IT Analyst C2
80+ IT Analyst C2 Interview Questions and Answers

Asked in TCS

Q. How do you create an alert mechanism using third-party tools?
To create an alert mechanism without using 3rd party tools, one can use scripting languages like Python or Bash.
Use scripting languages like Python or Bash to create custom alert mechanisms
Leverage built-in system tools like cron jobs and email notifications
Integrate with existing monitoring systems like Nagios or Zabbix
Create custom scripts to monitor specific events or metrics
Use APIs to integrate with external services like Slack or PagerDuty

Asked in TCS

Q. Difference between canvas apps and model driven apps. Where to use what?
Canvas apps are highly customizable and allow for more creative freedom, while model driven apps are more structured and data-driven.
Canvas apps are ideal for scenarios where you need to create a custom user interface or experience
Model driven apps are better suited for scenarios where you need to manage complex data models and business processes
Canvas apps are built using a drag-and-drop interface, while model driven apps are built using the Power Apps framework
Examples of c...read more
IT Analyst C2 Interview Questions and Answers for Freshers

Asked in TCS

Q. What is an HTTP Interceptor, and can you provide an example of its use?
An HTTP Interceptor is a middleware component that intercepts incoming and outgoing HTTP requests in an application.
HTTP Interceptors are commonly used in Angular applications to modify or log HTTP requests/responses.
They can be used to add headers, handle errors, or perform authentication.
An example of using an HTTP Interceptor is adding an authorization token to every outgoing request for secure API calls.

Asked in TCS

Q. What is the role of route guards in Angular, and what are their types?
Route guards in Angular are used to control access to certain routes in an application.
Route guards are used to protect routes in Angular applications by controlling whether a route can be activated or not.
There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanDeactivate.
CanActivate guard is used to determine if a route can be activated.
CanActivateChild guard is used to determine if a child route can be activated.
CanDeactivate guard is used to...read more

Asked in TCS

Q. 1) Role of the Scrum Master 2) Scrum Events 3) Vertical slicing. 4) Product Owner Role and importance 5) How will you run a sprint if a user story has to be added in the middle of the sprint ?
The role of the Scrum Master, Scrum events, vertical slicing, Product Owner role, and handling user story additions mid-sprint.
The Scrum Master is responsible for facilitating the Scrum process, ensuring the team follows Scrum principles, and removing any obstacles that may impede progress.
Scrum events include Sprint Planning, Daily Stand-ups, Sprint Review, and Sprint Retrospective.
Vertical slicing refers to breaking down user stories into smaller, valuable increments that c...read more

Asked in TCS

Q. How can form details be submitted to multiple SharePoint lists?
To submit one form details to multiple SharePoint list, use Microsoft Power Automate.
Create a new flow in Power Automate
Add the trigger 'When an item is created or modified'
Add the action 'Create item' for each SharePoint list
Map the fields from the form to the corresponding SharePoint list columns
Save and test the flow

Asked in TCS

Q. What measures do you take to prevent data loss?
To prevent data loss, measures such as regular backups, data encryption, access control, and disaster recovery plans should be implemented.
Regularly backup data to an offsite location
Encrypt sensitive data to prevent unauthorized access
Implement access control measures to limit who can access and modify data
Create and test disaster recovery plans to ensure data can be recovered in case of a disaster
Train employees on data security best practices

Asked in TCS

Q. What are the methods for communication between components?
Methods for communication between components include synchronous and asynchronous communication, message queues, APIs, and web services.
Synchronous communication: Components communicate in real-time, waiting for a response before proceeding.
Asynchronous communication: Components communicate without waiting for a response, allowing for parallel processing.
Message queues: Components send messages to a queue for other components to retrieve and process.
APIs (Application Programm...read more
Share interview questions and help millions of jobseekers 🌟

Asked in TCS

Q. What is the dependency injection (DI) system in Angular?
DI system in Angular is a design pattern where dependencies are injected into a class rather than the class creating them.
DI helps in creating loosely coupled components in Angular applications.
It allows for easier testing and maintenance of code.
Dependencies are provided to a component through its constructor.
Angular's DI system is hierarchical, meaning dependencies can be injected at different levels of the application.
Example: In Angular, services are often injected into c...read more

Asked in TCS

Q. What is the difference between localStorage and sessionStorage?
localStorage and sessionStorage are both web storage options in JavaScript, but they have different scopes and lifetimes.
localStorage stores data with no expiration date, while sessionStorage stores data for one session only
localStorage data persists even after the browser is closed and reopened, while sessionStorage data is lost when the browser is closed
Both can only store strings, but can be converted to other data types using JSON.stringify() and JSON.parse()

Asked in TCS

Q. What are the prerequisites for installing equipment under a functional location?
The prerequisite to install an equipment under a functional location is having the necessary technical specifications and ensuring compatibility.
Ensure the equipment is compatible with the functional location's requirements
Have the technical specifications of the equipment ready
Check if any additional tools or resources are needed for installation

Asked in TCS

Q. What is middleware, and can you provide examples of how it is processed in .NET Core?
Middleware in .NET Core is software that acts as a bridge between an application's request and response.
Middleware in .NET Core is a pipeline of components that can process HTTP requests and responses.
Examples of middleware in .NET Core include authentication middleware, logging middleware, and error handling middleware.
Middleware components are added to the application's request pipeline in the Startup class using the UseMiddleware method.

Asked in TCS

Q. What are the different SQL codes we get when executing a COBOL DB2 program?
Different SQL codes in COBOL DB2 programs indicate various outcomes of SQL operations.
SQLCODE 0 indicates successful execution of SQL statement
SQLCODE -805 indicates DBRM or package not found in plan
SQLCODE -818 indicates timestamp mismatch between DB2 and application
SQLCODE -911 indicates deadlock or timeout
SQLCODE -501 indicates cursor not open

Asked in Trigent Software

Q. What is the difference between Promises and Observables?
Promises and Observables are both used for asynchronous programming, but Observables are more powerful and flexible.
Promises represent a single value that will be resolved or rejected at some point in the future.
Observables represent a stream of values that can be emitted over time.
Observables can be cancelled, while Promises cannot.
Observables can handle multiple values, errors, and completion events, while Promises can only handle a single value and error.
Observables can be...read more

Asked in TCS

Q. How can image files be stored in Power Automate?
To store image file in Power Automate, use OneDrive or SharePoint connector.
Use 'Create file' action from OneDrive or SharePoint connector
Set the 'File name' and 'File content' fields
Use dynamic content to get the image file from the previous action
Ensure the file format is supported by Power Automate

Asked in TCS

Q. Given the dictionary dict={9:[1,2,7]}, find the numbers from the value which sum up to the key.
Find numbers from a list that can make the same equal to a given key.
Iterate through the list and check if the sum of any two numbers equals the key.
Return those two numbers.
Example: key=9, list=[1,2,7], answer=[2,7]

Asked in TCS

Q. What are design patterns commonly used in Angular?
Common design patterns in Angular include Singleton, Observer, Factory, and Dependency Injection.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.
Factory pattern is used to create objects without specifying the exact class of object that will be created.
Dependency I...read more

Asked in TCS

Q. What is the SQL query used to remove duplicate data?
SQL queries to remove duplicates typically use DELETE with a subquery or the DISTINCT keyword in SELECT statements.
Use DELETE with a subquery to remove duplicates: DELETE FROM table_name WHERE id NOT IN (SELECT MIN(id) FROM table_name GROUP BY column_name);
Use the DISTINCT keyword to select unique records: SELECT DISTINCT column_name FROM table_name;
For SQL Server, you can use ROW_NUMBER(): WITH CTE AS (SELECT *, ROW_NUMBER() OVER (PARTITION BY column_name ORDER BY id) AS rn ...read more

Asked in TCS

Q. What are the differences between NGFW and non-NGFW?
NGFW is an advanced firewall that provides additional security features compared to non-NGFW.
NGFW has application awareness and can identify and control specific applications and protocols.
NGFW can perform deep packet inspection to detect and block advanced threats.
NGFW can provide SSL/TLS decryption and inspection to detect and block threats hidden in encrypted traffic.
Non-NGFW only provides basic packet filtering and port blocking.
Examples of NGFW include Cisco Firepower, P...read more

Asked in TCS

Q. How does earned value analysis help with project planning?
Earned value analysis helps in project planning by providing a method to measure project performance and forecast future outcomes.
Helps in measuring project performance by comparing planned value, earned value, and actual cost
Provides a clear picture of project progress and helps in identifying potential issues early on
Allows for forecasting future project outcomes based on current performance data
Enables project managers to make informed decisions and adjustments to ensure p...read more

Asked in TCS

Q. What is a directive in Angular?
Directives in Angular are markers on a DOM element that tell Angular to attach a specified behavior to that DOM element or transform it.
Directives are used to create reusable components or add behavior to existing elements.
There are three types of directives in Angular: Component, Structural, and Attribute directives.
Examples of built-in directives in Angular include ngIf, ngFor, and ngStyle.

Asked in TCS

Q. What is react. Some characterstics of react
React is a JavaScript library for building user interfaces.
React is used for creating reusable UI components.
It follows a component-based architecture.
React uses a virtual DOM for efficient rendering.
It supports server-side rendering.
React is declarative, making it easier to understand and debug code.
It has a large and active community with extensive documentation and support.

Asked in TCS

Q. What are the differences between IPS and IDS?
IPS & IDS are both network security systems, but IPS is proactive while IDS is reactive.
IPS stands for Intrusion Prevention System and actively blocks malicious traffic.
IDS stands for Intrusion Detection System and only alerts when malicious traffic is detected.
IPS is placed inline with network traffic while IDS is placed passively to monitor traffic.
IPS can prevent attacks before they happen while IDS can only detect attacks after they happen.
Examples of IPS include Cisco Fi...read more

Asked in TCS

Q. Sample AWS architecture for IoT solution
AWS IoT solution architecture includes IoT devices, AWS IoT Core, AWS Lambda, and AWS S3.
IoT devices send data to AWS IoT Core
AWS IoT Core processes and routes data to AWS services
AWS Lambda functions process data in real-time
Data is stored in AWS S3 for further analysis
AWS IoT Analytics can be used for advanced analytics

Asked in TCS

Q. What are pipes and what are their types?
Pipes are a form of inter-process communication used in Unix-like operating systems to send data between processes.
Pipes allow communication between processes by connecting the standard output of one process to the standard input of another process
There are two types of pipes: unnamed pipes and named pipes (also known as FIFOs)
Unnamed pipes are created using the pipe system call and exist only as long as the processes using them are alive
Named pipes are created using the mkfi...read more

Asked in TCS

Q. What are the techniques for query optimization?
Query optimization techniques enhance database performance by improving the efficiency of SQL queries.
Use indexing: Create indexes on frequently queried columns to speed up data retrieval. Example: Indexing a 'customer_id' column in a sales table.
Analyze query execution plans: Use tools like EXPLAIN to understand how queries are executed and identify bottlenecks.
Avoid SELECT *: Specify only the columns needed in the SELECT statement to reduce data transfer. Example: SELECT na...read more

Asked in TCS

Q. Write a trigger related to the account contact relationship.
A trigger related to account contact relationship
Create a trigger on the Account object
Use the 'after insert' and 'after update' events to capture changes
Query the related Contact records based on the Account Id
Perform necessary actions based on the relationship between Account and Contact

Asked in Impelsys

Q. What are DNS and DHCP, and how do they function?
DNS translates domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.
DNS (Domain Name System) resolves human-readable domain names (e.g., www.example.com) to IP addresses (e.g., 192.0.2.1).
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network, reducing manual configuration.
DNS servers maintain a database of domain names and their corresponding IP addresses, allowing users to access websites easily...read more

Asked in TCS

Q. What Selenium exceptions have you faced?
I have faced exceptions like ElementNotVisibleException, NoSuchElementException, TimeoutException, StaleElementReferenceException, etc.
ElementNotVisibleException occurs when an element is present in the DOM but not visible on the page
NoSuchElementException is thrown when an element could not be found in the DOM
TimeoutException occurs when a command does not complete in the specified time
StaleElementReferenceException is thrown when the element is no longer attached to the DOM

Asked in TCS

Q. How do you estimate the time required for an Angular migration?
Estimating time for Angular migration involves assessing project scope, complexity, resources, and potential roadblocks.
Analyze the size and complexity of the existing AngularJS application
Identify dependencies on third-party libraries or services that may impact migration
Consider the availability of skilled developers for the migration process
Factor in potential roadblocks such as legacy code, lack of documentation, or outdated dependencies
Break down the migration process in...read more
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for IT Analyst C2 Related Skills



Reviews
Interviews
Salaries
Users

