i
Filter interviews by
I applied via LinkedIn and was interviewed before Sep 2022. There were 4 interview rounds.
Just basic knowledge of your profile
OWASP Top 10 is a list of the top 10 most critical security risks for web, API, and mobile applications.
Injection: SQL injection, NoSQL injection, Command injection
Broken Authentication: Weak passwords, Session management issues
Sensitive Data Exposure: Insecure data storage, Lack of encryption
XML External Entities (XXE): Parsing XML input from untrusted sources
Broken Access Control: Unauthorized access to resources
Secu...
Top trending discussions
I applied via Naukri.com and was interviewed in Jun 2023. There were 2 interview rounds.
posted on 21 Mar 2025
I appeared for an interview before Mar 2024, where I was asked the following questions.
HA ensures VM availability, DRS balances loads, vMotion enables live migration, Host Profiles standardize settings, and snapshots capture states.
HA (High Availability) automatically restarts VMs on other hosts in case of a host failure.
DRS (Distributed Resource Scheduler) optimizes resource allocation by balancing workloads across hosts.
vMotion allows live migration of VMs from one host to another without downtime, ens...
VNet is a virtual network in Azure that enables secure communication between resources. It supports VMs, availability zones, and scaling.
VNet (Virtual Network) allows Azure resources to communicate securely.
To create a VM, prerequisites include an Azure subscription, resource group, and VNet.
Availability Zones are physically separate locations within a region for high availability.
Availability Sets ensure VMs are distr...
Blob storage is a cloud storage solution for unstructured data, allowing scalable and cost-effective data management.
Stores large amounts of unstructured data like images, videos, and documents.
Examples include Azure Blob Storage and Amazon S3.
Supports various access tiers for cost optimization based on usage.
Enables data redundancy and backup options for enhanced durability.
Facilitates easy integration with applicatio...
Azure VPN enables secure connections between Azure and on-premises networks, offering various types for different needs.
Types of Azure VPN include Site-to-Site, Point-to-Site, and VNet-to-VNet.
Site-to-Site VPN connects entire networks, e.g., an on-premises network to Azure.
Point-to-Site VPN allows individual devices to connect to Azure, useful for remote workers.
VNet-to-VNet VPN connects multiple Azure virtual networks...
A site-to-site VPN connects two or more networks securely over the internet, enabling remote access and data sharing.
Establishes a secure tunnel between two networks, often used by businesses.
Utilizes protocols like IPsec or OpenVPN for encryption.
Example: A corporate office connecting securely to a branch office.
Allows remote users to access resources as if they were on the local network.
Enhances security by encryptin...
Swapping an OS disk involves replacing the current operating system disk with a new one, ensuring data integrity and system functionality.
1. Backup existing data: Always create a backup of your current OS disk to prevent data loss.
2. Prepare the new disk: Ensure the new OS disk is properly formatted and has the necessary operating system installed.
3. Shut down the system: Power off the machine before physically swappin...
Azure VM backup can be performed using Azure Backup service for efficient data protection and recovery.
Use Azure Backup service to create a Recovery Services vault.
Configure backup policies to define backup frequency and retention.
Select the virtual machine you want to back up and associate it with the vault.
Initiate a backup job manually or schedule it based on your policy.
Monitor backup jobs and restore points throug...
Azure offers various backup types to ensure data protection and recovery, including file, VM, and application backups.
Azure Backup: A service for backing up Azure VMs, on-premises servers, and applications.
File Share Backup: Protects files stored in Azure File Shares.
VM Backup: Automated backup of Azure Virtual Machines with point-in-time restore.
Application Backup: Supports backups for Azure SQL Database and Azure Blo...
Disaster recovery is a strategy to restore IT systems and operations after a disruptive event.
Involves planning for data backup and restoration.
Includes strategies for hardware and software recovery.
Examples: Natural disasters, cyberattacks, power failures.
Testing recovery plans regularly to ensure effectiveness.
Utilizing cloud services for off-site data storage.
I applied via Naukri.com and was interviewed before Nov 2022. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There was 1 interview round.
The structure of an Order typically includes customer information, product details, quantity, price, and payment information.
Customer information (name, address, contact details)
Product details (name, description, SKU)
Quantity of each product ordered
Price of each product
Payment information (payment method, total amount)
Order status (pending, shipped, delivered)
Plants in a sales order are determined based on the customer's requirements, availability, pricing, and shipping logistics.
Plants are determined based on the customer's location and delivery preferences.
Availability of the product at different plant locations is considered.
Pricing and discounts may vary based on the plant from which the product is shipped.
Shipping logistics such as distance, transportation costs, and d...
Memory ballooning is a technique used in virtualization to reclaim unused memory from virtual machines.
Allows hypervisors to dynamically adjust memory allocation based on demand.
Helps optimize resource utilization in environments with multiple VMs.
Example: If a VM is using less memory than allocated, the hypervisor can reclaim that memory for other VMs.
Works in conjunction with memory overcommitment, where more memory ...
Promiscuous mode allows a network device to intercept and read all traffic on the network segment.
Promiscuous mode is used primarily in network monitoring and analysis.
In this mode, a network interface card (NIC) captures all packets, regardless of their destination.
It is commonly used in packet sniffing tools like Wireshark.
Example: A network administrator uses promiscuous mode to troubleshoot network issues by analyz...
I applied via Naukri.com and was interviewed in Apr 2024. There were 3 interview rounds.
RAC stands for Real Application Clusters, a feature of Oracle Database that allows multiple instances to access a single database simultaneously.
RAC enables high availability and scalability for Oracle databases.
It allows multiple instances to run on different servers, providing load balancing and failover capabilities.
RAC requires shared storage and a cluster interconnect for communication between instances.
Examples o...
Data Guard is a high availability and disaster recovery solution provided by Oracle for Oracle databases.
Data Guard ensures high availability, data protection, and disaster recovery for Oracle databases.
It involves creating standby databases that are synchronized with the primary database to provide failover capabilities.
Data Guard can be configured in various modes such as Maximum Availability, Maximum Performance, an...
I worked as a Senior Consultant at XYZ Company, where I led a team of consultants to provide strategic solutions to clients.
Led a team of consultants to provide strategic solutions to clients
Developed and implemented customized strategies to meet client needs
Collaborated with cross-functional teams to deliver successful projects
Datafiles are used to store data in a database system.
Datafiles store actual data in a database system
They are used to organize and manage data efficiently
Datafiles can be used to store tables, indexes, and other database objects
They are essential for the functioning of a database system
GoldenGate is a data integration software product used for real-time data integration and replication.
GoldenGate allows for real-time data movement between heterogeneous systems.
It can be used for data replication, data synchronization, and data transformation.
GoldenGate supports various databases such as Oracle, SQL Server, MySQL, etc.
It provides high availability and data consistency during data integration processes...
I applied via Naukri.com and was interviewed before Apr 2020. There were 4 interview rounds.
based on 1 interview experience
Difficulty level
Duration
based on 16 reviews
Rating in categories
Consultant
396
salaries
| ₹8.4 L/yr - ₹14.9 L/yr |
Senior Consultant
281
salaries
| ₹12 L/yr - ₹20.1 L/yr |
Associate Consultant
237
salaries
| ₹3.9 L/yr - ₹9 L/yr |
Security Consultant
128
salaries
| ₹6 L/yr - ₹14 L/yr |
Lead Consultant
92
salaries
| ₹20 L/yr - ₹36 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland