i
Zensar Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
We had to visit Zensar office locatd in Kharadi. There they seperated us between Java and Javascript coding processes. I went on for Java Developer. We had plenty time of about 1 hour 30 inutes to solve test cases and and do coding for a Pizza Restaurant Management System. Then next round was called at same place at same time. HR round Group discussiona and final round with the head od zensar Pune was conducted.
I applied via Approached by Company and was interviewed in Feb 2024. There was 1 interview round.
SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without aff...
Azure Cognitive Services for image recognition and text analysis
Used Azure Computer Vision API for image recognition
Utilized Azure Text Analytics API for sentiment analysis
Integrated Azure Speech to Text API for transcribing audio
Terraform is an open-source infrastructure as code software tool created by HashiCorp.
Terraform allows users to define and provision infrastructure using a declarative configuration language.
It supports multiple cloud providers such as AWS, Azure, and Google Cloud Platform.
Infrastructure is defined in Terraform configuration files, which describe the desired state of the infrastructure.
Terraform then creates an executi...
To launch a VPC, you can use the AWS Management Console, AWS CLI, or AWS SDKs.
Use AWS Management Console to navigate to VPC dashboard and click on 'Create VPC'
Specify the VPC details like CIDR block, tenancy, and enable DNS hostnames
Add subnets, route tables, internet gateways, and security groups as needed
Use AWS CLI command 'create-vpc' to launch VPC programmatically
Use AWS SDKs like Boto3 for Python to automate VPC
I applied via Recruitment Consulltant and was interviewed in Jun 2024. There were 2 interview rounds.
Zensar Technologies interview questions for popular designations
Get interview-ready with Top Zensar Technologies Interview Questions
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SQl, Spring, Spring BOOT< hibernate, JPA
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Authentication in our project involves verifying the identity of users before granting access.
Implement secure login functionality using encryption algorithms like bcrypt
Utilize session management to track user authentication status
Consider implementing multi-factor authentication for added security
Types of requests in APIs include GET, POST, PUT, DELETE.
GET - Used to retrieve data from a server
POST - Used to send data to a server to create/update a resource
PUT - Used to update a resource on the server
DELETE - Used to delete a resource on the server
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
Parameters needed for configuring Dataguard include LOG_ARCHIVE_DEST_1, LOG_ARCHIVE_DEST_2, FAL_SERVER, STANDBY_FILE_MANAGEMENT, etc.
LOG_ARCHIVE_DEST_1: Specifies the location to archive redo logs on the primary database
LOG_ARCHIVE_DEST_2: Specifies the location to archive redo logs on the standby database
FAL_SERVER: Specifies the FAL (Fetch Archive Log) server for the standby database
STANDBY_FILE_MANAGEMENT: Specifies...
Cut over phase is the final stage of migration or upgradation where the new system takes over the functions of the old system.
Cut over phase involves transitioning from the old system to the new system.
It includes final data migration, testing, and validation of the new system.
During cut over phase, users are trained on the new system and any remaining issues are resolved.
The goal of cut over phase is to ensure a smoot...
Yes, cross platform migration in Oracle Apps involves moving from one operating system to another, such as Linux to Solaris.
Cross platform migration in Oracle Apps involves transferring the application and database from one operating system to another.
It requires careful planning and testing to ensure a smooth transition.
Data migration tools like Oracle Data Pump can be used to facilitate the process.
Consideration must...
ADOP (Application DBA Online Patching) has multiple phases during Oracle Apps patching.
Prepare phase - prepares the system for patching
Apply phase - applies the patches to the system
Finalize phase - finalizes the patching process
Cutover phase - switches the system to the new patch level
Cleanup phase - cleans up temporary files and logs
I have extensive experience in upgrading Oracle applications, including planning, testing, and executing upgrades.
Led multiple successful Oracle application upgrades from planning to execution
Performed thorough testing to ensure compatibility and functionality post-upgrade
Worked closely with stakeholders to minimize downtime and disruptions during upgrades
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in real-t...
Email campaigns should be handled strategically with personalized content and targeted audience segmentation.
Segment your audience based on demographics, behavior, or preferences to send personalized content.
Use A/B testing to optimize subject lines, content, and timing for better engagement.
Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.
Automate email workflows...
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Top trending discussions
The duration of Zensar Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 193 interviews
Interview experience
based on 2.5k reviews
Rating in categories
Software Engineer
3.8k
salaries
| ₹2 L/yr - ₹10.4 L/yr |
Senior Software Engineer
3.8k
salaries
| ₹6 L/yr - ₹23 L/yr |
Technical Specialist
1.5k
salaries
| ₹9.5 L/yr - ₹34 L/yr |
Softwaretest Engineer
826
salaries
| ₹2.4 L/yr - ₹9.8 L/yr |
Senior Technical Specialist
720
salaries
| ₹11.5 L/yr - ₹40.2 L/yr |
TCS
Infosys
Wipro
HCLTech