i
Zensar Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Authentication in our project involves verifying the identity of users before granting access.
Implement secure login functionality using encryption algorithms like bcrypt
Utilize session management to track user authentication status
Consider implementing multi-factor authentication for added security
Types of requests in APIs include GET, POST, PUT, DELETE.
GET - Used to retrieve data from a server
POST - Used to send data to a server to create/update a resource
PUT - Used to update a resource on the server
DELETE - Used to delete a resource on the server
I applied via Referral and was interviewed in Feb 2024. There was 1 interview round.
Parameters needed for configuring Dataguard include LOG_ARCHIVE_DEST_1, LOG_ARCHIVE_DEST_2, FAL_SERVER, STANDBY_FILE_MANAGEMENT, etc.
LOG_ARCHIVE_DEST_1: Specifies the location to archive redo logs on the primary database
LOG_ARCHIVE_DEST_2: Specifies the location to archive redo logs on the standby database
FAL_SERVER: Specifies the FAL (Fetch Archive Log) server for the standby database
STANDBY_FILE_MANAGEMENT: Specifies...
Cut over phase is the final stage of migration or upgradation where the new system takes over the functions of the old system.
Cut over phase involves transitioning from the old system to the new system.
It includes final data migration, testing, and validation of the new system.
During cut over phase, users are trained on the new system and any remaining issues are resolved.
The goal of cut over phase is to ensure a smoot...
Yes, cross platform migration in Oracle Apps involves moving from one operating system to another, such as Linux to Solaris.
Cross platform migration in Oracle Apps involves transferring the application and database from one operating system to another.
It requires careful planning and testing to ensure a smooth transition.
Data migration tools like Oracle Data Pump can be used to facilitate the process.
Consideration must...
ADOP (Application DBA Online Patching) has multiple phases during Oracle Apps patching.
Prepare phase - prepares the system for patching
Apply phase - applies the patches to the system
Finalize phase - finalizes the patching process
Cutover phase - switches the system to the new patch level
Cleanup phase - cleans up temporary files and logs
I have extensive experience in upgrading Oracle applications, including planning, testing, and executing upgrades.
Led multiple successful Oracle application upgrades from planning to execution
Performed thorough testing to ensure compatibility and functionality post-upgrade
Worked closely with stakeholders to minimize downtime and disruptions during upgrades
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in real-t...
Email campaigns should be handled strategically with personalized content and targeted audience segmentation.
Segment your audience based on demographics, behavior, or preferences to send personalized content.
Use A/B testing to optimize subject lines, content, and timing for better engagement.
Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.
Automate email workflows...
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Yes, Du is a built-in activity in UiPath used for deleting a file or folder.
Du activity is used to delete a file or folder in UiPath.
It requires specifying the path of the file or folder to be deleted.
Make sure to handle exceptions when using Du activity.
Example: Du activity can be used to delete temporary files after processing data.
Zensar Technologies interview questions for popular designations
Get interview-ready with Top Zensar Technologies Interview Questions
Handle multiple windows by using window handles and switching between them.
Use getWindowHandles() method to get all window handles
Switch between windows using switchTo().window(handle)
Perform actions on the desired window
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There were 2 interview rounds.
In 5 years, I see myself as a senior software engineer leading a team of developers, working on cutting-edge technologies.
Continuing to enhance my technical skills through continuous learning and certifications
Taking on more leadership responsibilities and mentoring junior team members
Contributing to the development of innovative software solutions for complex problems
Possibly pursuing a higher degree in computer scien
My technology vision is to leverage cutting-edge tools and techniques to create innovative solutions that improve efficiency and user experience.
Embrace emerging technologies such as AI, machine learning, and blockchain
Focus on creating scalable and secure software systems
Prioritize user-centric design and seamless integration of features
Collaborate with cross-functional teams to drive innovation and continuous improve
Designing system algorithms involves creating efficient and effective code to solve specific problems.
Understand the problem and requirements before designing algorithms
Choose appropriate data structures and algorithms for the task
Consider time and space complexity when designing algorithms
Test and optimize the code for performance
Examples: sorting algorithms like quicksort or searching algorithms like binary search
Top trending discussions
The duration of Zensar Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 197 interviews
Interview experience
based on 2.6k reviews
Rating in categories
Software Engineer
3.8k
salaries
| ₹2 L/yr - ₹10.4 L/yr |
Senior Software Engineer
3.8k
salaries
| ₹7 L/yr - ₹26 L/yr |
Technical Specialist
1.5k
salaries
| ₹9.6 L/yr - ₹35 L/yr |
Softwaretest Engineer
827
salaries
| ₹2.4 L/yr - ₹9.8 L/yr |
Senior Technical Specialist
727
salaries
| ₹11.5 L/yr - ₹40.2 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
FIS