Filter interviews by
Java is a high-level, object-oriented programming language designed for portability, performance, and ease of use.
Platform-independent: Write once, run anywhere (WORA) - Java code can run on any device with a Java Virtual Machine (JVM).
Object-oriented: Supports concepts like inheritance, encapsulation, and polymorphism, making code reusable and modular.
Rich API: Provides a vast set of libraries and frameworks, suc...
OOP in Java is a programming paradigm based on objects, emphasizing encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data within one unit (class). Example: A class 'Car' with attributes like 'speed' and methods like 'accelerate()'.
Inheritance: Mechanism where one class inherits properties and behavior from another. Example: 'Sedan' class inherit...
Polymorphism allows methods to do different things based on the object that it is acting upon, enhancing flexibility in code.
Polymorphism is a core concept in OOP, enabling objects to be treated as instances of their parent class.
There are two types: compile-time (method overloading) and runtime (method overriding).
Example of method overloading: multiple methods with the same name but different parameters.
Example ...
Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.
Hash functions take an input (or 'message') and return a fixed-size string of bytes.
Common hashing algorithms include MD5, SHA-1, and SHA-256.
Hashing is used in password storage to securely store user credentials.
A hash is deterministic; the same input will always produce the same outpu...
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
Postman is a popular API development tool used for testing and managing APIs efficiently.
Postman allows users to send requests to APIs and view responses.
It supports various request types like GET, POST, PUT, DELETE.
Users can organize requests into collections for better management.
Postman provides features for automated testing and monitoring of APIs.
It has a user-friendly interface that simplifies API interactio...
ZAP refers to a tool for finding vulnerabilities in web applications through automated testing.
ZAP stands for Zed Attack Proxy, developed by OWASP.
It is an open-source web application security scanner.
ZAP helps identify security vulnerabilities like SQL injection and XSS.
It provides automated scanners as well as various tools for manual testing.
ZAP can be integrated into CI/CD pipelines for continuous security tes...
SAST analyzes source code for vulnerabilities, while DAST tests running applications for security flaws.
SAST (Static Application Security Testing) examines source code or binaries without executing the program.
DAST (Dynamic Application Security Testing) tests the application in its running state, simulating attacks.
SAST can identify vulnerabilities early in the development process, such as SQL injection in code.
DA...
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves safeguarding information systems from cyber threats like malware and phishing.
Includes measures such as firewalls, encryption, and intrusion detection systems.
Examples of cyber threats: ransomware attacks, data breaches, and denial-of-service attacks.
Focuses on both hardware and software se...
Encoding is the process of converting data into a specific format for efficient transmission or storage.
Encoding transforms data into a different format, such as converting text to binary.
Common encoding schemes include Base64, URL encoding, and ASCII.
Base64 is often used to encode binary data for transmission over text-based protocols.
URL encoding replaces unsafe ASCII characters with a '%' followed by two hexade...
I appeared for an interview in Aug 2017.
The Sarbanes-Oxley Act (SOX) is a US federal law enacted in 2002 to protect investors by improving the accuracy and reliability of corporate disclosures.
SOX was introduced in response to accounting scandals such as Enron and WorldCom.
It requires public companies to establish and maintain internal controls to ensure accurate financial reporting.
SOX mandates independent audits of financial statements by external auditors...
Encoding is the process of converting data into a specific format for efficient transmission or storage.
Encoding transforms data into a different format, such as converting text to binary.
Common encoding schemes include Base64, URL encoding, and ASCII.
Base64 is often used to encode binary data for transmission over text-based protocols.
URL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal...
SAST analyzes source code for vulnerabilities, while DAST tests running applications for security flaws.
SAST (Static Application Security Testing) examines source code or binaries without executing the program.
DAST (Dynamic Application Security Testing) tests the application in its running state, simulating attacks.
SAST can identify vulnerabilities early in the development process, such as SQL injection in code.
DAST is...
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
ZAP refers to a tool for finding vulnerabilities in web applications through automated testing.
ZAP stands for Zed Attack Proxy, developed by OWASP.
It is an open-source web application security scanner.
ZAP helps identify security vulnerabilities like SQL injection and XSS.
It provides automated scanners as well as various tools for manual testing.
ZAP can be integrated into CI/CD pipelines for continuous security testing.
CIA principles ensure data security through Confidentiality, Integrity, and Availability.
Confidentiality: Protecting sensitive information from unauthorized access (e.g., encryption).
Integrity: Ensuring data accuracy and consistency (e.g., checksums to verify data integrity).
Availability: Ensuring that information is accessible when needed (e.g., redundant systems to prevent downtime).
CIR ratio stands for Cash Interest Coverage ratio, which measures a company's ability to pay interest expenses with its operating cash flow.
CIR ratio is calculated by dividing operating cash flow by total interest expenses.
A higher CIR ratio indicates that a company is more capable of covering its interest expenses with its cash flow.
A lower CIR ratio may indicate financial distress or an inability to generate enough c...
RoTE is a financial metric used to evaluate the profitability of a company's tangible equity.
RoTE is calculated by dividing net income by average tangible equity.
It measures how efficiently a company is using its tangible assets to generate profit.
Planning and budgeting involve setting financial goals, allocating resources, and monitoring performance to achieve desired RoTE.
For example, a company may set a target RoTE ...
A Banking Profit and Loss (P&L) statement is a financial document that shows the revenues, expenses, and profits of a bank over a specific period of time.
It includes details of interest income, fees and commissions, operating expenses, provisions for loan losses, and net income.
The statement helps in analyzing the financial performance and profitability of the bank.
It is an essential tool for stakeholders, investor...
I appeared for an interview in Apr 2025, where I was asked the following questions.
I applied via Referral and was interviewed in May 2024. There were 2 interview rounds.
I appeared for an interview in Mar 2024.
Maths and general knowledge
Environmental studies
I applied via Job Portal and was interviewed in Sep 2023. There was 1 interview round.
I applied via Referral and was interviewed before Aug 2023. There were 2 interview rounds.
Regression is a statistical method to predict continuous outcomes, while classification is used to predict categorical outcomes.
Regression is used when the target variable is continuous, such as predicting house prices based on features like size and location.
Classification is used when the target variable is categorical, like predicting whether an email is spam or not based on its content.
Regression models include lin...
Hyper parameters are settings that are set before the learning process begins and affect the learning process itself.
Hyper parameters are not learned during the training process, but are set before training begins.
They control the learning process and impact the performance of the model.
Examples include learning rate, number of hidden layers, and batch size in neural networks.
Improving model efficiency involves feature selection, hyperparameter tuning, and ensemble methods.
Perform feature selection to reduce dimensionality and focus on relevant features
Optimize hyperparameters using techniques like grid search or random search
Utilize ensemble methods like bagging or boosting to improve model performance
Consider using more advanced algorithms like deep learning for complex data patterns
Top trending discussions
Some of the top questions asked at the Barclays Shared Services interview -
The duration of Barclays Shared Services interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 21 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Process Advisor
676
salaries
| ₹1.9 L/yr - ₹6 L/yr |
Assistant Manager
431
salaries
| ₹10.5 L/yr - ₹19 L/yr |
Assistant Vice President
425
salaries
| ₹21 L/yr - ₹38 L/yr |
Senior Analyst
221
salaries
| ₹4.4 L/yr - ₹10 L/yr |
Process Associate
180
salaries
| ₹1.8 L/yr - ₹6 L/yr |
DXC Technology
Optum Global Solutions
Virtusa Consulting Services
CGI Group