Filter interviews by
I applied via Naukri.com and was interviewed before Mar 2023. There were 2 interview rounds.
Stakeholder analysis involves identifying, prioritizing, and understanding the needs and expectations of stakeholders.
Identify all stakeholders involved in the project or organization
Prioritize stakeholders based on their influence and interest in the project
Understand the needs, expectations, and concerns of each stakeholder
Engage with stakeholders through communication and feedback mechanisms
Use tools such as stakeho...
Yes, Agile methodology is a popular approach in software development for iterative and incremental project management.
Agile methodology emphasizes collaboration, flexibility, customer feedback, and continuous improvement.
It involves breaking down projects into small increments called sprints, with each sprint delivering a working product.
Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
Agile ...
I handle scope creep by setting clear project boundaries, regularly communicating with stakeholders, and prioritizing tasks based on impact.
Set clear project boundaries and scope at the beginning of the project.
Regularly communicate with stakeholders to ensure everyone is aligned on project goals and priorities.
Prioritize tasks based on impact and adjust scope as needed to stay on track.
Document any changes to scope an...
Top trending discussions
I applied via Naukri.com and was interviewed before Nov 2022. There were 4 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There was 1 interview round.
Pricing condition is a rule or criteria used to determine the price of a product or service.
Pricing conditions can include factors such as quantity discounts, promotional offers, and contract terms.
They are typically set in pricing tables within a company's ERP system.
Pricing conditions are used to calculate the final price that a customer will pay for a product or service.
Examples of pricing conditions include discoun...
The structure of an Order typically includes customer information, product details, quantity, price, and payment information.
Customer information (name, address, contact details)
Product details (name, description, SKU)
Quantity of each product ordered
Price of each product
Payment information (payment method, total amount)
Order status (pending, shipped, delivered)
Plants in a sales order are determined based on the customer's requirements, availability, pricing, and shipping logistics.
Plants are determined based on the customer's location and delivery preferences.
Availability of the product at different plant locations is considered.
Pricing and discounts may vary based on the plant from which the product is shipped.
Shipping logistics such as distance, transportation costs, and d...
I applied via Naukri.com and was interviewed in Apr 2024. There were 3 interview rounds.
RAC stands for Real Application Clusters, a feature of Oracle Database that allows multiple instances to access a single database simultaneously.
RAC enables high availability and scalability for Oracle databases.
It allows multiple instances to run on different servers, providing load balancing and failover capabilities.
RAC requires shared storage and a cluster interconnect for communication between instances.
Examples o...
Data Guard is a high availability and disaster recovery solution provided by Oracle for Oracle databases.
Data Guard ensures high availability, data protection, and disaster recovery for Oracle databases.
It involves creating standby databases that are synchronized with the primary database to provide failover capabilities.
Data Guard can be configured in various modes such as Maximum Availability, Maximum Performance, an...
I worked as a Senior Consultant at XYZ Company, where I led a team of consultants to provide strategic solutions to clients.
Led a team of consultants to provide strategic solutions to clients
Developed and implemented customized strategies to meet client needs
Collaborated with cross-functional teams to deliver successful projects
Datafiles are used to store data in a database system.
Datafiles store actual data in a database system
They are used to organize and manage data efficiently
Datafiles can be used to store tables, indexes, and other database objects
They are essential for the functioning of a database system
GoldenGate is a data integration software product used for real-time data integration and replication.
GoldenGate allows for real-time data movement between heterogeneous systems.
It can be used for data replication, data synchronization, and data transformation.
GoldenGate supports various databases such as Oracle, SQL Server, MySQL, etc.
It provides high availability and data consistency during data integration processes...
Memory ballooning is a technique used in virtualization to reclaim unused memory from virtual machines.
Allows hypervisors to dynamically adjust memory allocation based on demand.
Helps optimize resource utilization in environments with multiple VMs.
Example: If a VM is using less memory than allocated, the hypervisor can reclaim that memory for other VMs.
Works in conjunction with memory overcommitment, where more memory ...
Promiscuous mode allows a network device to intercept and read all traffic on the network segment.
Promiscuous mode is used primarily in network monitoring and analysis.
In this mode, a network interface card (NIC) captures all packets, regardless of their destination.
It is commonly used in packet sniffing tools like Wireshark.
Example: A network administrator uses promiscuous mode to troubleshoot network issues by analyz...
I applied via Referral and was interviewed in Oct 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jun 2023. There were 2 interview rounds.
posted on 21 Mar 2025
I appeared for an interview before Mar 2024, where I was asked the following questions.
HA ensures VM availability, DRS balances loads, vMotion enables live migration, Host Profiles standardize settings, and snapshots capture states.
HA (High Availability) automatically restarts VMs on other hosts in case of a host failure.
DRS (Distributed Resource Scheduler) optimizes resource allocation by balancing workloads across hosts.
vMotion allows live migration of VMs from one host to another without downtime, ens...
VNet is a virtual network in Azure that enables secure communication between resources. It supports VMs, availability zones, and scaling.
VNet (Virtual Network) allows Azure resources to communicate securely.
To create a VM, prerequisites include an Azure subscription, resource group, and VNet.
Availability Zones are physically separate locations within a region for high availability.
Availability Sets ensure VMs are distr...
A file share allows multiple users to access and manage files over a network, enhancing collaboration and data accessibility.
File shares can be set up on local networks or cloud services, e.g., Google Drive, Dropbox.
They enable simultaneous access to files by multiple users, improving teamwork.
Permissions can be set to control who can view or edit files, ensuring data security.
Commonly used in businesses for document m...
Blob storage is a cloud storage solution for unstructured data, allowing scalable and cost-effective data management.
Stores large amounts of unstructured data like images, videos, and documents.
Examples include Azure Blob Storage and Amazon S3.
Supports various access tiers for cost optimization based on usage.
Enables data redundancy and backup options for enhanced durability.
Facilitates easy integration with applicatio...
Azure VPN enables secure connections between Azure and on-premises networks, offering various types for different needs.
Types of Azure VPN include Site-to-Site, Point-to-Site, and VNet-to-VNet.
Site-to-Site VPN connects entire networks, e.g., an on-premises network to Azure.
Point-to-Site VPN allows individual devices to connect to Azure, useful for remote workers.
VNet-to-VNet VPN connects multiple Azure virtual networks...
A site-to-site VPN connects two or more networks securely over the internet, enabling remote access and data sharing.
Establishes a secure tunnel between two networks, often used by businesses.
Utilizes protocols like IPsec or OpenVPN for encryption.
Example: A corporate office connecting securely to a branch office.
Allows remote users to access resources as if they were on the local network.
Enhances security by encryptin...
ExpressRoute is a service that provides a private connection between on-premises networks and Microsoft Azure data centers.
ExpressRoute offers a dedicated, private connection, enhancing security and reliability compared to public internet connections.
It supports various bandwidth options, ranging from 50 Mbps to 10 Gbps, allowing businesses to choose based on their needs.
ExpressRoute can be used for hybrid cloud scenar...
Taking an OS snapshot in Azure involves creating a backup of a virtual machine's operating system disk.
Use Azure Portal: Navigate to the VM, select 'Disks', and create a snapshot of the OS disk.
Azure CLI: Use the command 'az snapshot create --resource-group <ResourceGroupName> --source <OSDiskID> --name <SnapshotName>'.
PowerShell: Execute 'New-AzSnapshot -ResourceGroupName <ResourceGroupName> -S...
Swapping an OS disk involves replacing the current operating system disk with a new one, ensuring data integrity and system functionality.
1. Backup existing data: Always create a backup of your current OS disk to prevent data loss.
2. Prepare the new disk: Ensure the new OS disk is properly formatted and has the necessary operating system installed.
3. Shut down the system: Power off the machine before physically swappin...
Azure VM backup can be performed using Azure Backup service for efficient data protection and recovery.
Use Azure Backup service to create a Recovery Services vault.
Configure backup policies to define backup frequency and retention.
Select the virtual machine you want to back up and associate it with the vault.
Initiate a backup job manually or schedule it based on your policy.
Monitor backup jobs and restore points throug...
Azure offers various backup types to ensure data protection and recovery, including file, VM, and application backups.
Azure Backup: A service for backing up Azure VMs, on-premises servers, and applications.
File Share Backup: Protects files stored in Azure File Shares.
VM Backup: Automated backup of Azure Virtual Machines with point-in-time restore.
Application Backup: Supports backups for Azure SQL Database and Azure Blo...
Disaster recovery is a strategy to restore IT systems and operations after a disruptive event.
Involves planning for data backup and restoration.
Includes strategies for hardware and software recovery.
Examples: Natural disasters, cyberattacks, power failures.
Testing recovery plans regularly to ensure effectiveness.
Utilizing cloud services for off-site data storage.
RTO (Recovery Time Objective) is the time to restore systems; RPO (Recovery Point Objective) is the data loss tolerance.
RTO defines the maximum acceptable downtime after a disaster.
Example: If RTO is 4 hours, systems must be operational within that time frame.
RPO indicates the maximum acceptable amount of data loss measured in time.
Example: An RPO of 1 hour means data should be backed up at least every hour.
Both metric...
The challenges during implementation include resistance to change, lack of resources, and communication issues.
Resistance to change from employees or stakeholders
Lack of resources such as time, budget, or personnel
Communication issues between team members or with clients
Technical difficulties or unforeseen obstacles
Ensuring the project stays within scope and meets deadlines
based on 1 interview experience
Difficulty level
Duration
Senior Consultant
223
salaries
| ₹7 L/yr - ₹23.5 L/yr |
Consultant
217
salaries
| ₹4.7 L/yr - ₹19.3 L/yr |
Softwaretest Engineer
171
salaries
| ₹3.5 L/yr - ₹6 L/yr |
Lead Consultant
156
salaries
| ₹9.8 L/yr - ₹23.4 L/yr |
Associate Consultant
155
salaries
| ₹2.8 L/yr - ₹8.3 L/yr |
ITC Infotech
3i Infotech
Sify Technologies
Microland