Add office photos
Engaged Employer

Wipro

3.7
based on 50.8k Reviews
Filter interviews by

60+ Corporate Minds Interview Questions and Answers

Updated 28 Nov 2024
Popular Designations

Q1. What automation framework have you worked on?

Ans.

I have worked on multiple automation frameworks including Selenium, Appium, and TestNG.

  • I have experience in creating and maintaining automated test scripts using Selenium WebDriver for web applications.

  • I have also worked with Appium for mobile automation testing.

  • TestNG has been my preferred choice for test management and reporting.

  • I have also integrated automation scripts with CI/CD pipelines using tools like Jenkins.

  • I have experience in creating custom frameworks using Java ...read more

View 6 more answers

Q2. How to make a thread safe object in Java?

Ans.

To make a thread safe object in Java, use synchronization or locks.

  • Use synchronized keyword to ensure only one thread can access the object at a time.

  • Use locks to provide more fine-grained control over synchronization.

  • Use thread-safe data structures like ConcurrentHashMap or AtomicInteger.

  • Avoid using static variables or mutable shared state.

  • Consider using immutable objects or thread-local variables.

  • Test the thread safety of your code using tools like JUnit or stress testing.

  • D...read more

View 1 answer

Q3. How to achieve parallel testing in selenium using Java?

Ans.

Achieve parallel testing in Selenium using Java

  • Use TestNG framework to execute tests in parallel

  • Create multiple instances of WebDriver

  • Use ThreadLocal to maintain thread safety

  • Use Selenium Grid to distribute tests across multiple machines

  • Configure TestNG XML file to specify parallel execution mode

Add your answer

Q4. 5) what all db activities can be part of transaction group ?

Ans.

DB activities that can be part of a transaction group

  • Insertion of data into a table

  • Updating data in a table

  • Deletion of data from a table

  • Creating or dropping a table

  • Altering the structure of a table

  • Executing stored procedures

  • Executing functions

  • Executing triggers

View 1 answer
Discover Corporate Minds interview dos and don'ts from real experiences

Q5. What is Singleton pattern and how to implement it?

Ans.

Singleton pattern restricts the instantiation of a class to one object.

  • Create a private constructor to restrict object creation.

  • Create a static method to return the single instance of the class.

  • Use lazy initialization to create the instance only when needed.

  • Ensure thread safety by using synchronized keyword or double-checked locking.

  • Commonly used in database connections, logging, and configuration settings.

Add your answer

Q6. what is EC2 ? why you used it ? How you build and deploy on AWS ?

Ans.

EC2 is a web service that provides resizable compute capacity in the cloud.

  • EC2 stands for Elastic Compute Cloud

  • It allows users to rent virtual computers on which to run their own applications

  • EC2 instances can be easily scaled up or down based on demand

  • To build and deploy on AWS, one can use services like AWS CodeDeploy, AWS CodePipeline, and AWS Elastic Beanstalk

View 2 more answers
Are these interview questions helpful?

Q7. Explain about Adapter Design pattern ? Why you have used it and explain in depth ? Is it possible to replace it ?

Ans.

Adapter pattern converts the interface of a class into another interface that clients expect.

  • Adapter pattern is used to make incompatible interfaces work together.

  • It is used when we want to reuse an existing class that doesn't have the interface we need.

  • It involves creating a wrapper class that translates the interface of one class into another interface.

  • An example is using a USB to Ethernet adapter to connect a computer to a network.

  • It is possible to replace it with other pa...read more

Add your answer

Q8. 3) how to achieve load balance and fault tolerance while deploying an application ?

Ans.

To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.

  • Implement load balancing to distribute incoming traffic across multiple servers.

  • Use clustering to group multiple servers together to work as a single unit.

  • Ensure redundancy by having multiple instances of critical components to handle failures.

  • Implement fault-tolerant mechanisms like automatic failover and replication.

  • Regularly moni...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How can you replace exists legacy monolithic application with microservices ?

Ans.

Legacy monolithic applications can be replaced with microservices by breaking down the application into smaller, independent services.

  • Identify the different functionalities of the monolithic application

  • Break down the application into smaller, independent services

  • Use APIs to communicate between the services

  • Implement containerization and orchestration for scalability and reliability

  • Gradually migrate functionality to microservices while maintaining backwards compatibility

  • Example...read more

Add your answer

Q10. WHAT IS HASHING ? AND HASH MAP IN DETAILS ALONG WITH Balanced tree

Ans.

Hashing is a technique to map data to a fixed size array. Hash Map is a data structure that uses hashing to store key-value pairs.

  • Hashing is used to quickly retrieve data from a large dataset

  • Hash function maps data to a fixed size array index

  • Collisions can occur when multiple data points map to the same index

  • Hash Map uses key-value pairs to store and retrieve data

  • Balanced tree is an alternative to Hash Map for efficient data retrieval

Add your answer

Q11. 4) Difference between shared and job shared variable ?

Ans.

Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.

  • Shared variables are used to share data between tasks in a process.

  • Job shared variables are used to share data between tasks in a specific job.

  • Shared variables can cause race conditions and should be used with caution.

  • Job shared variables are useful for passing data between tasks in a job without affecting other jobs.

Add your answer

Q12. How will you perform risk assessment for an application.

Ans.

Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.

  • Identify potential threats and vulnerabilities

  • Evaluate the impact of each threat or vulnerability

  • Determine the likelihood of each threat or vulnerability occurring

  • Prioritize risks based on their impact and likelihood

  • Develop a plan to mitigate or manage each risk

Add your answer

Q13. What is collections framework in java?

Ans.

Collections framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects in Java.

  • It includes interfaces like List, Set, and Map

  • It provides implementations of these interfaces like ArrayList, HashSet, and HashMap

  • It allows for easy manipulation and sorting of collections

  • It is part of the Java Collections API

  • Example: List names = new ArrayList<>();

  • Example: Map ages = new HashMap<>();

Add your answer

Q14. Magento 2 : What is proxy design pattern and used case

Ans.

Proxy design pattern is a structural pattern that provides a surrogate or placeholder for another object to control access to it.

  • Used to provide a level of indirection when accessing an object

  • Can be used to implement lazy loading, caching, access control, etc.

  • Example: Magento 2 uses proxy pattern to load product data only when it is needed

  • Example: Proxy pattern can be used to restrict access to sensitive data or resources

Add your answer

Q15. find integer of array , that is not present in given array ?

Ans.

Finding an integer not present in a given array.

  • Iterate through the array and mark the presence of each integer in a hash table.

  • Then iterate through the hash table to find the missing integer.

  • Alternatively, sort the array and iterate through to find the first missing integer.

Add your answer

Q16. Magento 2: What s dependency Injection elaborate it

Ans.

Dependency Injection is a design pattern used in Magento 2 to inject dependencies into a class.

  • Dependency Injection is a way to achieve loose coupling between classes.

  • It allows for easier testing and maintenance of code.

  • In Magento 2, dependencies are injected through constructor or setter methods.

  • Example: injecting a logger object into a class that needs to log messages.

Add your answer

Q17. What is DataParameter in TestNG?

Ans.

DataParameter is a TestNG annotation used to pass data to test methods.

  • DataParameter is used to pass data to test methods in TestNG

  • It is used in conjunction with DataProvider to provide test data

  • DataParameter can be used to pass multiple parameters to a test method

  • Example: @Test(dataProvider = "dp", dataProviderClass = TestData.class)

  • Example: public void testMethod(@DataParameter("username") String username, @DataParameter("password") String password)

Add your answer

Q18. How to config dns sinkhole for malicious domains on palo alto?

Ans.

Configuring DNS sinkhole for malicious domains on Palo Alto

  • Create a security policy to block traffic to malicious domains

  • Configure DNS sinkhole profile with the list of malicious domains

  • Enable DNS sinkhole in the security policy

  • Monitor the logs for any blocked traffic

  • Update the list of malicious domains regularly

Add your answer

Q19. Use a anti malware profile and call the edl with domains in it. On security acl call this antimalware profile and send them to sinkhole IPs.

Ans.

To implement anti-malware profile, call EDL with domains and send to sinkhole IPs via security ACL.

  • Create an anti-malware profile with appropriate settings

  • Create an EDL with domains to be blocked

  • Create a security ACL and call the anti-malware profile in it

  • Add the EDL to the security ACL and send traffic to sinkhole IPs

  • Regularly update the EDL with new domains

Add your answer

Q20. Get final amount in transaction table wherein we have two other table credit and debit

Ans.

To get the final amount in the transaction table, we need to consider the amounts from both the credit and debit tables.

  • Join the transaction table with the credit and debit tables on a common key, such as transaction ID.

  • Sum up the amounts from the credit table and subtract the sum of amounts from the debit table to get the final amount.

  • Consider handling cases where there may be multiple transactions for the same ID in the credit and debit tables.

Add your answer

Q21. What are the various troubleshooting activities you have done as a Websphere admin

Ans.

As a Websphere admin, I have performed troubleshooting activities such as analyzing logs, checking configurations, and investigating performance issues.

  • Analyzed server logs to identify errors or warnings

  • Checked configuration settings to ensure they are correct

  • Investigated performance issues by monitoring resource usage and analyzing bottlenecks

Add your answer

Q22. What is nagative test case and positive test case

Ans.

Positive test cases verify expected behavior while negative test cases verify unexpected behavior.

  • Positive test cases test for expected behavior

  • Negative test cases test for unexpected behavior

  • Examples: Positive - login with correct credentials, Negative - login with incorrect credentials

Add your answer

Q23. CRUL REST Security for website How we can make website fater

Ans.

To make a website faster, optimize code, use caching, compress files, and minimize HTTP requests.

  • Optimize code by removing unnecessary code, using efficient algorithms, and reducing database queries.

  • Use caching to store frequently accessed data and reduce server load.

  • Compress files to reduce their size and minimize HTTP requests.

  • Minimize HTTP requests by combining files, using CSS sprites, and reducing the number of images and scripts.

  • Use a content delivery network (CDN) to d...read more

Add your answer

Q24. Duplicate Records elimination in hive table

Ans.

Use DISTINCT keyword in SELECT query to eliminate duplicate records in a Hive table

  • Use SELECT DISTINCT * FROM table_name to retrieve unique records

  • Consider using GROUP BY clause with appropriate columns to eliminate duplicates

  • Utilize the ROW_NUMBER() window function to assign a unique row number to each record and filter out duplicates

Add your answer

Q25. Have you worked on "API management tools"?

Ans.

Yes, I have worked on API management tools.

  • I have experience with tools like Apigee, Kong, and AWS API Gateway.

  • I have worked on designing and implementing APIs, setting up security and access controls, and monitoring API usage.

  • I have also integrated APIs with various backend systems and third-party services.

  • I am familiar with API documentation and versioning best practices.

  • Overall, I have a strong understanding of the API lifecycle and how to manage it effectively.

Add your answer

Q26. Chaining comparing using java 8 for object ?

Ans.

Chaining comparing using java 8 for object

  • Java 8 introduced the Comparator interface with default and static methods for chaining comparisons

  • The thenComparing() method is used to chain multiple comparisons

  • Example: Comparator.comparing(Object::getName).thenComparing(Object::getAge)

Add your answer

Q27. Design Pattern used in your project ?

Ans.

Singleton design pattern was used in the project.

  • Singleton pattern ensures that only one instance of a class is created and provides a global point of access to it.

  • It is useful when there is a need for a single instance of a class that can be accessed globally.

  • Example: A Logger class that needs to be accessed from multiple parts of the project.

View 1 answer

Q28. Hive table loads on incremental process

Ans.

Hive table loads can be done incrementally by using partitioning or by using timestamp columns.

  • Partition the table based on a column like date or timestamp to load data incrementally

  • Use dynamic partition inserts to add new data to specific partitions

  • Utilize timestamp columns to filter and load only new data

  • Consider using tools like Apache NiFi or Apache Sqoop for efficient incremental data loading

Add your answer

Q29. What is SOX Compliance

Ans.

SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.

  • SOX stands for Sarbanes-Oxley Act

  • It was enacted in 2002 after accounting scandals at Enron and WorldCom

  • It requires companies to establish and maintain internal controls over financial reporting

  • It also mandates regular audits and certifications of financial statements

  • Non-compliance can result in fines, legal action, and damage to a company's reputation

Add your answer

Q30. What are SOD and how you implement them?

Ans.

SOD stands for Separation of Duties. It is a security principle that ensures no single individual has complete control over a critical process.

  • SOD is implemented by dividing tasks and responsibilities among multiple individuals or roles.

  • It helps prevent fraud, errors, and misuse of privileges.

  • For example, in a software development team, the developer should not have access to production servers.

  • Implementing SOD requires defining roles, assigning responsibilities, and enforcin...read more

Add your answer

Q31. What is IDAM and why we need it?

Ans.

IDAM stands for Identity and Access Management. It is a framework of policies and technologies that ensure the right individuals have access to the right resources at the right time.

  • IDAM helps organizations manage user identities, roles, and access privileges.

  • It provides a centralized system for authentication, authorization, and user provisioning.

  • IDAM improves security by enforcing strong access controls and reducing the risk of unauthorized access.

  • It enhances productivity b...read more

Add your answer

Q32. Explain the concepts of index contention, key constraints

Ans.

Index contention occurs when multiple transactions are trying to access the same index simultaneously, leading to performance issues. Key constraints enforce rules on the values that can be inserted into a column.

  • Index contention can occur when multiple transactions are trying to access the same index for read or write operations simultaneously.

  • This can lead to performance issues such as increased response times and decreased throughput.

  • Key constraints define rules on the val...read more

Add your answer

Q33. What is Spring boot, and why it is used?

Ans.

Spring Boot is a Java-based framework used for building standalone, production-grade applications.

  • Spring Boot provides a simpler and faster way to set up, configure, and run both web and non-web applications.

  • It eliminates the need for XML configurations and boilerplate code.

  • It comes with embedded servers like Tomcat, Jetty, and Undertow, making it easy to deploy applications.

  • It provides a wide range of starter projects for different types of applications, such as RESTful web ...read more

Add your answer

Q34. What is advantages of spring boot

Ans.

Spring Boot provides rapid application development and microservices architecture.

  • Easy configuration and setup

  • Embedded servers for faster development

  • Auto-configuration of dependencies

  • Supports multiple data sources

  • Promotes microservices architecture

  • Provides a wide range of plugins and extensions

  • Facilitates easy testing and debugging

  • Reduces boilerplate code

  • Improves productivity and efficiency

Add your answer

Q35. How to find employee with no boss

Ans.

To find an employee with no boss, search for employees whose boss ID is null or not in the employee list.

  • Check the employee list for any null boss IDs.

  • Check if any boss IDs are not present in the employee list.

  • Use a SQL query or programming language to filter the employees with no boss.

  • Consider the possibility of multiple employees having no boss.

  • Check for any circular references in the boss-employee hierarchy.

Add your answer

Q36. What is authorization in .net core

Ans.

Authorization in .NET Core is the process of determining what a user is allowed to do within an application.

  • Authorization is the process of checking if a user has the necessary permissions to perform a certain action.

  • In .NET Core, authorization can be implemented using attributes like [Authorize] on controllers or actions.

  • Authorization can also be done programmatically by checking roles or policies.

  • Examples of authorization include allowing only administrators to access certa...read more

Add your answer

Q37. What is the main role of CISO?

Ans.

The main role of a CISO (Chief Information Security Officer) is to ensure the security of an organization's information and technology assets.

  • Developing and implementing information security policies and procedures

  • Identifying and assessing potential security risks and vulnerabilities

  • Creating and managing security incident response plans

  • Overseeing the implementation and maintenance of security controls

  • Educating and training employees on security best practices

  • Monitoring and an...read more

Add your answer

Q38. What is 4 pillar of OOPS?

Ans.

4 pillars of OOPS are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to them.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms and perform different actions based on context.

Add your answer

Q39. Docker and its uses in devops

Ans.

Docker is a containerization platform used in devops to package, distribute, and run applications in isolated environments.

  • Docker allows for easy packaging and distribution of applications with all dependencies included

  • Containers created with Docker are lightweight and portable, making them easy to deploy across different environments

  • Docker simplifies the process of managing and scaling applications in a devops environment

  • Docker can be used for continuous integration and cont...read more

Add your answer

Q40. What's the use of volatile keyword

Ans.

Volatile keyword is used to indicate that a variable's value can be changed unexpectedly.

  • It ensures that the variable is always read from memory, not from cache

  • It is useful in multi-threaded environments where multiple threads may access the same variable

  • It is not recommended to use volatile for synchronization purposes

  • Example: volatile int count = 0;

Add your answer

Q41. What's ISO 27K

Ans.

ISO 27K is a set of standards for information security management systems.

  • ISO 27K provides guidelines for managing and protecting sensitive information.

  • It includes controls for risk management, access control, and incident management.

  • ISO 27K certification is often required for companies handling sensitive data.

  • Examples of ISO 27K standards include ISO 27001 and ISO 27002.

Add your answer

Q42. Difference between composer and composer lock

Ans.

Composer is a dependency manager for PHP, while composer.lock is a file that locks dependencies to specific versions.

  • Composer is used to manage dependencies in PHP projects

  • Composer.lock file locks dependencies to specific versions to ensure consistency

  • Composer.json file lists all the dependencies and their versions

  • Running 'composer install' installs dependencies listed in composer.lock file

Add your answer

Q43. S3 and type and IAM ?

Ans.

S3 is a cloud storage service provided by AWS. IAM is used to manage access to AWS resources.

  • S3 is an object storage service that allows you to store and retrieve data from anywhere on the web.

  • S3 provides durability, availability, and scalability for your data.

  • IAM is used to manage access to AWS resources by creating and managing users, groups, and roles.

  • IAM allows you to control who can access your AWS resources and what actions they can perform.

Add your answer

Q44. Spark optimization techniques

Ans.

Spark optimization techniques involve various strategies to improve performance and efficiency.

  • Use partitioning to distribute data evenly

  • Cache intermediate results for reuse

  • Avoid shuffling data unnecessarily

  • Optimize joins by broadcasting smaller tables

  • Use appropriate data serialization formats

Add your answer

Q45. Garbage collector changes in java 11

Ans.

Java 11 introduced a new garbage collector called Epsilon.

  • Java 11 introduced a new experimental garbage collector called Epsilon, which is a no-op garbage collector.

  • Epsilon is designed for applications that do not require garbage collection, essentially turning off the garbage collector.

  • This can be useful for performance testing or short-lived applications where the overhead of garbage collection is not needed.

Add your answer

Q46. What is PCI DSS

Ans.

PCI DSS stands for Payment Card Industry Data Security Standard.

  • It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.

  • It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.

  • It includes requirements for network security, data protection, access control, and regular monitoring and testing.

  • Compliance wi...read more

Add your answer

Q47. What is Data hiding?

Ans.

Data hiding is a technique to hide the implementation details of an object from the outside world.

  • It is a way to protect the data from being modified by external sources.

  • It helps in achieving encapsulation and abstraction.

  • It is implemented using access modifiers like private, protected, and public.

  • Example: In a class, the private variables can only be accessed by the methods of that class.

  • Example: In a banking application, the account balance should be hidden from the user in...read more

Add your answer

Q48. What is database Testcases

Ans.

Database testcases are a set of steps to verify the functionality and performance of a database.

  • Database testcases ensure data integrity and consistency.

  • They test CRUD operations, data retrieval, and query performance.

  • Testcases can be automated or manual, and should cover edge cases and error handling.

  • Examples of database testcases include testing for duplicate records, testing for null values, and testing for data validation rules.

Add your answer

Q49. Differences between Drupal 7 and 9

Ans.

Drupal 7 and 9 have significant differences in terms of technology, features, and performance.

  • Drupal 9 has removed deprecated code from Drupal 7 and introduced new features like the Layout Builder and Claro admin theme.

  • Drupal 9 requires PHP 7.3 or higher, while Drupal 7 supports PHP 5.6.

  • Drupal 9 has improved performance and security compared to Drupal 7.

  • Drupal 9 has better support for modern web technologies like HTML5 and CSS3.

  • Drupal 9 has a more streamlined upgrade process ...read more

Add your answer

Q50. Tell me on Performance tuning

Ans.

Performance tuning involves optimizing software or hardware to improve its speed and efficiency.

  • Identify bottlenecks in the system

  • Optimize code and algorithms

  • Use caching and indexing

  • Upgrade hardware or infrastructure

  • Monitor and analyze performance metrics

  • Consider load testing and stress testing

  • Continuously review and improve performance

Add your answer

Q51. 2.Hybrid Identity Synchronization steps

Ans.

Hybrid Identity Synchronization steps

  • Configure Azure AD Connect on on-premises server

  • Select synchronization options and configure filtering

  • Configure AD FS for single sign-on

  • Verify synchronization and troubleshoot any issues

Add your answer

Q52. What is solid principle

Ans.

SOLID principles are a set of five design principles in object-oriented programming to make software more maintainable, flexible, and scalable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • I - ...read more

Add your answer

Q53. what is abstract class

Ans.

Abstract class is a class that cannot be instantiated and is used as a blueprint for other classes to inherit from.

  • Cannot be instantiated on its own

  • Can have abstract methods that must be implemented by subclasses

  • Can have non-abstract methods that can be inherited by subclasses

Add your answer

Q54. what is interface and benefits

Ans.

An interface is a contract that defines the methods that a class must implement. Benefits include code reusability, flexibility, and abstraction.

  • Interfaces allow for multiple inheritance in programming languages that do not support it, like Java.

  • Interfaces promote code reusability by allowing different classes to implement the same interface.

  • Interfaces provide flexibility by allowing classes to change their behavior without affecting other classes.

  • Interfaces promote abstracti...read more

Add your answer

Q55. software development design pattern

Ans.

Software design patterns are reusable solutions to common problems in software design.

  • Design patterns help in creating maintainable and scalable software.

  • Examples include Singleton, Factory, Observer, and Strategy patterns.

  • Each design pattern has a specific purpose and structure to solve a particular problem.

  • Design patterns promote code reusability, flexibility, and modularity.

Add your answer

Q56. Write programs of sorting arrays

Ans.

Implement sorting algorithms for arrays of strings

  • Use built-in sorting functions like sort() in languages like Python or Java

  • Implement custom sorting algorithms like bubble sort, merge sort, or quick sort

  • Consider the time complexity and space complexity of each sorting algorithm

Add your answer

Q57. Explain cluster failover process

Ans.

Cluster failover is the process of transferring control from a failed node to a healthy node in a cluster.

  • Cluster failover is triggered when a node in the cluster fails or becomes unresponsive.

  • The cluster manager detects the failure and initiates the failover process.

  • The failover process involves transferring the workload and resources from the failed node to a healthy node.

  • The healthy node takes over the responsibilities of the failed node and resumes normal operations.

  • The f...read more

Add your answer

Q58. Overall datawarehouse solution

Ans.

An overall datawarehouse solution is a centralized repository of data that is used for reporting and analysis.

  • Designing and implementing a data model

  • Extracting, transforming, and loading data from various sources

  • Creating and maintaining data quality and consistency

  • Providing tools for reporting and analysis

  • Ensuring data security and privacy

Add your answer

Q59. Data Lake storage concept

Ans.

Data Lake is a centralized repository that allows storage of structured and unstructured data at any scale.

  • Data Lake is designed to store raw data in its native format.

  • It allows for easy access and analysis of data using various tools and technologies.

  • Data Lake can store structured, semi-structured, and unstructured data.

  • It can be used for various purposes such as data analytics, machine learning, and data warehousing.

  • Examples of Data Lake storage solutions include Amazon S3,...read more

Add your answer

Q60. What is immutability

Ans.

Immutability is the concept of objects whose state cannot be modified after creation.

  • Immutability ensures that once an object is created, its state cannot be changed.

  • Immutable objects are thread-safe and can be shared without the risk of unintended modifications.

  • Examples of immutable objects include String and Integer in Java.

Add your answer

Q61. Diff between struct and class

Ans.

Struct is a value type while class is a reference type in C#.

  • Structs are value types stored on stack, classes are reference types stored on heap.

  • Structs cannot be inherited, classes can be inherited.

  • Structs do not support inheritance, polymorphism, or virtual methods.

  • Structs are typically used for small data structures with few properties.

  • Classes are used for larger, more complex objects with behavior.

Add your answer

Q62. DLP Architecture and features

Ans.

DLP architecture and features are designed to protect sensitive data from unauthorized access or disclosure.

  • DLP stands for Data Loss Prevention.

  • DLP architecture includes three main components: discovery, monitoring, and enforcement.

  • Discovery involves identifying sensitive data and where it resides.

  • Monitoring involves tracking data usage and identifying potential security risks.

  • Enforcement involves applying policies to prevent unauthorized access or disclosure of sensitive dat...read more

Add your answer

Q63. Security in wep app.cors

Ans.

CORS (Cross-Origin Resource Sharing) is a security feature in web applications to control which origins can access resources.

  • CORS is used to prevent unauthorized access to resources on a different domain

  • It is implemented by the server to specify which origins are allowed to access its resources

  • CORS headers like Access-Control-Allow-Origin, Access-Control-Allow-Methods, and Access-Control-Allow-Headers are used to control access

  • For example, setting Access-Control-Allow-Origin:...read more

Add your answer

Q64. Explain Active CISCO recording

Ans.

Active CISCO recording is a feature that allows real-time recording of phone calls on CISCO phones.

  • It enables recording of both inbound and outbound calls

  • Recordings can be accessed and played back from a web interface

  • It requires a compatible CISCO phone system and recording software

  • It can be used for training, compliance, and quality assurance purposes

Add your answer

Q65. Spring boot advantages

Ans.

Spring Boot is a popular Java framework for building microservices and web applications.

  • Easy to set up and configure

  • Provides embedded servers like Tomcat, Jetty, and Undertow

  • Offers a wide range of starter projects for quick development

  • Supports various data sources and databases

  • Integrates with other Spring frameworks like Spring Data and Spring Security

Add your answer

Q66. Reql time solution

Ans.

Real-time solution refers to a system or technology that provides immediate or near-immediate data processing and response.

  • Real-time solutions require fast data processing and minimal latency.

  • Examples include real-time analytics, live chat support, and stock market trading systems.

  • Technologies like Apache Kafka, WebSocket, and MQTT are commonly used for real-time solutions.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Corporate Minds

based on 48 interviews in the last 1 year
3 Interview rounds
Technical Round 1
Technical Round 2
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Technical Lead Interview Questions from Similar Companies

3.5
 • 90 Interview Questions
3.6
 • 41 Interview Questions
3.7
 • 20 Interview Questions
3.9
 • 18 Interview Questions
3.4
 • 16 Interview Questions
3.6
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter