Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Binary Global Team. If you also belong to the team, you can get access from here

Binary Global Verified Tick

Compare button icon Compare button icon Compare
4.2

based on 45 Reviews

Filter interviews by

Binary Global System Engineer Interview Questions, Process, and Tips

Updated 6 Sep 2021

Binary Global System Engineer Interview Experiences

1 interview found

I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.

Interview Questionnaire 

11 Questions

  • Q1. How we can integrate Sophos with AD server.
  • Ans. 

    Sophos can be integrated with AD server using Sophos Central or Sophos Enterprise Console.

    • Install Sophos Central or Sophos Enterprise Console on the AD server.

    • Configure the AD synchronization settings in Sophos.

    • Create a synchronization account in AD with read-only access to user and group information.

    • Configure the synchronization account in Sophos.

    • Verify the synchronization settings and run a synchronization test.

    • Confi...

  • Answered by AI
  • Q2. How can we capture packet in Sophos.
  • Ans. 

    Sophos provides packet capture through its built-in packet sniffer tool.

    • Sophos has a built-in packet sniffer tool called 'Packet Capture' which can be accessed through the web interface.

    • Packet Capture allows users to capture packets on specific interfaces or VLANs.

    • Users can also apply filters to capture specific types of traffic.

    • Captured packets can be downloaded in PCAP format for further analysis.

  • Answered by AI
  • Q3. What is upstream and downstream in WSUS Server.
  • Ans. 

    Upstream refers to the WSUS server that is the source of updates, while downstream refers to the WSUS servers that receive updates from the upstream server.

    • Upstream WSUS server is the source of updates

    • Downstream WSUS servers receive updates from the upstream server

    • Downstream servers can be configured to synchronize with the upstream server at regular intervals

    • Upstream server can be configured to download updates from M

  • Answered by AI
  • Q4. What is logical and physical part of Server.
  • Ans. 

    The logical part of a server refers to the software and how it operates, while the physical part refers to the hardware components.

    • Logical part includes operating system, applications, and services

    • Physical part includes CPU, RAM, hard drives, and network interfaces

    • Logical and physical parts work together to provide functionality and performance

    • Examples of logical and physical parts working together include virtualizati

  • Answered by AI
  • Q5. How does Dns works.
  • Ans. 

    DNS translates domain names into IP addresses to enable communication between devices on the internet.

    • DNS stands for Domain Name System.

    • It works by translating human-readable domain names into IP addresses that computers can understand.

    • DNS servers store information about domain names and their corresponding IP addresses.

    • When a user types a domain name into their browser, the browser sends a request to a DNS server to r...

  • Answered by AI
  • Q6. How does DORA Process works in DHCP.
  • Ans. 

    DORA process is used by DHCP to allocate IP addresses to clients.

    • DORA stands for Discover, Offer, Request, and Acknowledge.

    • Client sends a broadcast Discover message to find available DHCP servers.

    • Server responds with an Offer message containing IP address and lease duration.

    • Client sends a Request message to request the offered IP address.

    • Server sends an Acknowledge message to confirm the allocation of IP address to cli...

  • Answered by AI
  • Q7. What is FSMO rules.
  • Ans. 

    FSMO (Flexible Single Master Operations) roles are specialized domain controller tasks in Active Directory.

    • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

    • Schema Master: responsible for updating the Active Directory schema.

    • Domain Naming Master: responsible for adding or removing domains in a forest.

    • RID Master: responsible for allocating RIDs (Relative Ide...

  • Answered by AI
  • Q8. How can we log genrate for logon logout users.
  • Ans. 

    User logon and logout can be logged by enabling auditing and configuring security policies.

    • Enable auditing in group policy settings

    • Configure security policies to audit logon and logoff events

    • View logs in Event Viewer

    • Use third-party tools for more advanced logging and analysis

  • Answered by AI
  • Q9. What is filter or WMi policy in GPO.
  • Ans. 

    Filter or WMI policy in GPO is used to apply specific settings to a targeted group of computers or users.

    • Filtering allows administrators to apply GPOs to specific groups of users or computers based on criteria such as operating system, group membership, or hardware configuration.

    • WMI filters allow administrators to apply GPOs based on the results of a WMI query, which can provide more granular targeting options.

    • For exam...

  • Answered by AI
  • Q10. What is OU and Group in AD.
  • Ans. 

    OU stands for Organizational Unit and is used to organize objects in Active Directory. Group is a collection of users with common attributes.

    • OU is a container object used to group and organize other objects in AD

    • Group is a collection of users with common attributes such as access permissions or job roles

    • OU can be used to delegate administrative control over a subset of objects in AD

    • Group can be used to simplify the man...

  • Answered by AI
  • Q11. What is authorative and non authorative restore mode.
  • Ans. 

    Authoritative restore mode is used to restore the entire Active Directory while non-authoritative restore mode is used to restore individual objects.

    • Authoritative restore mode restores the entire Active Directory to a specific point in time and marks it as the current version.

    • Non-authoritative restore mode restores individual objects from a backup and allows replication to update the restored object.

    • Authoritative resto...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Clear you concepts and tell about only which device or kind of experience you have in previous or presently. Not talk unnecessary.

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
1
Bad
Difficulty level
-
Process Duration
-
Result
-

I applied via Naukri.com

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Aptitude Test 

This is the round in which basic quant questions were asked

Round 3 - Coding Test 

In this round basic 2 java questions were asked

Round 4 - Group Discussion 

In this round one topic was given and we need to discuss about that topic

Round 5 - Technical 

(2 Questions)

  • Q1. What is java explain in detail
  • Ans. 

    Java is a high-level, object-oriented programming language used to develop applications for various platforms.

    • Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)

    • It is known for its security features, such as the ability to run code in a sandbox environment

    • Java is used for developing a wide range of applications, from web applications to mobile apps and games

    • It is also used...

  • Answered by AI
  • Q2. What is searching and sorting
  • Ans. 

    Searching is finding a specific item in a collection of items. Sorting is arranging items in a specific order.

    • Searching involves looking for a specific item in a collection of items.

    • Sorting involves arranging items in a specific order, such as alphabetical or numerical.

    • Searching and sorting are commonly used in computer science and data analysis.

    • Examples of searching algorithms include linear search and binary search.

    • E...

  • Answered by AI
Round 6 - Technical 

(1 Question)

  • Q1. What is binary tree explain
  • Ans. 

    A binary tree is a data structure consisting of nodes, where each node has at most two children.

    • Nodes in a binary tree have a left and/or right child node.

    • The topmost node is called the root node.

    • Binary trees are used in search algorithms and data compression.

    • Examples of binary trees include binary search trees and heap trees.

  • Answered by AI
Round 7 - HR 

(2 Questions)

  • Q1. What is your current location
  • Q2. What is your salary expectations

Interview Preparation Tips

Topics to prepare for Webdew System Engineer interview:
  • Java
  • API
Interview preparation tips for other job seekers - this interview round was very good , nothing was hectic everything was very quick

Skills evaluated in this interview

Interview experience
1
Bad
Difficulty level
-
Process Duration
-
Result
-

I applied via Naukri.com

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Aptitude Test 

This is the round in which basic quant questions were asked

Round 3 - Coding Test 

In this round basic 2 java questions were asked

Round 4 - Group Discussion 

In this round one topic was given and we need to discuss about that topic

Round 5 - Technical 

(2 Questions)

  • Q1. What is java explain in detail
  • Ans. 

    Java is a high-level, object-oriented programming language used to develop applications for various platforms.

    • Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)

    • It is known for its security features, such as the ability to run code in a sandbox environment

    • Java is used for developing a wide range of applications, from web applications to mobile apps and games

    • It is also used...

  • Answered by AI
  • Q2. What is searching and sorting
  • Ans. 

    Searching is finding a specific item in a collection of items. Sorting is arranging items in a specific order.

    • Searching involves looking for a specific item in a collection of items.

    • Sorting involves arranging items in a specific order, such as alphabetical or numerical.

    • Searching and sorting are commonly used in computer science and data analysis.

    • Examples of searching algorithms include linear search and binary search.

    • E...

  • Answered by AI
Round 6 - Technical 

(1 Question)

  • Q1. What is binary tree explain
  • Ans. 

    A binary tree is a data structure consisting of nodes, where each node has at most two children.

    • Nodes in a binary tree have a left and/or right child node.

    • The topmost node is called the root node.

    • Binary trees are used in search algorithms and data compression.

    • Examples of binary trees include binary search trees and heap trees.

  • Answered by AI
Round 7 - HR 

(2 Questions)

  • Q1. What is your current location
  • Q2. What is your salary expectations

Interview Preparation Tips

Topics to prepare for Webdew System Engineer interview:
  • Java
  • API
Interview preparation tips for other job seekers - this interview round was very good , nothing was hectic everything was very quick

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Oct 2022. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. About linux Networking Vmware
Round 2 - One-on-one 

(1 Question)

  • Q1. Linux Application Network

Interview Preparation Tips

Interview preparation tips for other job seekers - Good company for freshers

Binary Global Interview FAQs

What are the top questions asked in Binary Global System Engineer interview?

Some of the top questions asked at the Binary Global System Engineer interview -

  1. What is authorative and non authorative restore mo...read more
  2. How can we log genrate for logon logout use...read more
  3. How we can integrate Sophos with AD serv...read more

Tell us how to improve this page.

Network Security Engineer
30 salaries
unlock blur

₹3 L/yr - ₹11 L/yr

Network Engineer
22 salaries
unlock blur

₹3 L/yr - ₹6.5 L/yr

System Administrator
14 salaries
unlock blur

₹4 L/yr - ₹8 L/yr

Network Support Engineer
8 salaries
unlock blur

₹2 L/yr - ₹4 L/yr

Desktop Support Engineer
7 salaries
unlock blur

₹2.8 L/yr - ₹3.1 L/yr

Explore more salaries
Compare Binary Global with

Infosys

3.6
Compare

TCS

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview