i
Zensar
Technologies
Filter interviews by
Spring Security manages authentication and authorization in Java applications, ensuring secure access to resources.
1. Authentication: Validates user credentials (e.g., username and password) using a login form.
2. Authorization: Determines user access levels based on roles (e.g., ADMIN, USER) defined in the application.
3. Security Filters: Intercepts requests and applies security checks before reaching controllers ...
Using .NET Core and Microservices allows for scalable, modular, and efficient development of applications.
Increased scalability by breaking down applications into smaller, independent services
Modular architecture allows for easier maintenance and updates
Efficient resource utilization by only deploying necessary services
Support for cross-platform development with .NET Core
Yes, Du is a built-in activity in UiPath used for deleting a file or folder.
Du activity is used to delete a file or folder in UiPath.
It requires specifying the path of the file or folder to be deleted.
Make sure to handle exceptions when using Du activity.
Example: Du activity can be used to delete temporary files after processing data.
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in r...
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Use SUMX function in DAX to calculate total sales of a product
Use SUMX function to iterate over each row in the sales table
Filter the table to include only the specific product
Sum up the sales amount for each row to get the total sales
Use SQL query with ORDER BY and LIMIT to find the 4th highest salary
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 3,1 to skip the first 3 highest salaries and get the 4th highest salary
Relationship cardinality defines the number of instances of one entity that can be associated with the number of instances of another entity.
One-to-One: Each record in the first entity is associated with only one record in the second entity.
One-to-Many: Each record in the first entity can be associated with multiple records in the second entity.
Many-to-Many: Multiple records in the first entity can be associated w...
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
Power Automate best practices involve proper planning, testing, and documentation.
Plan your flows before creating them to ensure they meet your requirements.
Test your flows thoroughly to identify and fix any issues before deployment.
Document your flows, including their purpose, inputs, outputs, and any dependencies.
Use naming conventions and comments to make your flows easier to understand and maintain.
Consider securit...
Different types of APIs include REST, SOAP, GraphQL, and gRPC.
REST API: Uses HTTP methods like GET, POST, PUT, DELETE for communication.
SOAP API: Uses XML for message format and WSDL for service description.
GraphQL API: Allows clients to request only the data they need.
gRPC API: Uses Protocol Buffers for serialization and supports bidirectional streaming.
Power Automate allows for multiple data sources to be used in a single flow.
Power Automate supports connecting to various data sources such as SharePoint, Excel, SQL Server, and more.
You can use multiple data sources in a single flow by adding multiple actions to connect to different sources.
For example, you can retrieve data from a SharePoint list and then update a SQL Server database in the same flow.
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
2nd round was about again Android but more focused on security features of android
3rd round was live coding . I was asked to make an app from scratch in 1 hour without even using google.
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
Spring Boot simplifies the development of Java applications by providing a set of tools and conventions.
Spring Boot eliminates the need for manual configuration by providing defaults and auto-configuration.
It includes embedded servers like Tomcat, Jetty, or Undertow for easy deployment.
Spring Boot starters help in quickly setting up dependencies and configurations.
Annotations like @SpringBootApplication and @RestContro...
Annotation used to mark a class as a Spring Boot application
Main annotation in Spring Boot to indicate the starting point of the application
Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations
Used to enable the auto-configuration feature in Spring Boot
Reduces the need for XML configuration in Spring applications
Success is achieving personal goals, feeling fulfilled, and making a positive impact on others.
Success is subjective and can vary from person to person.
It is not just about achieving wealth or fame, but also about personal growth and happiness.
Success can be measured by the impact one has on others and the legacy they leave behind.
Examples of success include reaching career milestones, maintaining healthy relationships...
My strengths include strong problem-solving skills and attention to detail. My weakness is sometimes being too critical of my own work.
Strength: Strong problem-solving skills - I enjoy tackling complex problems and finding efficient solutions.
Strength: Attention to detail - I take pride in producing high-quality work and ensuring accuracy.
Weakness: Being too critical of my own work - I strive for perfection and sometim...
I come from a close-knit family with a strong emphasis on education and hard work.
Family is supportive and values education
Parents are both professionals
Have a sibling who is also in the tech industry
Volatile variables are used to indicate that a variable's value can be changed unexpectedly, while atomic variables ensure that operations on the variable are executed as a single, indivisible unit.
Volatile variables are used when a variable's value can be changed by multiple threads or external factors, and the compiler should not optimize access to that variable.
Atomic variables ensure that operations on the variable...
Caching can be implemented by storing frequently accessed data in a temporary storage area to improve performance.
Use caching libraries like Redis or Memcached to store data in memory for quick access
Implement caching at different levels such as application-level caching, database query caching, and HTTP caching
Set expiration times for cached data to ensure freshness and prevent stale data
Use caching strategies like la...
I applied via Campus Placement and was interviewed in Dec 2024. There were 2 interview rounds.
The coding test consisted of easy to medium difficulty questions: 1. Find the Kth largest element. 2. Print an array based on the sequence specified in a different array. Additionally, there was a classical stack problem involving valid parentheses.
I applied via Naukri.com and was interviewed in Aug 2024. There were 2 interview rounds.
MCQ'S on Core Java, Java8, SQL, Microservices and Coding question in Java.
Use Java streams to filter prime numbers from a list, find highest employee salary, and demonstrate basic SQL joins.
Use Java streams to filter prime numbers from the list
Use streams to find the highest salary of employees
Demonstrate basic SQL queries for joins
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
Authorization determines what a user can access, while authentication verifies the user's identity.
Authorization controls access to resources based on user permissions
Authentication verifies the user's identity through credentials like passwords or biometrics
Authorization comes after authentication in the access control process
Example: After logging into a system (authentication), a user is authorized to view certain f...
SSO stands for Single Sign-On, a method of access control that allows a user to log in with a single ID and password to access multiple applications.
SSO eliminates the need for users to remember multiple passwords for different applications.
It improves user experience by reducing the number of times a user has to log in.
SSO can be implemented using technologies like SAML, OAuth, or OpenID Connect.
Example: A user logs i...
I applied via Job Fair and was interviewed in Oct 2024. There was 1 interview round.
Implement a microservice to handle record insertion using RESTful API principles.
Choose a programming language (e.g., Node.js, Python, Java) for the microservice.
Use a framework (e.g., Express for Node.js, Flask for Python) to simplify API creation.
Define a RESTful endpoint (e.g., POST /records) for inserting records.
Implement data validation to ensure the integrity of incoming data.
Connect to a database (e.g., MongoDB...
Top trending discussions
The duration of Zensar Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 200 interview experiences
Difficulty level
Duration
based on 2.7k reviews
Rating in categories
8-10 Yrs
Not Disclosed
Senior Software Engineer
3.9k
salaries
| ₹7 L/yr - ₹26.7 L/yr |
Software Engineer
3.8k
salaries
| ₹2 L/yr - ₹10.4 L/yr |
Technical Specialist
1.5k
salaries
| ₹10 L/yr - ₹35 L/yr |
Softwaretest Engineer
823
salaries
| ₹2.4 L/yr - ₹9.4 L/yr |
Senior Technical Specialist
818
salaries
| ₹11.3 L/yr - ₹43 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
Virtusa Consulting Services