i
Airbase
Filter interviews by
I applied via LinkedIn and was interviewed before Jun 2023. There were 4 interview rounds.
1 hr test with basic aptitude and scenario based questions
Top trending discussions
posted on 9 May 2024
I applied via Referral and was interviewed in Apr 2024. There were 2 interview rounds.
vMotion, FT, and HA are VMware technologies for virtual machine mobility, fault tolerance, and high availability. VPXA is a vCenter Server agent.
vMotion allows live migration of virtual machines between hosts without downtime
FT provides continuous availability for virtual machines by creating a secondary VM that mirrors the primary VM
HA automatically restarts virtual machines on different hosts in case of host failure
V...
Prioritize and delegate tasks, communicate with stakeholders, and work efficiently under pressure.
Prioritize severity-1 tickets based on impact and urgency
Delegate tasks to team members based on expertise and workload
Communicate with stakeholders about the status and resolution of tickets
Work efficiently under pressure to resolve tickets in a timely manner
posted on 5 Apr 2024
To deploy a Virtual Machine, you would need to use a virtualization platform and follow specific steps to create and configure the VM.
Choose a virtualization platform such as VMware, Hyper-V, or VirtualBox.
Create a new virtual machine and specify settings such as CPU, memory, storage, and network.
Install an operating system on the virtual machine.
Configure any additional settings or software needed for the VM to functi...
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is a decentralized system used to translate domain names to IP addresses
It helps users access websites using easy-to-remember domain names instead of complex IP addresses
DNS servers store records like A, CNAME, MX, and TXT to provide various types of information
DNS resolution process involves recursive and iterative queries to find the...
I would start by checking network connectivity, firewall settings, and remote desktop settings.
Check network connectivity to ensure the device is connected to the network
Verify firewall settings to ensure RDP traffic is allowed
Check remote desktop settings on the target device to ensure it is enabled
Verify if the target device is reachable and responding to ping requests
I applied via Naukri.com and was interviewed in May 2022. There were 3 interview rounds.
Quant and verbal
Common topics
I applied via Campus Placement and was interviewed in Dec 2021. There was 1 interview round.
posted on 3 Mar 2024
I was interviewed in Feb 2024.
Normal GD with 8-10 people
Networking is the practice of connecting computers and other devices to share resources and communicate with each other.
Networking involves the use of protocols and technologies like TCP/IP, Ethernet, and Wi-Fi.
IPV4 is a version of the Internet Protocol that uses a 32-bit address scheme.
The network layer is responsible for routing data packets from the source to the destination.
Implementing networking layer concept in ...
posted on 28 Feb 2024
I applied via Naukri.com and was interviewed before Feb 2023. There were 5 interview rounds.
Mobile Device Management (MDM) is a system that allows organizations to manage and secure mobile devices used by employees.
MDM software enables remote management of devices, including configuration, security policies, and app distribution.
It helps ensure data security by enforcing encryption, passcode requirements, and remote wipe capabilities.
MDM solutions can also track device location, monitor usage, and provide ins...
I applied via Campus Placement and was interviewed in Sep 2021. There were 5 interview rounds.
posted on 11 Oct 2023
A hash is a function that converts an input into a fixed-size string of bytes, typically used for data encryption and verification.
Hash functions are used to map data of arbitrary size to fixed-size values.
Hashes are commonly used in data structures like hash tables for quick data retrieval.
Hashes are also used in cryptography for data encryption and verification.
Examples of hash functions include MD5, SHA-1, and SHA-2
Virustotal is an online service that analyzes files and URLs for viruses, worms, trojans, and other types of malware.
Online service for analyzing files and URLs for malware
Uses multiple antivirus engines for scanning
Provides detailed reports on the analysis results
Helps users identify and mitigate potential security threats
based on 1 interview
Interview experience
Software Engineer
7
salaries
| ₹10 L/yr - ₹35 L/yr |
Senior Software Engineer
6
salaries
| ₹30 L/yr - ₹37.5 L/yr |
Senior Software Engineer 2
5
salaries
| ₹38.9 L/yr - ₹75 L/yr |
Software Engineer2
5
salaries
| ₹30 L/yr - ₹38 L/yr |
Software Developer
4
salaries
| ₹21 L/yr - ₹45 L/yr |
Razorpay
Paytm
Mobikwik
Payed