Filter interviews by
A robust network design for a mid-sized company with 500 systems ensures efficiency, security, and scalability.
Segment the network into VLANs for better traffic management and security.
Implement a core, distribution, and access layer architecture for scalability.
Use redundant internet connections to ensure high availability.
Deploy firewalls and intrusion detection systems for enhanced security.
Consider a mix of wi...
Basic network topologies include star, bus, ring, mesh, and hybrid, each with unique structures and use cases.
Star topology: All devices connect to a central hub; easy to manage and troubleshoot.
Bus topology: All devices share a single communication line; cost-effective but can lead to collisions.
Ring topology: Each device connects to two others, forming a circle; data travels in one direction, reducing collisions...
Blocking and unblocking security refers to measures that restrict or allow access to sensitive data.
Blocking security prevents unauthorized access to sensitive information, such as financial records.
Unblocking security allows access to previously restricted data after proper authorization.
Example: A bank may block access to customer account details until identity verification is completed.
Unblocking can occur when...
Security setup involves configuring systems to protect data and resources from unauthorized access and threats.
Establish user roles and permissions to control access to sensitive data.
Implement encryption protocols to secure data in transit and at rest.
Regularly update software and systems to patch vulnerabilities.
Conduct security audits and assessments to identify potential risks.
Utilize firewalls and intrusion d...
Reference data is a type of data that defines the permissible values for other data elements in a system.
Reference data provides context for transactional data, such as country codes or currency types.
It is often used to standardize data across different systems, ensuring consistency.
Examples include lists of product categories, customer segments, or geographical regions.
Reference data can be static (like country ...
I am particularly interested in the fields of artificial intelligence and web development, focusing on innovative solutions and user experience.
Artificial Intelligence: I enjoy exploring machine learning algorithms, such as neural networks, to create intelligent applications.
Web Development: I am passionate about building responsive websites using frameworks like React and Angular.
Data Analysis: I find it fascinat...
OOPS in Java refers to Object-Oriented Programming, which uses objects and classes to structure software design.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., class).
Inheritance: Mechanism where one class can inherit fields and methods from another (e.g., class Dog extends Animal).
Polymorphism: Ability to present the same interface for different underlying forms (e.g., met...
Change management in Windchill PLM involves controlling product changes efficiently throughout the lifecycle.
Change management ensures that all product changes are documented and approved, reducing errors.
Windchill PLM provides tools for tracking change requests, such as Engineering Change Orders (ECOs).
For example, if a design modification is needed, an ECO can be initiated to assess impacts and approvals.
It inte...
I prioritize tasks by assessing urgency, impact, and deadlines, ensuring efficient management of responsibilities.
Assess urgency: Identify tasks that are time-sensitive, like resolving critical database issues.
Evaluate impact: Focus on tasks that significantly affect system performance or user experience, such as optimizing slow queries.
Use a task management tool: Implement tools like Trello or Jira to visualize a...
A deployment.yaml file defines the desired state for deploying applications in Kubernetes, including replicas and container specifications.
apiVersion: apps/v1: Specifies the API version for the deployment.
kind: Deployment: Indicates that this YAML file is for a deployment resource.
metadata: Contains the name and labels for the deployment, e.g., name: my-app.
spec: Defines the desired state, including replicas, sele...
I applied via Approached by Company and was interviewed in Dec 2024. There were 4 interview rounds.
Java, DSA Coding Questions, Array, LL
I appeared for an interview in May 2025, where I was asked the following questions.
Effective team management and cost reduction strategies are essential for project success.
Establish clear communication channels to ensure everyone is aligned on goals and tasks.
Implement agile methodologies to enhance flexibility and responsiveness to changes.
Conduct regular team meetings to assess progress and address any challenges promptly.
Encourage collaboration and knowledge sharing among team members to leverage...
I appeared for an interview in May 2025, where I was asked the following questions.
BADI (Business Add-In) and BAPI (Business Application Programming Interface) are SAP enhancements for custom functionality and integration.
BADI allows developers to add custom code to standard SAP applications without modifying the original code.
Example of BADI: Implementing custom logic in sales order processing.
BAPI is a standardized programming interface that allows external applications to interact with SAP systems...
I appeared for an interview in Feb 2025, where I was asked the following questions.
Kubernetes is a container orchestration platform that automates deployment, scaling, and management of containerized applications.
Master Node: Controls the Kubernetes cluster, managing the API server, scheduler, and controller manager.
Worker Nodes: Run the containerized applications and are managed by the master node.
Pods: The smallest deployable units in Kubernetes, which can contain one or more containers.
Services: A...
Copy and Add in Docker are commands used to manage files in images, with distinct behaviors and use cases.
COPY: Used to copy files/directories from the host to the Docker image.
ADD: Similar to COPY but can also extract tar files and fetch files from URLs.
Example of COPY: COPY ./localfile.txt /app/ in Dockerfile copies a file to the image.
Example of ADD: ADD ./archive.tar.gz /app/ extracts the tar file into the image.
CO...
CMD specifies default commands for a container, while ENTRYPOINT sets the main command to run.
CMD provides default arguments for the ENTRYPOINT command.
ENTRYPOINT is used to define the main command that will always run in the container.
Example of CMD: CMD ["nginx", "-g", "daemon off;"]
Example of ENTRYPOINT: ENTRYPOINT ["/usr/sbin/nginx"]
Using both: ENTRYPOINT ["/usr/sbin/nginx"] CMD ["-g", "daemon off;"]
Git merge combines branches, preserving history; git rebase rewrites history for a linear commit structure.
Merge creates a new commit that combines changes from both branches.
Rebase moves or combines commits from one branch onto another, creating a linear history.
Example of merge: 'git merge feature-branch' creates a merge commit.
Example of rebase: 'git rebase main' applies commits from the feature branch on top of mai...
A Terraform module is a container for multiple resources that are used together, promoting reusability and organization.
Modules can be created for specific tasks, like setting up a web server or a database.
A module can include resources, input variables, output values, and even other modules.
Example: A module for an AWS VPC can include subnets, route tables, and security groups.
Modules can be sourced from local paths, ...
Manual testing is necessary to ensure the quality of the software by simulating real user interactions and scenarios.
Manual testing allows for human intuition and creativity to uncover unexpected issues.
Certain tests, such as usability testing, cannot be automated and require manual execution.
Exploratory testing is best performed manually to discover new defects and areas of improvement.
Manual testing is crucial for va...
Unresolved reference is an error in programming where a variable or function is used without being defined or declared.
Occurs when a variable or function is used before it is declared or defined
Can also happen when a variable or function is misspelled
Common in programming languages like Python, Java, and C++
This question is likely related to a discrepancy between a library and netlist causing a difference in the size of PMOS transistors.
Mismatch between the library and netlist can lead to incorrect sizing of transistors
Ensure consistency between the library files and netlist to avoid discrepancies
Check for any errors or warnings related to library and netlist mismatch in the design tool logs
Verify the sizing of PMOS trans...
Basic apti and easy one can solve it easily
I have worked on various projects including developing software applications, designing systems, and implementing new technologies.
Developed a mobile application for tracking fitness goals
Designed a database system for managing customer information
Implemented a new cloud-based storage solution for data backup
I appeared for an interview in Mar 2025, where I was asked the following questions.
Top trending discussions
Some of the top questions asked at the Capgemini Engineering interview for experienced candidates -
The duration of Capgemini Engineering interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 88 interview experiences
Difficulty level
Duration
based on 2.3k reviews
Rating in categories
4-20 Yrs
Not Disclosed
1-14 Yrs
Not Disclosed
3-14 Yrs
Not Disclosed
Senior Software Engineer
1.8k
salaries
| ₹4.8 L/yr - ₹21.7 L/yr |
Technical Lead
1.3k
salaries
| ₹14.4 L/yr - ₹24 L/yr |
Software Engineer
1.1k
salaries
| ₹4.8 L/yr - ₹11 L/yr |
Senior Consultant
455
salaries
| ₹14 L/yr - ₹24 L/yr |
Consultant
402
salaries
| ₹9.3 L/yr - ₹16.6 L/yr |
Genpact
DXC Technology
Virtusa Consulting Services
CGI Group