Java
1. Dependency vs dependency management
2. transitive dependency and vulnerability (Scenario based)
3. Multiple pom file
4. Authentication vs authorization
Spring
1. Spring profiling
2. Caching
3. Component scan (Scenario based)
4. Why called AOP - Advice,Pointcut
5. Spring Vs Spring Boot
6. Actuators, how to secure
7. @Component, @Repository & @Service
8. @Autowired
9. Spring WebFlux
SQL
1. index , partition on one column (Scenario based)
2. index on multiple column solution (Scenario based)
3. unable to get a connection from the db connection pool (Scenario based)
4. Table structure based on relationship
5.
Hibernate
1. transient
2. best practices in hibernate
● Proper Session Management:
● Caching
● DTOs (Data Transfer Objects)
● Entity Relationships:
Cloud
1. Cron Job
2. Chmod
3. Understanding kubernetes
4. Understanding DNS - subdomain
5. JWT vs Oauth2 :- OAuth 2.0 is an authorization framework, enabling third-party
applications to access resources on behalf of a user without sharing their
credentials. JWT, on the other hand, is a token format for securely transmitting
information between parties
Microservices
1. HTTP methods for retrieving from and sending data to a server (GET, POST,
PUT, PATCH, and DELETE)
2. Discovery engine
3. Fall back mechanism
4. Circuit breaker- configuring
5. Proxy server
6. Session in REST API
Apache Beam
1. Cogroup one to many by joining 1 tables
2. Pcollection view on above
3. Pcollection view limitation
4. Filter on pcollection
5. How to debug a bottle neck
6. What are possible reasons for a bottle neck
7. Multiple output for a ptransform
8. Bound vs unbound data
9. Late arrival of data in streamer