i
Binary Global
Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
Sophos can be integrated with AD server using Sophos Central or Sophos Enterprise Console.
Install Sophos Central or Sophos Enterprise Console on the AD server.
Configure the AD synchronization settings in Sophos.
Create a synchronization account in AD with read-only access to user and group information.
Configure the synchronization account in Sophos.
Verify the synchronization settings and run a synchronization test.
Confi...
Sophos provides packet capture through its built-in packet sniffer tool.
Sophos has a built-in packet sniffer tool called 'Packet Capture' which can be accessed through the web interface.
Packet Capture allows users to capture packets on specific interfaces or VLANs.
Users can also apply filters to capture specific types of traffic.
Captured packets can be downloaded in PCAP format for further analysis.
Upstream refers to the WSUS server that is the source of updates, while downstream refers to the WSUS servers that receive updates from the upstream server.
Upstream WSUS server is the source of updates
Downstream WSUS servers receive updates from the upstream server
Downstream servers can be configured to synchronize with the upstream server at regular intervals
Upstream server can be configured to download updates from M
The logical part of a server refers to the software and how it operates, while the physical part refers to the hardware components.
Logical part includes operating system, applications, and services
Physical part includes CPU, RAM, hard drives, and network interfaces
Logical and physical parts work together to provide functionality and performance
Examples of logical and physical parts working together include virtualizati
DNS translates domain names into IP addresses to enable communication between devices on the internet.
DNS stands for Domain Name System.
It works by translating human-readable domain names into IP addresses that computers can understand.
DNS servers store information about domain names and their corresponding IP addresses.
When a user types a domain name into their browser, the browser sends a request to a DNS server to r...
DORA process is used by DHCP to allocate IP addresses to clients.
DORA stands for Discover, Offer, Request, and Acknowledge.
Client sends a broadcast Discover message to find available DHCP servers.
Server responds with an Offer message containing IP address and lease duration.
Client sends a Request message to request the offered IP address.
Server sends an Acknowledge message to confirm the allocation of IP address to cli...
FSMO (Flexible Single Master Operations) roles are specialized domain controller tasks in Active Directory.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master: responsible for updating the Active Directory schema.
Domain Naming Master: responsible for adding or removing domains in a forest.
RID Master: responsible for allocating RIDs (Relative Ide...
User logon and logout can be logged by enabling auditing and configuring security policies.
Enable auditing in group policy settings
Configure security policies to audit logon and logoff events
View logs in Event Viewer
Use third-party tools for more advanced logging and analysis
Filter or WMI policy in GPO is used to apply specific settings to a targeted group of computers or users.
Filtering allows administrators to apply GPOs to specific groups of users or computers based on criteria such as operating system, group membership, or hardware configuration.
WMI filters allow administrators to apply GPOs based on the results of a WMI query, which can provide more granular targeting options.
For exam...
OU stands for Organizational Unit and is used to organize objects in Active Directory. Group is a collection of users with common attributes.
OU is a container object used to group and organize other objects in AD
Group is a collection of users with common attributes such as access permissions or job roles
OU can be used to delegate administrative control over a subset of objects in AD
Group can be used to simplify the man...
Authoritative restore mode is used to restore the entire Active Directory while non-authoritative restore mode is used to restore individual objects.
Authoritative restore mode restores the entire Active Directory to a specific point in time and marks it as the current version.
Non-authoritative restore mode restores individual objects from a backup and allows replication to update the restored object.
Authoritative resto...
Top trending discussions
I applied via Company Website and was interviewed in Oct 2020. There were 3 interview rounds.
Recursion is a process in which a function calls itself. Inheritance is a mechanism in OOP where a class inherits properties of another class. Heap is a region of memory used for dynamic memory allocation.
Recursion can be used to solve problems that can be broken down into smaller sub-problems.
Inheritance allows for code reuse and helps in creating a hierarchy of classes.
Heap is used for dynamic memory allocation in la...
There are three types of machine learning: supervised, unsupervised, and reinforcement learning.
Supervised learning involves labeled data and predicting outcomes based on that data.
Unsupervised learning involves finding patterns in unlabeled data.
Reinforcement learning involves an agent learning to make decisions based on rewards and punishments.
Examples of supervised learning include image classification and spam filt...
OOPs stands for Object-Oriented Programming. It is a programming paradigm that uses objects to design applications.
OOPs is based on the concept of classes and objects
It focuses on encapsulation, inheritance, and polymorphism
It helps in creating modular, reusable, and maintainable code
Examples of OOPs languages are Java, C++, Python, etc.
SDLC stands for Software Development Life Cycle, a process used to design, develop, and maintain software.
SDLC is a structured approach to software development
It involves several phases such as planning, analysis, design, implementation, testing, and maintenance
Each phase has its own set of activities and deliverables
SDLC helps ensure that software is developed efficiently, on time, and within budget
Examples of SDLC mo
I applied via Company Website and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Company Website and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2021. There were 4 interview rounds.
I applied via Job Fair and was interviewed before May 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jan 2021. There were 3 interview rounds.
Swap two numbers with and without temporary variable
Without temporary variable: Use addition and subtraction
With temporary variable: Use a third variable to store the value of one of the numbers
Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;
Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;
I applied via Naukri.com and was interviewed before May 2021. There were 3 interview rounds.
I will follow a structured approach for writing programs.
I will first analyze the problem and gather requirements.
Then, I will design a solution and create a plan.
Next, I will write the code and test it thoroughly.
Finally, I will deploy the program and maintain it.
I will also document the code and follow coding standards.
Network Security Engineer
30
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Engineer
22
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator
15
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Support Engineer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Desktop Support Engineer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech