i
Binary Global
Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
Sophos can be integrated with AD server using Sophos Central or Sophos Enterprise Console.
Install Sophos Central or Sophos Enterprise Console on the AD server.
Configure the AD synchronization settings in Sophos.
Create a synchronization account in AD with read-only access to user and group information.
Configure the synchronization account in Sophos.
Verify the synchronization settings and run a synchronization test.
Confi...
Sophos provides packet capture through its built-in packet sniffer tool.
Sophos has a built-in packet sniffer tool called 'Packet Capture' which can be accessed through the web interface.
Packet Capture allows users to capture packets on specific interfaces or VLANs.
Users can also apply filters to capture specific types of traffic.
Captured packets can be downloaded in PCAP format for further analysis.
Upstream refers to the WSUS server that is the source of updates, while downstream refers to the WSUS servers that receive updates from the upstream server.
Upstream WSUS server is the source of updates
Downstream WSUS servers receive updates from the upstream server
Downstream servers can be configured to synchronize with the upstream server at regular intervals
Upstream server can be configured to download updates from M
The logical part of a server refers to the software and how it operates, while the physical part refers to the hardware components.
Logical part includes operating system, applications, and services
Physical part includes CPU, RAM, hard drives, and network interfaces
Logical and physical parts work together to provide functionality and performance
Examples of logical and physical parts working together include virtualizati
DNS translates domain names into IP addresses to enable communication between devices on the internet.
DNS stands for Domain Name System.
It works by translating human-readable domain names into IP addresses that computers can understand.
DNS servers store information about domain names and their corresponding IP addresses.
When a user types a domain name into their browser, the browser sends a request to a DNS server to r...
DORA process is used by DHCP to allocate IP addresses to clients.
DORA stands for Discover, Offer, Request, and Acknowledge.
Client sends a broadcast Discover message to find available DHCP servers.
Server responds with an Offer message containing IP address and lease duration.
Client sends a Request message to request the offered IP address.
Server sends an Acknowledge message to confirm the allocation of IP address to cli...
FSMO (Flexible Single Master Operations) roles are specialized domain controller tasks in Active Directory.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master: responsible for updating the Active Directory schema.
Domain Naming Master: responsible for adding or removing domains in a forest.
RID Master: responsible for allocating RIDs (Relative Ide...
User logon and logout can be logged by enabling auditing and configuring security policies.
Enable auditing in group policy settings
Configure security policies to audit logon and logoff events
View logs in Event Viewer
Use third-party tools for more advanced logging and analysis
Filter or WMI policy in GPO is used to apply specific settings to a targeted group of computers or users.
Filtering allows administrators to apply GPOs to specific groups of users or computers based on criteria such as operating system, group membership, or hardware configuration.
WMI filters allow administrators to apply GPOs based on the results of a WMI query, which can provide more granular targeting options.
For exam...
OU stands for Organizational Unit and is used to organize objects in Active Directory. Group is a collection of users with common attributes.
OU is a container object used to group and organize other objects in AD
Group is a collection of users with common attributes such as access permissions or job roles
OU can be used to delegate administrative control over a subset of objects in AD
Group can be used to simplify the man...
Authoritative restore mode is used to restore the entire Active Directory while non-authoritative restore mode is used to restore individual objects.
Authoritative restore mode restores the entire Active Directory to a specific point in time and marks it as the current version.
Non-authoritative restore mode restores individual objects from a backup and allows replication to update the restored object.
Authoritative resto...
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
Binary Global interview questions for popular designations
I applied via Job Portal and was interviewed in Mar 2024. There was 1 interview round.
I applied via Job Portal
I applied via Walk-in and was interviewed before Jan 2024. There was 1 interview round.
posted on 12 Apr 2023
I applied via Recruitment Consulltant and was interviewed before Apr 2022. There were 3 interview rounds.
25 MCQ questions online with time limit
Create webapp . Frontend, Backend , data encryption
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions on DSA and DBMS mainly.
Given an array ARR
consisting of N
integers, determine the sum of the subarray with the maximum sum, including the possibility of an empty subarray.
A subarray is a...
Find the sum of the subarray with the maximum sum in a given array.
Iterate through the array and keep track of the current sum and maximum sum.
Update the maximum sum if the current sum becomes greater.
Handle cases where the array has all negative numbers or empty subarray.
Example: For input [-2, 1, -3, 4, -1], the maximum sum subarray is [4] with sum 4.
Given a positive integer N
, your task is to identify all prime numbers less than or equal to N
.
A prime number is a natural number greater than 1 that has no po...
Identify all prime numbers less than or equal to a given positive integer N.
Iterate from 2 to N and check if each number is prime
Use the Sieve of Eratosthenes algorithm for efficient prime number identification
Optimize by only checking numbers up to square root of N for divisibility
Joins in databases are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right ta...
Round duration - 30 minutes
Round difficulty - Easy
Typical HR round with behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 9 interviews
Interview experience
based on 54 reviews
Rating in categories
Network Security Engineer
30
salaries
| ₹3 L/yr - ₹11 L/yr |
Network Engineer
24
salaries
| ₹3 L/yr - ₹6.5 L/yr |
System Administrator
15
salaries
| ₹4 L/yr - ₹10 L/yr |
Network Support Engineer
8
salaries
| ₹2 L/yr - ₹4 L/yr |
Desktop Support Engineer
7
salaries
| ₹3 L/yr - ₹3 L/yr |
Accel Frontline
Northcorp Software
Elentec Power India (EPI) Pvt. Ltd.
HyScaler