Interview Questions and Answers for 'C' | Search Interview Question - javasearch.buggybread.com
Javasearch.buggybread.com

Search Interview Questions


 More than 3000 questions in repository.
 There are more than 900 unanswered questions.
Click here and help us by providing the answer.
 Have a video suggestion.
Click Correct / Improve and please let us know.
Label / Company      Label / Company / Text

   



Interview Questions and Answers - Order By Rating

   next 30
 Q91. How can we create an arraylist of unique values ?Core Java
Ans. We can put the value in a set to enforce uniqueness and then dum those value into an arraylist.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     arraylist  design  collections


 Q92. What is SameSite cookie attribute ?Security
Ans. SameSite cookie attribute is used by browsers to identify how first- and third-party cookies should be handled.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     samesite attribute  cookie


 Q93. Difference between XSS and CSRF ?Security
Ans. SRF attack requires an authenticated session, whereas an XSS attack doesn’t.
XSS doesn’t require any user interaction.CSRF is restricted to the actions the victim can perform.
XSS requires a vulnerability to happen, whereas CSRF relies on tricking the user to click a link or access a page.
CSRF can only send an HTTP request but cannot view the response. XSS can send and receive HTTP requests and responses to extract the required data.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     xss attack  csrf attack  security vulnerabilities  security attack  web security     Asked in 3 Companies


 Q94. Do you think a csrf token should only be generated after authentication ?Security
Ans. No, they should be created before authentication too

https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#login-csrf

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     csrf token  csrf attack


 Q95. What is a csrf token ? What is it used for ?Security
Ans. A CSRF token is a unique, secret, unpredictable value that is generated by the server-side application and transmitted to the client in such a way that it is included in a subsequent HTTP request made by the client. When the later request is made, the server-side application validates that the request includes the expected token and rejects the request if the token is missing or invalid.

CSRF tokens can prevent CSRF attacks by making it impossible for an attacker to construct a fully valid HTTP request suitable for feeding to a victim user. Since the attacker cannot determine or predict the value of a user's CSRF token, they cannot construct a request with all the parameters that are necessary for the application to honor the request.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     csrf token.csrf attack


 Q96. Have you ever heard about csrf attacks ?Security
Ans. Yes, Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     csrf attack  Cross-Site Request Forgery (CSRF)     Asked in 16 Companies


 Q97. Why wait(), notify(), notifyAll() methods are in Object class instead of Thread class?Core Java
Ans. wait() and notify() methods are defined in Object class rather than Thread class.If wait() and notify() were on the Thread instead then each thread would have to know the status of every other thread and there is no way to know thread1 that thread2 was waiting for any resource to access.Hence, notify, wait, notifyAll methods are defined in object class in Java.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q98. Can the value of a static variable be changed ? Core Java
Ans. Yes the value of a static variable can be changed. It's the final keyword that restrict the modification of value not static.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     static variables


 Q99. If you see bad code, would you rewrite it?General
 This question was recently asked at 'McLeod Software'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q100. How you debug and troubleshoot slowness with a REST call?Rest
 This question was recently asked at 'Barclays'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q101. When you build an angular application, what type of file it creates which we can deploy?Angular JS
 This question was recently asked at 'Barclays'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q102. What are the advantages and disadvantages of Lambda Expression ?Core Java
 This question was recently asked at 'Number 8'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     java8  java 8  java lambda expressions     Asked in 1 Companies


 Q103. What is the difference betwen Bean and Pojo ?
Ans. https://www.geeksforgeeks.org/pojo-vs-java-beans/

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q104. What are your goals: personal, business, financialGeneral
 This question was recently asked at 'Cain Realty Group'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q105. How would you design the database schema for an event?Database
Ans. Broad question, but if the company need velocity, think about use a NO SQL instead of regular SQL databases.

Also prefers materialized views instead of joins to fetch data quickly.

Regarding the database design, there are very good design tools for professional database (to develop proper indexes and good database design) one of the best is QuickDBD

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     database design  database schema     Asked in 1 Companies


 Q106. Write a unit test case using java 8.JUnit
Ans. public List convertAllToUpperCase(List words) {
return words.stream().map(String::toUpperCase).collect(Collectors.toList());
}

@Test
public void testAllToUpperCase() {
List expected = Arrays.asList("JAVA8", "STREAMS");
List result = convertAllToUpperCase(Arrays.asList("java8", "streams"));
assertEquals(expected, result);
}

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     java8  java 8     Asked in 1 Companies


 Q107. Write a program to make an array act as a set.Core Java
Ans. public Set convertArrayToList(T array[]) {
Set set = new HashSet<>(Arrays.asList(array));
return set;
}

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     arrays  collections set     Asked in 1 Companies


 Q108. Design Texas Hold Em poker gameDesign
 This question was recently asked at 'Alcatel Lucent'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q109. How can we protect an application from an XSS attack ?Security
Ans. By properly encoding data while persisting as well as retrieval.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     xss attack  web security     Asked in 3 Companies


 Q110. how would you build application stack using Cloud Formation ?
Amazon Web Services (AWS)
Ans. Open the AWS CloudFormation console at https://console.aws.amazon.com/cloudformation . Create a new stack by using one of the following options: Choose Create Stack. This is the only option if you have a currently running stack.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws cloud formation     Asked in 1 Companies


 Q111. How would you secure resources in Cloud ?Cloud Computing
Ans. There are multiple types of security GCP provides to every customer. Data, Network, Compute, and Services. Each service have its own security layer and Google provides clients to build as per the GCP best practices like building VPC, IAM, Firewall rules and so on

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Cloud Platform (GCP)     Asked in 1 Companies


 Q112. Name types of AWS Elastic Load Balancers.Amazon Web Services (AWS)
 This question was recently asked at 'EtQ'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws elb     Asked in 1 Companies


 Q113. What is an AWS placement groupAmazon Web Services (AWS)
Ans. It is a logical grouping of instance with a single availability zone to prevent latency.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws placement group     Asked in 1 Companies


 Q114. Explain AWS IAM.Amazon Web Services (AWS)
Ans. AWS Identity And Access Management (IAM) is a webservice provided by AWS platform that provides access control capabilities (authentication and authorization) to AWS resources.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws iam     Asked in 1 Companies


 Q115. What are some GCP Billing and Budgeting services ?Google Cloud Platform (GCP)
Ans. Budgets and Alerts
Reports
Quotas

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     gcp billing


 Q116. How On demand Self Service helps saving cost ?Cloud Computing
Ans. On Demand service restricts cost by paying only for the use and Self Service saves cost by reducing intermediary human resource cost.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     onDemand infrastructure  Google Cloud Platform (GCP)


 Q117. How Resource Pooling helps saving cost ?Cloud Computing
Ans. With resource pooling and Pay as per use , Bigger companies like Google and Amazon can buy Large physical hardware and employ economy of scale and hence resulting in cost saving for customers.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Cloud Platform (GCP)


 Q118. What is the difference between Billing Alerts and Budget Quotas in GCP ?Google Cloud Platform (GCP)
Ans. Alerts only let customer knows of any excessive usage whereas Quota restricts the usage beyond a certain point.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     GCP Billing


 Q119. What are the different types of Services GCP provides ?Google Cloud Platform (GCP)
Ans. Compute
Network
Storage
Big Data
Machine Learning

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q120. Why would a cloud customer use resources in multiple regions and zones ?Cloud Computing
Ans. 1. Fault Tolerance
2. Better Access by bringing the application closer to the users.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Cloud Computing (GCP)  Amazon Web Services (AWS)  Availability Zones  Regions and Zones  Infrastructure


previous 30   next 30

Help us and Others Improve. Please let us know the questions asked in any of your previous interview.

Any input from you will be highly appreciated and It will unlock the application for 10 more requests.

Company Name:
Questions Asked: