i
Binary Global
Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
Sophos can be integrated with AD server using Sophos Central or Sophos Enterprise Console.
Install Sophos Central or Sophos Enterprise Console on the AD server.
Configure the AD synchronization settings in Sophos.
Create a synchronization account in AD with read-only access to user and group information.
Configure the synchronization account in Sophos.
Verify the synchronization settings and run a synchronization test.
Confi...
Sophos provides packet capture through its built-in packet sniffer tool.
Sophos has a built-in packet sniffer tool called 'Packet Capture' which can be accessed through the web interface.
Packet Capture allows users to capture packets on specific interfaces or VLANs.
Users can also apply filters to capture specific types of traffic.
Captured packets can be downloaded in PCAP format for further analysis.
Upstream refers to the WSUS server that is the source of updates, while downstream refers to the WSUS servers that receive updates from the upstream server.
Upstream WSUS server is the source of updates
Downstream WSUS servers receive updates from the upstream server
Downstream servers can be configured to synchronize with the upstream server at regular intervals
Upstream server can be configured to download updates from M
The logical part of a server refers to the software and how it operates, while the physical part refers to the hardware components.
Logical part includes operating system, applications, and services
Physical part includes CPU, RAM, hard drives, and network interfaces
Logical and physical parts work together to provide functionality and performance
Examples of logical and physical parts working together include virtualizati
DNS translates domain names into IP addresses to enable communication between devices on the internet.
DNS stands for Domain Name System.
It works by translating human-readable domain names into IP addresses that computers can understand.
DNS servers store information about domain names and their corresponding IP addresses.
When a user types a domain name into their browser, the browser sends a request to a DNS server to r...
DORA process is used by DHCP to allocate IP addresses to clients.
DORA stands for Discover, Offer, Request, and Acknowledge.
Client sends a broadcast Discover message to find available DHCP servers.
Server responds with an Offer message containing IP address and lease duration.
Client sends a Request message to request the offered IP address.
Server sends an Acknowledge message to confirm the allocation of IP address to cli...
FSMO (Flexible Single Master Operations) roles are specialized domain controller tasks in Active Directory.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master: responsible for updating the Active Directory schema.
Domain Naming Master: responsible for adding or removing domains in a forest.
RID Master: responsible for allocating RIDs (Relative Ide...
User logon and logout can be logged by enabling auditing and configuring security policies.
Enable auditing in group policy settings
Configure security policies to audit logon and logoff events
View logs in Event Viewer
Use third-party tools for more advanced logging and analysis
Filter or WMI policy in GPO is used to apply specific settings to a targeted group of computers or users.
Filtering allows administrators to apply GPOs to specific groups of users or computers based on criteria such as operating system, group membership, or hardware configuration.
WMI filters allow administrators to apply GPOs based on the results of a WMI query, which can provide more granular targeting options.
For exam...
OU stands for Organizational Unit and is used to organize objects in Active Directory. Group is a collection of users with common attributes.
OU is a container object used to group and organize other objects in AD
Group is a collection of users with common attributes such as access permissions or job roles
OU can be used to delegate administrative control over a subset of objects in AD
Group can be used to simplify the man...
Authoritative restore mode is used to restore the entire Active Directory while non-authoritative restore mode is used to restore individual objects.
Authoritative restore mode restores the entire Active Directory to a specific point in time and marks it as the current version.
Non-authoritative restore mode restores individual objects from a backup and allows replication to update the restored object.
Authoritative resto...
Top trending discussions
I applied via Naukri.com
This is the round in which basic quant questions were asked
In this round basic 2 java questions were asked
In this round one topic was given and we need to discuss about that topic
Java is a high-level, object-oriented programming language used to develop applications for various platforms.
Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)
It is known for its security features, such as the ability to run code in a sandbox environment
Java is used for developing a wide range of applications, from web applications to mobile apps and games
It is also used...
Searching is finding a specific item in a collection of items. Sorting is arranging items in a specific order.
Searching involves looking for a specific item in a collection of items.
Sorting involves arranging items in a specific order, such as alphabetical or numerical.
Searching and sorting are commonly used in computer science and data analysis.
Examples of searching algorithms include linear search and binary search.
E...
A binary tree is a data structure consisting of nodes, where each node has at most two children.
Nodes in a binary tree have a left and/or right child node.
The topmost node is called the root node.
Binary trees are used in search algorithms and data compression.
Examples of binary trees include binary search trees and heap trees.
I applied via Naukri.com
This is the round in which basic quant questions were asked
In this round basic 2 java questions were asked
In this round one topic was given and we need to discuss about that topic
Java is a high-level, object-oriented programming language used to develop applications for various platforms.
Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)
It is known for its security features, such as the ability to run code in a sandbox environment
Java is used for developing a wide range of applications, from web applications to mobile apps and games
It is also used...
Searching is finding a specific item in a collection of items. Sorting is arranging items in a specific order.
Searching involves looking for a specific item in a collection of items.
Sorting involves arranging items in a specific order, such as alphabetical or numerical.
Searching and sorting are commonly used in computer science and data analysis.
Examples of searching algorithms include linear search and binary search.
E...
A binary tree is a data structure consisting of nodes, where each node has at most two children.
Nodes in a binary tree have a left and/or right child node.
The topmost node is called the root node.
Binary trees are used in search algorithms and data compression.
Examples of binary trees include binary search trees and heap trees.
posted on 13 Oct 2023
I applied via Referral and was interviewed before Oct 2022. There were 2 interview rounds.
Network Security Engineer
30
salaries
| ₹3 L/yr - ₹11 L/yr |
Network Engineer
22
salaries
| ₹3 L/yr - ₹6.5 L/yr |
System Administrator
14
salaries
| ₹4 L/yr - ₹8 L/yr |
Network Support Engineer
8
salaries
| ₹2 L/yr - ₹4 L/yr |
Desktop Support Engineer
7
salaries
| ₹2.8 L/yr - ₹3.1 L/yr |
Infosys
TCS
Wipro
HCLTech