Technical Architect

100+ Technical Architect Interview Questions and Answers

Updated 7 Jul 2025
search-icon
1w ago

Q. Design a loan application system.

Ans.

Design and implement a loan application system using Java.

  • Identify the necessary data fields for a loan application

  • Create a user interface for applicants to input their information

  • Implement validation checks for input data

  • Calculate loan eligibility based on input data

  • Store application data in a database

  • Generate loan approval/rejection letters

Asked in Altimetrik

1w ago

Q. What is state management in ASP.Net?

Ans.

State management in ASP.Net refers to the process of storing and retrieving data between HTTP requests.

  • ASP.Net provides various techniques for state management such as ViewState, Session, Application, and Cache.

  • ViewState is used to store page-specific data, Session is used to store user-specific data, Application is used to store application-level data, and Cache is used to store frequently accessed data.

  • State management is important for maintaining the state of an applicatio...read more

Asked in LTIMindtree

1w ago

Q. How would you migrate the security of a Mainframe system to a Distributed system?

Ans.

Migrating Mainframe security to Distributed system requires careful planning and execution.

  • Identify the security requirements of the Mainframe system

  • Evaluate the security features of the Distributed system

  • Develop a migration plan that addresses any gaps in security features

  • Test the security of the Distributed system thoroughly before deployment

  • Train users on the new security features and best practices

Asked in TCS

6d ago

Q. What are the core differences between separate access policies from different connection protocols in Azure?

Ans.

Different connection protocols in Azure have separate access policies.

  • Access policies can be set for different connection protocols such as HTTP, HTTPS, FTP, etc.

  • Each protocol can have its own set of rules and permissions for accessing resources.

  • For example, HTTPS may require a higher level of authentication than HTTP.

  • Separate policies allow for more granular control over access to resources.

  • This can improve security and compliance with regulations.

Are these interview questions helpful?

Asked in Capgemini

1w ago

Q. Explain how to pass data through multiple approval processes in Azure architecture.

Ans.

Data can be passed with multiple approval process in Azure architecture using Azure Logic Apps and Azure Functions.

  • Use Azure Logic Apps to create a workflow that triggers the approval process

  • Pass the data to be approved as inputs to the Logic App

  • Configure the approval step using connectors like Office 365 Outlook or Microsoft Teams

  • Once approved, use Azure Functions to process the approved data

  • Azure Functions can be triggered by the Logic App upon approval

  • Process the data and ...read more

2w ago

Q. What are the different approaches you would follow for a Greenfield Snowflake project?

Ans.

Different approaches for a Greenfield Snowflake project include data modeling, ETL design, and performance optimization.

  • Develop a comprehensive data model to ensure efficient storage and retrieval of data.

  • Design ETL processes to extract, transform, and load data into Snowflake.

  • Implement performance optimization techniques such as clustering keys and materialized views.

  • Utilize Snowflake's features like semi-structured data support and automatic scaling for improved efficiency....read more

Technical Architect Jobs

Allianz logo
Technical Architect - Java Development (8-10 yrs) 8-10 years
Allianz
4.4
IBM India Pvt. Limited logo
Technical Architect-Salesforce 7-12 years
IBM India Pvt. Limited
4.0
Bangalore / Bengaluru
IBM India Pvt. Limited logo
Technical Architect - VMWare 8-12 years
IBM India Pvt. Limited
4.0
Bangalore / Bengaluru
6d ago

Q. How do you handle logging from multiple applications?

Ans.

I use a centralized logging system and implement a standardized logging format.

  • Implement a centralized logging system such as ELK stack or Splunk

  • Standardize the logging format across all applications

  • Use unique identifiers to track logs from different applications

  • Set up alerts and notifications for critical logs

  • Regularly review and analyze logs for insights and improvements

Asked in HCLTech

2d ago

Q. Microservice project architecture and flow in current project, Microservice design patterns etc..

Ans.

Explained microservice project architecture and design patterns.

  • Our microservice project follows a domain-driven design approach.

  • We use API Gateway pattern to handle requests and route them to appropriate microservices.

  • We also use Circuit Breaker pattern to handle failures and prevent cascading failures.

  • Each microservice has its own database and communicates with other microservices through REST APIs.

  • We use containerization with Docker and orchestration with Kubernetes for de...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop
1w ago

Q. Diff. b/w forEach() of List and Stream API?. Diff. b/w terminal and intermediate operations on Stream?.

Ans.

forEach() is a method of List interface while Stream API provides forEach() for streams. Terminal operations produce a result while intermediate operations return a new stream.

  • forEach() of List is used to iterate over elements in a sequential manner while forEach() of Stream API is used to perform an action on each element in a parallel manner.

  • Terminal operations like collect(), reduce(), and forEach() produce a result and close the stream while intermediate operations like f...read more

Q. What is the use of a service in Angular, and how do you create one?

Ans.

Services in Angular are used to share data or functionality across components. They are singleton objects that can be injected into components.

  • Services are created using the 'ng generate service' command or by manually creating a TypeScript class with the @Injectable decorator.

  • Services can be injected into components using the constructor of the component class.

  • Services can be used to fetch data from APIs, share data between components, or perform common tasks that need to be...read more

Q. Why are MFC applications still in use when newer desktop application frameworks are available?

Ans.

MFC applications are still used due to legacy systems, familiarity, performance, and compatibility reasons.

  • Legacy systems: Many organizations have existing MFC applications that are costly to replace or upgrade.

  • Familiarity: Developers who are experienced with MFC may prefer to continue using it for new projects.

  • Performance: MFC applications can be optimized for performance in certain scenarios.

  • Compatibility: MFC applications may need to interact with legacy systems or third-p...read more

Asked in Intel

1w ago

Q. What are the basic concepts of Object-Oriented Programming (OOP) in C++?

Ans.

OOP in C++ is based on concepts like encapsulation, inheritance, polymorphism, and abstraction for better code organization.

  • Encapsulation: Bundling data and methods in classes. Example: class Car { private: int speed; public: void setSpeed(int s) { speed = s; }};

  • Inheritance: Deriving new classes from existing ones. Example: class ElectricCar : public Car {}; // ElectricCar inherits from Car

  • Polymorphism: Ability to call the same method on different objects. Example: class Shap...read more

Asked in GlobalLogic

2w ago

Q. Design an elaborate user access control system, with granular control from pages, controls, data, and response masking.

Ans.

Design a user access control system with granular control for pages, controls, data, and response masking.

  • Implement role-based access control (RBAC) to assign permissions to users based on their roles.

  • Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.

  • Implement data masking techniques to ensure sensitive information is not exposed in responses.

  • Use a combination of authentication mechanisms such as OAut...read more

Asked in Capgemini

1w ago

Q. When would you choose Entity Framework over ADO.net, and why?

Ans.

Entity Framework is recommended due to its higher level of abstraction and productivity.

  • Entity Framework provides a higher level of abstraction, making it easier to work with databases.

  • It supports various database providers, allowing for flexibility in choosing the backend.

  • Entity Framework enables rapid development with features like automatic code generation and change tracking.

  • It offers a rich set of features like LINQ support, caching, and transaction management.

  • ADO.NET re...read more

Asked in TCS

6d ago

Q. How do you use the time travel functionality in Databricks?

Ans.

Time travel functionality in Databricks allows users to query data at a specific point in time.

  • Enable time travel on a table by setting the table property 'delta.enableChangeDataFeed' to true

  • Use the AS OF clause in SQL queries to specify a specific point in time to query data

  • Time travel can be used for auditing, debugging, and recovering lost data

  • Example: SELECT * FROM table_name AS OF TIMESTAMP '2022-01-01 00:00:00'

Q. When there is a production issue, how do you react and what steps do you take to resolve the issue?

Ans.

I remain calm, analyze the issue, prioritize tasks, involve necessary stakeholders, implement a solution, and document the resolution.

  • Remain calm and assess the situation

  • Prioritize tasks based on impact and urgency

  • Involve necessary stakeholders such as developers, operations team, and management

  • Implement a solution while keeping communication channels open

  • Document the issue, resolution steps, and any learnings for future reference

Asked in PwC

1w ago

Q. Which version control tool did you use, and what was your experience with CI/CD?

Ans.

We use Git as our version control tool and Jenkins for CI/CD.

  • We use Git for version control as it is widely used and has a lot of community support.

  • Jenkins is our preferred CI/CD tool as it is open-source and has a large number of plugins available.

  • We have also used other version control tools like SVN and Mercurial in the past.

  • For CI/CD, we have used tools like Travis CI and CircleCI for specific projects.

  • We follow the GitFlow branching model for our development process.

Asked in GlobalLogic

1w ago

Q. Describe the microservices architecture for a wealth management app.

Ans.

Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.

  • Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.

  • Services communicate through APIs, allowing for flexibility and scalability.

  • Each microservice can be developed, deployed, and scaled independently, leading to faster development cycles and easier maintenance.

  • Microservices architec...read more

Asked in Intel

1w ago

Q. Pseudocode, find errors in the code. What can be output of code

Ans.

Analyze pseudocode for errors and potential outputs.

  • Check for syntax errors, such as missing semicolons or parentheses.

  • Verify variable initialization before use to avoid null references.

  • Ensure loops have proper termination conditions to prevent infinite loops.

  • Examine array indexing to avoid out-of-bounds errors.

  • Consider data types and conversions, especially in arithmetic operations.

Asked in Altimetrik

1w ago

Q. What are postback events?

Ans.

Postback events are server-side events triggered by user actions on a web page.

  • Postback events occur when a user interacts with a web page and the page sends a request back to the server for processing.

  • Examples of postback events include clicking a button, selecting an item from a dropdown list, or submitting a form.

  • Postback events can be used to update the page content without requiring a full page refresh.

  • ASP.NET is a framework that uses postback events extensively.

Asked in TCS

6d ago

Q. What are the integration patterns in Salesforce?

Ans.

Salesforce integration patterns include point-to-point, middleware, and API-led approaches.

  • Point-to-point integration involves connecting two systems directly.

  • Middleware integration involves using a third-party software to connect systems.

  • API-led integration involves using APIs to connect systems in a reusable and scalable way.

  • Salesforce supports various integration technologies such as REST, SOAP, and Bulk APIs.

  • Salesforce also provides integration tools like Salesforce Conne...read more

Asked in Altimetrik

1w ago

Q. What is ASP.Net cache and what are its different types?

Ans.

ASP.Net cache is a feature that stores frequently accessed data in memory to improve application performance.

  • ASP.Net cache is available in two types: in-memory cache and distributed cache.

  • In-memory cache stores data in the memory of the web server.

  • Distributed cache stores data in a separate cache server that can be accessed by multiple web servers.

  • ASP.Net cache can be used to store data such as database query results, page output, and application configuration settings.

  • Cache ...read more

Asked in TCS

4d ago

Q. How do you configure and handle security when transmitting data in an application?

Ans.

Data transmission security is ensured through configuration and handling of encryption, authentication, and secure protocols.

  • Implement encryption algorithms like SSL/TLS to secure data transmission

  • Use secure protocols like HTTPS, SFTP, or SSH for transmitting sensitive data

  • Implement authentication mechanisms like OAuth, JWT, or certificates to verify the identity of the sender and receiver

  • Apply data integrity checks like digital signatures or checksums to detect tampering

  • Impl...read more

Asked in MPRDC

2d ago

Q. What is the difference between synchronous and asynchronous?

Ans.

Synchronous and asynchronous are two different ways of executing tasks in a system.

  • Synchronous execution blocks the program until a task is completed.

  • Asynchronous execution allows the program to continue running while a task is being processed.

  • Synchronous tasks are executed one after another in a sequential manner.

  • Asynchronous tasks can be executed concurrently or in parallel.

  • Synchronous communication is like making a phone call and waiting for the other person to respond.

  • Asy...read more

1w ago

Q. What is the role of Kafka Zookeeper in the design system?

Ans.

Kafka Zookeeper plays a crucial role in managing and coordinating Kafka brokers in a distributed system.

  • Zookeeper manages configuration information, leader election, and synchronization for Kafka brokers.

  • It helps in maintaining the state of the Kafka cluster and ensures fault tolerance.

  • Zookeeper stores metadata about Kafka topics, partitions, and replicas.

  • It also helps in detecting and recovering from network partitions within the Kafka cluster.

  • Overall, Zookeeper acts as a ce...read more

1w ago

Q. What is the difference between Docker and Docker Compose?

Ans.

Docker is a platform for containerization, while Docker Compose is a tool for defining and running multi-container applications.

  • Docker allows you to create, deploy, and manage containers individually.

  • Docker Compose enables you to define a multi-container application using a single YAML file.

  • With Docker, you run commands like 'docker run' to start a container; with Docker Compose, you use 'docker-compose up' to start all services defined in the YAML.

  • Docker is suitable for sing...read more

1w ago

Q. Share your plan for a Microservices problem statement to check whether you cover all aspects of programming.

Ans.

Plan for a Microservices architecture focusing on scalability, resilience, and maintainability.

  • Define clear service boundaries: Each microservice should have a single responsibility, e.g., user management, order processing.

  • Choose appropriate communication protocols: Use REST or gRPC for synchronous communication, and message brokers like RabbitMQ for asynchronous.

  • Implement API Gateway: Centralize requests to microservices, e.g., using tools like Kong or AWS API Gateway.

  • Ensure...read more

Asked in TCS

1w ago

Q. Explain RabbitMQ, Service Worker on browser

Ans.

RabbitMQ is a message broker that enables communication between distributed systems. Service Worker is a browser API that allows background processing.

  • RabbitMQ is used for asynchronous messaging between applications and services

  • It supports multiple messaging protocols such as AMQP, MQTT, and STOMP

  • Service Worker allows web applications to run scripts in the background, even when the browser is closed

  • It can be used for tasks such as caching, push notifications, and background s...read more

Asked in Altimetrik

2d ago

Q. What is Ahead-of-Time (AoT) compilation in Microsoft Azure?

Ans.

AoT (Ahead of Time) is a compilation technique used in Microsoft Azure to improve application performance.

  • AoT compiles code before it is executed, resulting in faster startup times and reduced memory usage.

  • It is commonly used in Azure Functions and Azure Web Apps.

  • AoT can also improve security by detecting potential vulnerabilities during compilation.

  • It is different from Just-in-Time (JIT) compilation, which compiles code during runtime.

  • AoT can be used with multiple programmin...read more

1d ago

Q. Write a program to add a node in a binary tree using a recursive function.

Ans.

Program to add a node in binary tree using recursive function.

  • Create a function to recursively traverse the tree to find the appropriate position to add the new node.

  • Check if the current node is null, if so, create a new node and assign it to the current node.

  • If the current node is not null, compare the value of the new node with the current node and move left or right accordingly.

  • Repeat the process until the appropriate position is found and the new node is added.

Previous
1
2
3
4
5
6
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Accenture Logo
3.7
 • 8.7k Interviews
Infosys Logo
3.6
 • 7.9k Interviews
Capgemini Logo
3.7
 • 5.1k Interviews
Tech Mahindra Logo
3.5
 • 4.1k Interviews
View all
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Technical Architect Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits