AST Consultant

100+ AST Consultant Interview Questions and Answers

Updated 12 Nov 2024

Q51. How do you prioritize the Requirements?

Ans.

Requirements are prioritized based on their importance and impact on project goals.

  • Identify critical requirements that are necessary for project success

  • Consider the impact of each requirement on project timelines and budget

  • Involve stakeholders in the prioritization process

  • Use a scoring system to rank requirements based on their importance

  • Revisit and adjust priorities as needed throughout the project

Q52. How do you create a custom annotations?

Ans.

Custom annotations can be created using the @interface keyword in Java.

  • Create a new interface with the @interface keyword

  • Define the annotation's properties using methods

  • Add default values for the properties

  • Add the @Retention and @Target annotations to specify how the annotation can be used

  • Example: @interface MyAnnotation { String value() default ""; }

  • Example usage: @MyAnnotation(value="example")

Q53. What is dynamic modification rule?

Ans.

Dynamic modification rule is a rule that allows changes to be made to a system or process in real-time based on certain conditions.

  • Dynamic modification rules are used in various industries to automate processes and improve efficiency.

  • These rules can be programmed to trigger specific actions based on predefined criteria.

  • For example, in e-commerce, a dynamic modification rule can adjust pricing based on demand or competitor prices.

  • In healthcare, dynamic modification rules can b...read more

Q54. Mail flow in hybrid deployment.

Ans.

Mail flow in hybrid deployment

  • In hybrid deployment, mail flow can be routed through on-premises Exchange servers or Exchange Online

  • Mail can be sent between on-premises and cloud mailboxes using connectors

  • Exchange Online Protection (EOP) can be used for inbound and outbound mail filtering

  • Transport Layer Security (TLS) can be used to secure mail flow between on-premises and cloud

  • Mail can be redirected to on-premises servers for compliance or archiving purposes

Are these interview questions helpful?

Q55. Pivot command in SQL ? Running total ?

Ans.

Pivot command in SQL is used to transform rows into columns. Running total is a cumulative sum of values.

  • Pivot command is used to aggregate data and display it in a more readable format

  • Running total is calculated by adding the current value to the previous total

  • Example of pivot command: SELECT * FROM table_name PIVOT (SUM(column_name) FOR pivot_column IN (value1, value2, value3))

  • Example of running total: SELECT column_name, SUM(column_name) OVER (ORDER BY column_name) AS runn...read more

Q56. Project handling major issues found and fix?

Ans.

Handling major project issues involves identifying, prioritizing, and resolving them efficiently to ensure project success.

  • Identify major issues through regular project monitoring and communication with team members and stakeholders

  • Prioritize issues based on impact on project timeline, budget, and overall success

  • Develop a plan to address each major issue, involving relevant team members and stakeholders

  • Implement solutions in a timely manner to minimize project delays and risk...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. Explain the basic pillars of Cyber Security

Ans.

The basic pillars of Cyber Security include confidentiality, integrity, availability, and non-repudiation.

  • Confidentiality: Ensuring that data is only accessible to authorized individuals or systems.

  • Integrity: Ensuring that data is accurate and has not been tampered with.

  • Availability: Ensuring that data and systems are accessible when needed.

  • Non-repudiation: Ensuring that a sender cannot deny sending a message and a recipient cannot deny receiving it.

Q58. How does garbage collection work in Java

Ans.

Garbage collection in Java automatically manages memory by reclaiming unused objects.

  • Garbage collection runs in the background to identify and remove objects that are no longer needed.

  • It helps prevent memory leaks and optimize memory usage.

  • Java uses different garbage collection algorithms like Serial, Parallel, CMS, and G1.

  • Example: System.gc() can be used to suggest garbage collection, but it's not guaranteed to run immediately.

AST Consultant Jobs

Assistant Consultant – Acoustics 2-4 years
WSP
4.3
Noida
Assistant Consultant - Safety Advisory 2-4 years
WSP
4.3
Bangalore / Bengaluru
Assistant Consultant 1-4 years
XL India Business Services Pvt. Ltd.
3.7
Gurgaon / Gurugram

Q59. Connectors in Office 365

Ans.

Connectors in Office 365 allow users to integrate third-party apps and services with their Office 365 accounts.

  • Connectors can be used to receive notifications and updates from external sources directly in Office 365.

  • Examples of connectors include Twitter, Trello, and GitHub.

  • Connectors can be added to individual channels in Microsoft Teams.

  • Users can also create custom connectors using Microsoft Power Automate.

  • Connectors can improve productivity and streamline workflows by brin...read more

Q60. What is Zero Threat vulnerability

Ans.

Zero Threat vulnerability refers to a security flaw that poses no immediate risk or harm to a system.

  • Zero Threat vulnerabilities are typically low severity issues that do not have the potential to be exploited by attackers.

  • These vulnerabilities may still need to be addressed to maintain a secure system, but they are not urgent.

  • Examples of Zero Threat vulnerabilities include unused ports left open on a firewall or outdated software that is not actively being targeted by attack...read more

Q61. What is SQL explain in detail

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language.

  • It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases.

  • SQL statements are used to perform tasks like selecting data from a database table, inserting new records, updating existing records, and deleting records.

  • Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE, CREATE, and DR...read more

Q62. 4xx status codes in API testing

Ans.

4xx status codes indicate client errors in API testing.

  • 4xx status codes are returned by the server when the client has made an error in the request.

  • Some common 4xx status codes include 400 Bad Request, 401 Unauthorized, 403 Forbidden, and 404 Not Found.

  • API testers should verify that the correct 4xx status code is returned for each type of client error.

  • Proper handling of 4xx status codes can improve the user experience and prevent security vulnerabilities.

Q63. Advanced level of functional testing lead

Ans.

An advanced level functional testing lead is responsible for overseeing and executing complex functional testing processes.

  • Experience in leading and coordinating functional testing efforts

  • Ability to create detailed test plans and test cases

  • Strong understanding of testing methodologies and tools

  • Excellent communication and problem-solving skills

  • Experience with automation testing tools like Selenium or JUnit

Q64. Difference between Interface and abstract class

Ans.

An abstract class can have both abstract and non-abstract methods, while an interface can only have abstract methods.

  • An abstract class can have constructors, while an interface cannot.

  • A class can implement multiple interfaces, but can only inherit from one abstract class.

  • An abstract class can have instance variables, while an interface cannot.

  • An abstract class can provide default implementations for some methods, while an interface cannot.

  • An abstract class is used when a comm...read more

Q65. Test case execution order in TestNG

Ans.

TestNG allows test case execution order to be specified using priority attribute or by using dependsOnMethods attribute.

  • TestNG executes test cases in the order specified by priority attribute.

  • If priority attribute is not specified, TestNG executes test cases in alphabetical order of method names.

  • TestNG also allows test case execution order to be specified using dependsOnMethods attribute.

  • dependsOnMethods attribute specifies the methods that a test method depends on and TestNG...read more

Q66. 10. Explain your automation framework.

Ans.

Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.

  • We use Excel sheets to store test data and test cases.

  • We have a centralized repository for reusable functions and libraries.

  • We use Selenium WebDriver for web automation and Appium for mobile automation.

  • We have a reporting mechanism that generates reports in HTML format.

  • We have integrated our framework with Jenkins for continuous integration.

  • We follow the Page Object Model de...read more

Q67. What is Informatica architecture

Ans.

Informatica architecture refers to the structure and components of the Informatica platform for data integration and management.

  • Informatica architecture consists of various components such as PowerCenter, PowerExchange, and Data Quality.

  • PowerCenter is the core component responsible for ETL (Extract, Transform, Load) processes.

  • PowerExchange enables connectivity to various data sources and targets.

  • Data Quality ensures data accuracy and consistency.

  • Informatica architecture allow...read more

Q68. What is TestNG profiling

Ans.

TestNG profiling is a feature that allows developers to analyze the performance of their test cases and identify bottlenecks.

  • TestNG profiling helps in identifying slow-running test cases and optimizing them for better performance.

  • It provides detailed information on the execution time of each test method, helping developers prioritize optimization efforts.

  • Profiling can be done at the method level, class level, or suite level in TestNG.

  • Developers can use profiling data to impro...read more

Q69. How to create deduplication policies ?

Ans.

Deduplication policies can be created by identifying duplicate data and defining rules to handle them.

  • Identify duplicate data using tools like hashing or comparison algorithms

  • Define rules for handling duplicates such as keeping the first or last occurrence, or merging them

  • Consider factors like data type, size, and frequency of occurrence when creating policies

  • Regularly review and update policies to ensure they are effective

Q70. What is structured array list

Ans.

A structured array list is a data structure that stores elements of the same data type in contiguous memory locations.

  • Elements are accessed using an index.

  • Insertion and deletion operations can be expensive as all elements after the insertion/deletion point need to be shifted.

  • Examples include ArrayList in Java and List in C#.

Q71. What is the parameterized jobs

Ans.

Parameterized jobs allow users to pass parameters to a job when it is executed.

  • Parameters can be used to customize the behavior of a job

  • Parameters can be defined in the job configuration

  • Parameters can be passed through the Jenkins API or command line

  • Examples include passing a build number or target environment as a parameter

Q72. AAD connect configuration.

Ans.

AAD connect configuration is used to synchronize on-premises directories with Azure AD.

  • AAD Connect is used to sync user accounts, passwords, and groups from on-premises AD to Azure AD

  • It can be configured to filter which objects are synced

  • It supports multiple forest and domain configurations

  • It can be set up for password writeback and seamless single sign-on

  • It requires a service account with appropriate permissions in on-premises AD

  • It can be monitored and managed through the Az...read more

Q73. What are Java 8 features?

Ans.

Java 8 introduced several new features including lambda expressions, streams, functional interfaces, and default methods.

  • Lambda expressions allow you to write code in a more concise and readable way.

  • Streams provide a way to work with sequences of elements and perform operations on them.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Default methods allow interfaces to have method implementations.

  • Other featu...read more

Q74. Difference between different select query

Ans.

Different select queries have different purposes and syntax.

  • SELECT retrieves data from one or more tables

  • DISTINCT removes duplicates from the result set

  • WHERE filters the result set based on a condition

  • GROUP BY groups the result set by one or more columns

  • HAVING filters the result set based on a condition after grouping

  • ORDER BY sorts the result set by one or more columns

  • LIMIT limits the number of rows returned

  • JOIN combines rows from two or more tables based on a related column

Q75. Challenge faced in developing any code

Ans.

One challenge in developing code is handling complex logic and ensuring its correctness.

  • Understanding and implementing complex requirements

  • Managing dependencies and integrating different components

  • Testing and debugging to ensure correctness

  • Optimizing code for performance

  • Maintaining code readability and scalability

Q76. Explain what is abstraction

Ans.

Abstraction is the process of hiding complex implementation details and exposing only the necessary information.

  • Abstraction is used to simplify complex systems by breaking them down into smaller, more manageable parts.

  • It allows us to focus on the essential features of a system while ignoring the non-essential details.

  • Abstraction can be achieved through the use of abstract classes, interfaces, and encapsulation.

  • For example, a car can be abstracted as a machine that has an engi...read more

Q77. How to reduce LVM partition

Ans.

To reduce LVM partition, we need to shrink the file system first and then reduce the size of the logical volume.

  • Shrink the file system using appropriate tools like resize2fs for ext2/3/4 file systems or xfs_growfs for XFS file systems

  • Reduce the size of the logical volume using lvreduce command

  • Make sure to take a backup of important data before performing any partition resizing operations

Q78. Program on String reverse and Anagram

Ans.

Program to reverse strings and check for anagrams in an array of strings.

  • Create a function to reverse a string by iterating through each character and appending to a new string.

  • Check if two strings are anagrams by sorting the characters in each string and comparing them.

  • Iterate through the array of strings and apply the above functions to reverse and check for anagrams.

Q79. What is multipathing.

Ans.

Multipathing is a technique used to provide redundancy and load balancing in storage networks.

  • Multipathing allows for multiple paths between a server and storage device to be used simultaneously.

  • It provides redundancy in case of a path failure and load balancing to optimize performance.

  • Multipathing is commonly used in Fibre Channel and iSCSI storage networks.

  • Examples of multipathing software include MPIO for Windows and PowerPath for EMC storage systems.

Q80. Project execution methodology

Ans.

Project execution methodology refers to the process of planning, organizing, and managing resources to achieve project goals.

  • It involves defining project scope, objectives, and deliverables

  • Selecting the appropriate project management approach

  • Developing a project plan and schedule

  • Assigning tasks and responsibilities to team members

  • Monitoring project progress and making necessary adjustments

  • Examples of project execution methodologies include Agile, Waterfall, and Hybrid

Q81. What you have beat quality?

Ans.

I have a proven track record of consistently delivering high-quality work that exceeds expectations.

  • Consistently meeting or exceeding project requirements

  • Attention to detail in all aspects of work

  • Receiving positive feedback from clients or supervisors

  • Implementing quality control measures to ensure high standards

  • Continuous learning and improvement to stay up-to-date with best practices

Q82. Disadvantages of Microservice architecture

Ans.

Microservice architecture has some disadvantages.

  • Increased complexity in deployment and management

  • Increased network latency and communication overhead

  • Difficulties in maintaining data consistency across services

  • Requires significant investment in infrastructure and tooling

  • May not be suitable for small or simple applications

Q83. Check constrain in SQL

Ans.

Check constraint is used to limit the values that can be inserted into a column.

  • It is a type of constraint in SQL

  • It is used to limit the values that can be inserted into a column

  • It is used to ensure data integrity

  • It can be used to check for a range of values, data types, or conditions

  • Example: CREATE TABLE Students (id INT, name VARCHAR(50), age INT CHECK (age >= 18));

Q84. What is a servlet actually?

Ans.

A servlet is a Java program that runs on a web server and handles client requests.

  • Servlets are used to create dynamic web pages and web applications.

  • They can handle HTTP requests and responses.

  • Servlets can be used to process form data, authenticate users, and more.

  • Examples of servlet containers include Apache Tomcat and Jetty.

Q85. Area of interest

Ans.

My area of interest is data analysis and visualization.

  • I have experience using tools like Tableau and Power BI for data visualization.

  • I enjoy exploring trends and patterns in data to derive insights.

  • I have worked on projects involving data cleaning, analysis, and presentation.

Q86. Collection in PL SQL

Ans.

Collection in PL SQL is a data structure that can hold multiple values of the same data type.

  • Collections can be nested within each other.

  • PL/SQL provides three types of collections: associative arrays, nested tables, and VARRAYs.

  • Collections can be used to pass multiple values to a stored procedure or function.

  • Collections can be used to simplify SQL statements by allowing multiple rows to be returned as a single result set.

Q87. Write code for Explicit wait

Ans.

Code for Explicit wait in Selenium WebDriver

  • Import WebDriverWait and ExpectedConditions classes

  • Specify the maximum time to wait and the polling interval

  • Use ExpectedConditions methods like elementToBeClickable, visibilityOfElementLocated, etc.

  • Apply the wait to a specific element or condition

Q88. What is owin.

Ans.

OWIN stands for Open Web Interface for .NET. It is a standard interface between .NET web servers and web applications.

  • OWIN decouples the web application from the web server, making it easier to develop and test.

  • It allows developers to write middleware components that can be used across different web frameworks.

  • OWIN is used in ASP.NET applications to provide a standard interface for communication between the web server and the application.

  • Examples of OWIN-compatible web server...read more

Q89. Explain Report Bursting.

Ans.

Report bursting is a process of delivering personalized reports to multiple recipients based on predefined criteria.

  • Report bursting is used to distribute a single report to multiple recipients.

  • It allows for the customization of report content based on recipient-specific data or preferences.

  • Criteria for report bursting can include recipient roles, departments, locations, or any other relevant attributes.

  • Reports can be bursted in various formats such as PDF, Excel, or HTML.

  • Exam...read more

Q90. Explain joins using excel

Ans.

Joins in Excel are used to combine data from different tables based on a common column.

  • Joins in Excel are performed using the VLOOKUP, INDEX/MATCH, or Power Query functions.

  • Common types of joins include inner join, left join, right join, and full outer join.

  • Joins help in merging data from multiple tables to create a single, unified dataset.

  • For example, you can use VLOOKUP to combine sales data from one table with customer information from another table.

Q91. Kafka pipeline with database

Ans.

Using Kafka to create a pipeline with a database for real-time data processing.

  • Set up Kafka Connect to stream data from database to Kafka topics

  • Use Kafka Streams to process and analyze data in real-time

  • Integrate with database connectors like JDBC or Debezium

  • Ensure data consistency and fault tolerance in the pipeline

Q92. Explain framework worked

Ans.

A framework is a structured set of guidelines or rules that provide a foundation for developing software applications.

  • Frameworks provide a structure for developers to build upon, saving time and effort.

  • They often include pre-written code, libraries, and tools to streamline development.

  • Frameworks can be specific to a certain programming language or technology, such as Angular for JavaScript or Django for Python.

Q93. Explain plan

Ans.

Explain plan is a feature in Oracle database that shows the execution plan of a SQL statement.

  • It helps in identifying the most efficient way to execute a query.

  • It shows the order in which tables are accessed, join methods used, and access methods used.

  • It can be generated using the EXPLAIN PLAN statement or through tools like SQL Developer.

  • The output can be in either text or graphical format.

Q94. New features of dynamics 365

Ans.

Dynamics 365 has new features for better customer engagement, AI-driven insights, and improved productivity.

  • Improved integration with LinkedIn Sales Navigator for better lead generation

  • AI-driven insights for sales and customer service

  • Improved productivity with new mobile app features

  • New Dynamics 365 Virtual Agent for Customer Service

  • Enhanced Dynamics 365 Marketing capabilities

  • Improved Dynamics 365 Finance and Operations with new features for supply chain management and projec...read more

Q95. Xpath how to find

Ans.

Xpath is a query language used to navigate through XML documents and locate elements based on their attributes or values.

  • Use double forward slashes (//) to select all elements in the document

  • Use square brackets to specify conditions for selecting elements, such as [@attribute='value']

  • Use the 'text()' function to select elements based on their text content

  • Use the 'contains()' function to select elements that contain a specific value

Q96. Using sink connectors

Ans.

Sink connectors are used to connect a sink to the plumbing system, allowing for drainage of water and waste.

  • Sink connectors come in various sizes and materials to fit different sink and plumbing configurations.

  • They are typically made of PVC, stainless steel, or brass.

  • Proper installation of sink connectors is important to prevent leaks and ensure proper drainage.

  • Examples of sink connectors include P-traps, tailpieces, and extension tubes.

Q97. Why you choose TCS

Ans.

I chose TCS for its global presence, diverse opportunities, and strong reputation in the industry.

  • Global presence with offices in multiple countries

  • Diverse opportunities for career growth and development

  • Strong reputation in the industry for quality services and innovation

Q98. Explain OOPS Principles

Ans.

OOPS principles are a set of guidelines that help in designing and implementing object-oriented programs.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions that manipulate it, into a single unit.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Ability of objects to take on multiple forms, depending on the context.

  • Examples: Animal class can have subclas...read more

Q99. Fibonacci series in C

Ans.

Fibonacci series in C is a sequence of numbers where each number is the sum of the two preceding ones.

  • Declare an array to store the Fibonacci series

  • Initialize the first two elements of the array as 0 and 1

  • Use a loop to calculate and store the next elements by adding the previous two elements

Q100. Palindrome series in C

Ans.

A palindrome series in C is a series of strings that read the same forwards and backwards.

  • Create an array of strings to store the series

  • Use a loop to iterate through the series and check if each string is a palindrome

  • Print or store the palindromic strings

Previous
1
2
3
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10k Interviews
3.8
 • 5.4k Interviews
3.6
 • 2.3k Interviews
3.5
 • 766 Interviews
3.9
 • 348 Interviews
3.8
 • 16 Interviews
3.4
 • 4 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

AST Consultant Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter