data to a fixed size array. Hash Map is a data structure that uses hashing to store key-value pairs.
Hashing is used to quickly retrieve data from a large dataset
Hash function maps data to a fixed size array index
Collisions can occur when multiple data points map to the same index
Hash Map uses key-value pairs to store and retrieve data
Balanced tree is an alternative to Hash Map for efficient data retrieval
Q11. 4) Difference between shared and job shared variable ?
Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.
Shared variables are used to share data between tasks in a process.
Job shared variables are used to share data between tasks in a specific job.
Shared variables can cause race conditions and should be used with caution.
Job shared variables are useful for passing data between tasks in a job without affecting other jobs.
Q12. How will you perform risk assessment for an application.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
Q13. What is collections framework in java?
Collections framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects in Java.
It includes interfaces like List, Set, and Map
It provides implementations of these interfaces like ArrayList, HashSet, and HashMap
It allows for easy manipulation and sorting of collections
It is part of the Java Collections API
Example: List
names = new ArrayList<>(); Example: Map
ages = new HashMap<>();
Q14. Magento 2 : What is proxy design pattern and used case
Proxy design pattern is a structural pattern that provides a surrogate or placeholder for another object to control access to it.
Used to provide a level of indirection when accessing an object
Can be used to implement lazy loading, caching, access control, etc.
Example: Magento 2 uses proxy pattern to load product data only when it is needed
Example: Proxy pattern can be used to restrict access to sensitive data or resources
Q15. find integer of array , that is not present in given array ?
Finding an integer not present in a given array.
Iterate through the array and mark the presence of each integer in a hash table.
Then iterate through the hash table to find the missing integer.
Alternatively, sort the array and iterate through to find the first missing integer.
Q16. Magento 2: What s dependency Injection elaborate it
Dependency Injection is a design pattern used in Magento 2 to inject dependencies into a class.
Dependency Injection is a way to achieve loose coupling between classes.
It allows for easier testing and maintenance of code.
In Magento 2, dependencies are injected through constructor or setter methods.
Example: injecting a logger object into a class that needs to log messages.
Q17. What is DataParameter in TestNG?
DataParameter is a TestNG annotation used to pass data to test methods.
DataParameter is used to pass data to test methods in TestNG
It is used in conjunction with DataProvider to provide test data
DataParameter can be used to pass multiple parameters to a test method
Example: @Test(dataProvider = "dp", dataProviderClass = TestData.class)
Example: public void testMethod(@DataParameter("username") String username, @DataParameter("password") String password)
Q18. How to config dns sinkhole for malicious domains on palo alto?
Configuring DNS sinkhole for malicious domains on Palo Alto
Create a security policy to block traffic to malicious domains
Configure DNS sinkhole profile with the list of malicious domains
Enable DNS sinkhole in the security policy
Monitor the logs for any blocked traffic
Update the list of malicious domains regularly
Q19. Use a anti malware profile and call the edl with domains in it. On security acl call this antimalware profile and send them to sinkhole IPs.
To implement anti-malware profile, call EDL with domains and send to sinkhole IPs via security ACL.
Create an anti-malware profile with appropriate settings
Create an EDL with domains to be blocked
Create a security ACL and call the anti-malware profile in it
Add the EDL to the security ACL and send traffic to sinkhole IPs
Regularly update the EDL with new domains
Q20. Get final amount in transaction table wherein we have two other table credit and debit
To get the final amount in the transaction table, we need to consider the amounts from both the credit and debit tables.
Join the transaction table with the credit and debit tables on a common key, such as transaction ID.
Sum up the amounts from the credit table and subtract the sum of amounts from the debit table to get the final amount.
Consider handling cases where there may be multiple transactions for the same ID in the credit and debit tables.
Q21. What are the various troubleshooting activities you have done as a Websphere admin
As a Websphere admin, I have performed troubleshooting activities such as analyzing logs, checking configurations, and investigating performance issues.
Analyzed server logs to identify errors or warnings
Checked configuration settings to ensure they are correct
Investigated performance issues by monitoring resource usage and analyzing bottlenecks
Q22. What is nagative test case and positive test case
Positive test cases verify expected behavior while negative test cases verify unexpected behavior.
Positive test cases test for expected behavior
Negative test cases test for unexpected behavior
Examples: Positive - login with correct credentials, Negative - login with incorrect credentials
Q23. CRUL REST Security for website How we can make website fater
To make a website faster, optimize code, use caching, compress files, and minimize HTTP requests.
Optimize code by removing unnecessary code, using efficient algorithms, and reducing database queries.
Use caching to store frequently accessed data and reduce server load.
Compress files to reduce their size and minimize HTTP requests.
Minimize HTTP requests by combining files, using CSS sprites, and reducing the number of images and scripts.
Use a content delivery network (CDN) to d...read more
Q24. Duplicate Records elimination in hive table
Use DISTINCT keyword in SELECT query to eliminate duplicate records in a Hive table
Use SELECT DISTINCT * FROM table_name to retrieve unique records
Consider using GROUP BY clause with appropriate columns to eliminate duplicates
Utilize the ROW_NUMBER() window function to assign a unique row number to each record and filter out duplicates
Q25. Have you worked on "API management tools"?
Yes, I have worked on API management tools.
I have experience with tools like Apigee, Kong, and AWS API Gateway.
I have worked on designing and implementing APIs, setting up security and access controls, and monitoring API usage.
I have also integrated APIs with various backend systems and third-party services.
I am familiar with API documentation and versioning best practices.
Overall, I have a strong understanding of the API lifecycle and how to manage it effectively.
Q26. Chaining comparing using java 8 for object ?
Chaining comparing using java 8 for object
Java 8 introduced the Comparator interface with default and static methods for chaining comparisons
The thenComparing() method is used to chain multiple comparisons
Example: Comparator.comparing(Object::getName).thenComparing(Object::getAge)
Q27. Design Pattern used in your project ?
Singleton design pattern was used in the project.
Singleton pattern ensures that only one instance of a class is created and provides a global point of access to it.
It is useful when there is a need for a single instance of a class that can be accessed globally.
Example: A Logger class that needs to be accessed from multiple parts of the project.
Q28. Hive table loads on incremental process
Hive table loads can be done incrementally by using partitioning or by using timestamp columns.
Partition the table based on a column like date or timestamp to load data incrementally
Use dynamic partition inserts to add new data to specific partitions
Utilize timestamp columns to filter and load only new data
Consider using tools like Apache NiFi or Apache Sqoop for efficient incremental data loading
Q29. What is SOX Compliance
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal action, and damage to a company's reputation
Q30. What are SOD and how you implement them?
SOD stands for Separation of Duties. It is a security principle that ensures no single individual has complete control over a critical process.
SOD is implemented by dividing tasks and responsibilities among multiple individuals or roles.
It helps prevent fraud, errors, and misuse of privileges.
For example, in a software development team, the developer should not have access to production servers.
Implementing SOD requires defining roles, assigning responsibilities, and enforcin...read more
Q31. What is IDAM and why we need it?
IDAM stands for Identity and Access Management. It is a framework of policies and technologies that ensure the right individuals have access to the right resources at the right time.
IDAM helps organizations manage user identities, roles, and access privileges.
It provides a centralized system for authentication, authorization, and user provisioning.
IDAM improves security by enforcing strong access controls and reducing the risk of unauthorized access.
It enhances productivity b...read more
Q32. Explain the concepts of index contention, key constraints
Index contention occurs when multiple transactions are trying to access the same index simultaneously, leading to performance issues. Key constraints enforce rules on the values that can be inserted into a column.
Index contention can occur when multiple transactions are trying to access the same index for read or write operations simultaneously.
This can lead to performance issues such as increased response times and decreased throughput.
Key constraints define rules on the val...read more
Q33. What is Spring boot, and why it is used?
Spring Boot is a Java-based framework used for building standalone, production-grade applications.
Spring Boot provides a simpler and faster way to set up, configure, and run both web and non-web applications.
It eliminates the need for XML configurations and boilerplate code.
It comes with embedded servers like Tomcat, Jetty, and Undertow, making it easy to deploy applications.
It provides a wide range of starter projects for different types of applications, such as RESTful web ...read more
Q34. What is advantages of spring boot
Spring Boot provides rapid application development and microservices architecture.
Easy configuration and setup
Embedded servers for faster development
Auto-configuration of dependencies
Supports multiple data sources
Promotes microservices architecture
Provides a wide range of plugins and extensions
Facilitates easy testing and debugging
Reduces boilerplate code
Improves productivity and efficiency
Q35. How to find employee with no boss
To find an employee with no boss, search for employees whose boss ID is null or not in the employee list.
Check the employee list for any null boss IDs.
Check if any boss IDs are not present in the employee list.
Use a SQL query or programming language to filter the employees with no boss.
Consider the possibility of multiple employees having no boss.
Check for any circular references in the boss-employee hierarchy.
Q36. What is authorization in .net core
Authorization in .NET Core is the process of determining what a user is allowed to do within an application.
Authorization is the process of checking if a user has the necessary permissions to perform a certain action.
In .NET Core, authorization can be implemented using attributes like [Authorize] on controllers or actions.
Authorization can also be done programmatically by checking roles or policies.
Examples of authorization include allowing only administrators to access certa...read more
Q37. What is the main role of CISO?
The main role of a CISO (Chief Information Security Officer) is to ensure the security of an organization's information and technology assets.
Developing and implementing information security policies and procedures
Identifying and assessing potential security risks and vulnerabilities
Creating and managing security incident response plans
Overseeing the implementation and maintenance of security controls
Educating and training employees on security best practices
Monitoring and an...read more
Q38. What is 4 pillar of OOPS?
4 pillars of OOPS are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together and restricting access to them.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of an object to take many forms and perform different actions based on context.
Q39. Docker and its uses in devops
Docker is a containerization platform used in devops to package, distribute, and run applications in isolated environments.
Docker allows for easy packaging and distribution of applications with all dependencies included
Containers created with Docker are lightweight and portable, making them easy to deploy across different environments
Docker simplifies the process of managing and scaling applications in a devops environment
Docker can be used for continuous integration and cont...read more
Q40. What's the use of volatile keyword
Volatile keyword is used to indicate that a variable's value can be changed unexpectedly.
It ensures that the variable is always read from memory, not from cache
It is useful in multi-threaded environments where multiple threads may access the same variable
It is not recommended to use volatile for synchronization purposes
Example: volatile int count = 0;
Q41. What's ISO 27K
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Q42. Difference between composer and composer lock
Composer is a dependency manager for PHP, while composer.lock is a file that locks dependencies to specific versions.
Composer is used to manage dependencies in PHP projects
Composer.lock file locks dependencies to specific versions to ensure consistency
Composer.json file lists all the dependencies and their versions
Running 'composer install' installs dependencies listed in composer.lock file
Q43. S3 and type and IAM ?
S3 is a cloud storage service provided by AWS. IAM is used to manage access to AWS resources.
S3 is an object storage service that allows you to store and retrieve data from anywhere on the web.
S3 provides durability, availability, and scalability for your data.
IAM is used to manage access to AWS resources by creating and managing users, groups, and roles.
IAM allows you to control who can access your AWS resources and what actions they can perform.
Q44. Spark optimization techniques
Spark optimization techniques involve various strategies to improve performance and efficiency.
Use partitioning to distribute data evenly
Cache intermediate results for reuse
Avoid shuffling data unnecessarily
Optimize joins by broadcasting smaller tables
Use appropriate data serialization formats
Q45. Garbage collector changes in java 11
Java 11 introduced a new garbage collector called Epsilon.
Java 11 introduced a new experimental garbage collector called Epsilon, which is a no-op garbage collector.
Epsilon is designed for applications that do not require garbage collection, essentially turning off the garbage collector.
This can be useful for performance testing or short-lived applications where the overhead of garbage collection is not needed.
Q46. What is PCI DSS
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access control, and regular monitoring and testing.
Compliance wi...read more
Q47. What is Data hiding?
Data hiding is a technique to hide the implementation details of an object from the outside world.
It is a way to protect the data from being modified by external sources.
It helps in achieving encapsulation and abstraction.
It is implemented using access modifiers like private, protected, and public.
Example: In a class, the private variables can only be accessed by the methods of that class.
Example: In a banking application, the account balance should be hidden from the user in...read more
Q48. What is database Testcases
Database testcases are a set of steps to verify the functionality and performance of a database.
Database testcases ensure data integrity and consistency.
They test CRUD operations, data retrieval, and query performance.
Testcases can be automated or manual, and should cover edge cases and error handling.
Examples of database testcases include testing for duplicate records, testing for null values, and testing for data validation rules.
Q49. Differences between Drupal 7 and 9
Drupal 7 and 9 have significant differences in terms of technology, features, and performance.
Drupal 9 has removed deprecated code from Drupal 7 and introduced new features like the Layout Builder and Claro admin theme.
Drupal 9 requires PHP 7.3 or higher, while Drupal 7 supports PHP 5.6.
Drupal 9 has improved performance and security compared to Drupal 7.
Drupal 9 has better support for modern web technologies like HTML5 and CSS3.
Drupal 9 has a more streamlined upgrade process ...read more
Q50. Tell me on Performance tuning
Performance tuning involves optimizing software or hardware to improve its speed and efficiency.
Identify bottlenecks in the system
Optimize code and algorithms
Use caching and indexing
Upgrade hardware or infrastructure
Monitor and analyze performance metrics
Consider load testing and stress testing
Continuously review and improve performance
Q51. 2.Hybrid Identity Synchronization steps
Hybrid Identity Synchronization steps
Configure Azure AD Connect on on-premises server
Select synchronization options and configure filtering
Configure AD FS for single sign-on
Verify synchronization and troubleshoot any issues
Q52. What is solid principle
SOLID principles are a set of five design principles in object-oriented programming to make software more maintainable, flexible, and scalable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
I - ...read more
Q53. what is abstract class
Abstract class is a class that cannot be instantiated and is used as a blueprint for other classes to inherit from.
Cannot be instantiated on its own
Can have abstract methods that must be implemented by subclasses
Can have non-abstract methods that can be inherited by subclasses
Q54. what is interface and benefits
An interface is a contract that defines the methods that a class must implement. Benefits include code reusability, flexibility, and abstraction.
Interfaces allow for multiple inheritance in programming languages that do not support it, like Java.
Interfaces promote code reusability by allowing different classes to implement the same interface.
Interfaces provide flexibility by allowing classes to change their behavior without affecting other classes.
Interfaces promote abstracti...read more
Q55. software development design pattern
Software design patterns are reusable solutions to common problems in software design.
Design patterns help in creating maintainable and scalable software.
Examples include Singleton, Factory, Observer, and Strategy patterns.
Each design pattern has a specific purpose and structure to solve a particular problem.
Design patterns promote code reusability, flexibility, and modularity.
Q56. Write programs of sorting arrays
Implement sorting algorithms for arrays of strings
Use built-in sorting functions like sort() in languages like Python or Java
Implement custom sorting algorithms like bubble sort, merge sort, or quick sort
Consider the time complexity and space complexity of each sorting algorithm
Q57. Explain cluster failover process
Cluster failover is the process of transferring control from a failed node to a healthy node in a cluster.
Cluster failover is triggered when a node in the cluster fails or becomes unresponsive.
The cluster manager detects the failure and initiates the failover process.
The failover process involves transferring the workload and resources from the failed node to a healthy node.
The healthy node takes over the responsibilities of the failed node and resumes normal operations.
The f...read more
Q58. Overall datawarehouse solution
An overall datawarehouse solution is a centralized repository of data that is used for reporting and analysis.
Designing and implementing a data model
Extracting, transforming, and loading data from various sources
Creating and maintaining data quality and consistency
Providing tools for reporting and analysis
Ensuring data security and privacy
Q59. Data Lake storage concept
Data Lake is a centralized repository that allows storage of structured and unstructured data at any scale.
Data Lake is designed to store raw data in its native format.
It allows for easy access and analysis of data using various tools and technologies.
Data Lake can store structured, semi-structured, and unstructured data.
It can be used for various purposes such as data analytics, machine learning, and data warehousing.
Examples of Data Lake storage solutions include Amazon S3,...read more
Q60. What is immutability
Immutability is the concept of objects whose state cannot be modified after creation.
Immutability ensures that once an object is created, its state cannot be changed.
Immutable objects are thread-safe and can be shared without the risk of unintended modifications.
Examples of immutable objects include String and Integer in Java.
Q61. Diff between struct and class
Struct is a value type while class is a reference type in C#.
Structs are value types stored on stack, classes are reference types stored on heap.
Structs cannot be inherited, classes can be inherited.
Structs do not support inheritance, polymorphism, or virtual methods.
Structs are typically used for small data structures with few properties.
Classes are used for larger, more complex objects with behavior.
Q62. DLP Architecture and features
DLP architecture and features are designed to protect sensitive data from unauthorized access or disclosure.
DLP stands for Data Loss Prevention.
DLP architecture includes three main components: discovery, monitoring, and enforcement.
Discovery involves identifying sensitive data and where it resides.
Monitoring involves tracking data usage and identifying potential security risks.
Enforcement involves applying policies to prevent unauthorized access or disclosure of sensitive dat...read more
Q63. Security in wep app.cors
CORS (Cross-Origin Resource Sharing) is a security feature in web applications to control which origins can access resources.
CORS is used to prevent unauthorized access to resources on a different domain
It is implemented by the server to specify which origins are allowed to access its resources
CORS headers like Access-Control-Allow-Origin, Access-Control-Allow-Methods, and Access-Control-Allow-Headers are used to control access
For example, setting Access-Control-Allow-Origin:...read more
Q64. Explain Active CISCO recording
Active CISCO recording is a feature that allows real-time recording of phone calls on CISCO phones.
It enables recording of both inbound and outbound calls
Recordings can be accessed and played back from a web interface
It requires a compatible CISCO phone system and recording software
It can be used for training, compliance, and quality assurance purposes
Q65. Spring boot advantages
Spring Boot is a popular Java framework for building microservices and web applications.
Easy to set up and configure
Provides embedded servers like Tomcat, Jetty, and Undertow
Offers a wide range of starter projects for quick development
Supports various data sources and databases
Integrates with other Spring frameworks like Spring Data and Spring Security
Q66. Reql time solution
Real-time solution refers to a system or technology that provides immediate or near-immediate data processing and response.
Real-time solutions require fast data processing and minimal latency.
Examples include real-time analytics, live chat support, and stock market trading systems.
Technologies like Apache Kafka, WebSocket, and MQTT are commonly used for real-time solutions.
Top HR Questions asked in Corporate Minds
Interview Process at Corporate Minds
Top Technical Lead Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month