i
Zensar Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Authentication in our project involves verifying the identity of users before granting access.
Implement secure login functionality using encryption algorithms like bcrypt
Utilize session management to track user authentication status
Consider implementing multi-factor authentication for added security
Types of requests in APIs include GET, POST, PUT, DELETE.
GET - Used to retrieve data from a server
POST - Used to send data to a server to create/update a resource
PUT - Used to update a resource on the server
DELETE - Used to delete a resource on the server
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
Parameters needed for configuring Dataguard include LOG_ARCHIVE_DEST_1, LOG_ARCHIVE_DEST_2, FAL_SERVER, STANDBY_FILE_MANAGEMENT, etc.
LOG_ARCHIVE_DEST_1: Specifies the location to archive redo logs on the primary database
LOG_ARCHIVE_DEST_2: Specifies the location to archive redo logs on the standby database
FAL_SERVER: Specifies the FAL (Fetch Archive Log) server for the standby database
STANDBY_FILE_MANAGEMENT: Specifies...
Cut over phase is the final stage of migration or upgradation where the new system takes over the functions of the old system.
Cut over phase involves transitioning from the old system to the new system.
It includes final data migration, testing, and validation of the new system.
During cut over phase, users are trained on the new system and any remaining issues are resolved.
The goal of cut over phase is to ensure a smoot...
Yes, cross platform migration in Oracle Apps involves moving from one operating system to another, such as Linux to Solaris.
Cross platform migration in Oracle Apps involves transferring the application and database from one operating system to another.
It requires careful planning and testing to ensure a smooth transition.
Data migration tools like Oracle Data Pump can be used to facilitate the process.
Consideration must...
ADOP (Application DBA Online Patching) has multiple phases during Oracle Apps patching.
Prepare phase - prepares the system for patching
Apply phase - applies the patches to the system
Finalize phase - finalizes the patching process
Cutover phase - switches the system to the new patch level
Cleanup phase - cleans up temporary files and logs
I have extensive experience in upgrading Oracle applications, including planning, testing, and executing upgrades.
Led multiple successful Oracle application upgrades from planning to execution
Performed thorough testing to ensure compatibility and functionality post-upgrade
Worked closely with stakeholders to minimize downtime and disruptions during upgrades
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in real-t...
Email campaigns should be handled strategically with personalized content and targeted audience segmentation.
Segment your audience based on demographics, behavior, or preferences to send personalized content.
Use A/B testing to optimize subject lines, content, and timing for better engagement.
Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.
Automate email workflows...
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Handle multiple windows by using window handles and switching between them.
Use getWindowHandles() method to get all window handles
Switch between windows using switchTo().window(handle)
Perform actions on the desired window
Zensar Technologies interview questions for popular designations
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There were 2 interview rounds.
Get interview-ready with Top Zensar Technologies Interview Questions
Key metrics in Problem Management include mean time to restore service, number of incidents prevented, and percentage of recurring incidents.
Mean time to restore service (MTTRS) measures the average time taken to resolve a problem and restore service.
Number of incidents prevented indicates the effectiveness of problem management in identifying and resolving underlying issues.
Percentage of recurring incidents shows the ...
Service performance review is a process of evaluating the performance of IT services to ensure they meet agreed-upon targets and standards.
Service performance review involves analyzing key performance indicators (KPIs) such as availability, reliability, and response time.
It helps identify areas for improvement and optimization in IT services.
Regular service performance reviews can help prevent major incidents by addres...
Key metrics of Change Management, What are discussed during service performance review calls. Roles of SIAM
Basic programming questions
Truncate removes all data from a table quickly, while delete removes specific rows one by one.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity columns, while delete does not.
Truncate cannot be rolled back, while delete can be.
Truncate is a DDL operation, while delete is a DML operation.
Top trending discussions
Some of the top questions asked at the Zensar Technologies interview for experienced candidates -
The duration of Zensar Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 58 interviews
Interview experience
based on 2.6k reviews
Rating in categories
Kolkata,
Mumbai
+55-9 Yrs
Not Disclosed
Software Engineer
3.8k
salaries
| ₹2 L/yr - ₹10.2 L/yr |
Senior Software Engineer
3.8k
salaries
| ₹7 L/yr - ₹26 L/yr |
Technical Specialist
1.5k
salaries
| ₹9.8 L/yr - ₹35 L/yr |
Softwaretest Engineer
825
salaries
| ₹2.4 L/yr - ₹7.5 L/yr |
Senior Technical Specialist
725
salaries
| ₹11.5 L/yr - ₹40.2 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
FIS