General Questions
SDLC (Software Development Life Cycle) — the life cycle of software.
Key stages: Planning, Analysis, Design, Implementation, Testing, Support.
Authentication
— it is the process of confirming the identity of the user.
It answers the question: "Is the user who they claim to be?"
Authorization
— it is the process of granting or denying access based on the user's rights and privileges.
It answers the question: "What is the user allowed to do?"
Teamwork
Test Design Techniques
Equivalence Partitioning, Boundary Value Analysis, Pairwise Testing, Decision Table.
Tell the interviewer more about the techniques you have actually used.Types of Testing
Retest: Checks that a fixed defect has indeed been eliminated.
Testing Levels
Here, it is appropriate to mention the Testing Pyramid.
| Testing Level | Speed | Number of Tests |
|---|---|---|
| Unit Testing | High | Large |
| Integration Testing | Medium | Medium |
| System Testing | Low | Minimal |
Test Documentation
Severity: Evaluates the technical impact of a bug on the system's functionality.
Priority: Evaluates the urgency and importance of fixing the bug from a business perspective.
A typo in the company name on the homepage.
HTTP Protocol
Must know:
GET, POST, PUT, DELETE, PATCH.
Optional:
HEAD, OPTIONS, CONNECT, TRACE.
| Code | Description |
|---|---|
| 100-199 | Informational |
| 200-299 | Successful |
| 300-399 | Redirection |
| 400-499 | Client Error |
| 500-599 | Server Error |
Yes. There is no protocol-level restriction, and it depends solely on how the developer implements the endpoint.
A person cannot know everything, and the interviewer might be mistaken. Justify your answer if you're confident it is correct.Idempotent methods are those where calling them repeatedly with the same data set will yield the same result, with no side effects on the server.
Non-idempotent methods affect the server’s state, such as changing data in a database.
| Idempotency | Methods |
|---|---|
| Idempotent | GET, HEAD, PUT, DELETE, OPTIONS, TRACE |
| Non-idempotent | POST, PATCH |
HTTP (HyperText Transfer Protocol): Data is transmitted in plaintext, without encryption. Anyone who intercepts the traffic between the browser and the server can potentially read the transmitted information.
HTTPS (HyperText Transfer Protocol Secure): Data is encrypted using SSL/TLS (Secure Sockets Layer / Transport Layer Security). Requires an SSL/TLS certificate to verify the authenticity of the resource.
Data Formats
{
"name": "Котофей",
"age": 5
}
Don’t hesitate to ask if you're unsure whether you’ve described it correctly in
JSON. Ask the interviewer if you can use an online validator for checking (search for json validator). The validator will show you where the structure was violated.
In the XSD schema (XML Schema Definition) — a file with the .xsd format. The XSD schema defines the elements and attributes that can be used in an XML document, data types, and restrictions.
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
<xs:element name="cat">
<xs:complexType>
<xs:sequence>
<xs:element name="name" type="xs:string"/>
<xs:element name="age" type="xs:int"/>
</xs:sequence>
</xs:complexType>
</xs:element>
</xs:schema>
Don't be afraid to say you haven’t worked with XML/XSD — most modern projects use JSON. Just be ready to answer that XML is simply another data format.
DevTools
- Open DevTools
- Go to the Application tab Application
- In the left panel, select Cookies
- Click on the site’s URL
- A table will appear with the names, values, and other attributes of the cookies
- Open DevTools
- Go to the tab Network
- Send a request from the front end
- Select the desired request from the list
- Go to the tab Payload
- Open DevTools
- Go to the tab Network
- Send a request from the front end
- Select the desired request from the list
- Go to the tab Response
Architecture
Monolithic — all components of the system are combined into a single application.
Microservices — a set of independent applications, each performing a specific function, together making up the system.
| Architecture | Pros | Cons |
|---|---|---|
| Monolithic |
|
|
| Microservices |
|
|