Filter interviews by
Softphones are applications that allow users to make phone calls over the internet using a computer or mobile device.
Softphones can work on various operating systems such as Windows, macOS, and Linux.
They require an internet connection to function properly.
Softphones can be used with different VoIP services like Skype, Zoom, and Cisco Webex.
They often have features like call recording, video calling, and instant m...
Yes, I am comfortable working in shifts.
I have previous experience working in shifts at my previous job.
I am flexible with my schedule and can easily adapt to different shift timings.
I understand the importance of round-the-clock support in a Systems & Network Engineer role.
To give file access to a shared folder, you can set permissions for specific users or groups.
Use the file system's security settings to grant read, write, or execute permissions to users or groups.
Consider creating a new user group specifically for accessing the shared folder.
Regularly review and update permissions to ensure security and access control.
Example: Use the 'chmod' command in Linux to change file permi...
Shared mailbox is accessed by multiple users with a single login, while distributed mailbox is spread across multiple servers for load balancing.
Shared mailbox allows multiple users to access the same mailbox with a single login credential
Distributed mailbox is spread across multiple servers for load balancing and redundancy
Shared mailbox is typically used for team collaboration and sharing information
Distributed ...
Yes, I have experience working with ticketing tools such as ServiceNow and Jira.
Experience with ServiceNow and Jira ticketing tools
Created, updated, and resolved tickets for various IT issues
Assigned tickets to appropriate team members for resolution
Monitored ticket queues and ensured timely responses
Generated reports on ticketing metrics and trends
Yes, you can use commands like md5sum, sha1sum, and sha256sum to scan files for corruption.
Use md5sum command to calculate and check the MD5 checksum of a file
Use sha1sum command to calculate and check the SHA-1 checksum of a file
Use sha256sum command to calculate and check the SHA-256 checksum of a file
To add a system to a domain, follow these steps and ensure proper configuration before handing it over to the user.
Join the system to the domain by accessing System Properties > Computer Name > Change > Domain
Enter the domain name and provide domain credentials when prompted
Restart the system to apply the changes and ensure successful domain join
Configure domain-specific settings such as group policies, network sh...
Yes, I have worked on exchange servers in previous roles.
Managed and maintained exchange servers for email communication
Configured email accounts, distribution lists, and mail flow rules
Troubleshooted and resolved issues related to exchange servers
Implemented security measures to protect exchange server data
Troubleshoot Outlook email issues by checking settings, connectivity, and account configurations.
Check internet connectivity: Ensure the device is connected to the internet by browsing a website.
Verify Outlook settings: Check if the correct email account is configured and the server settings are accurate.
Examine the inbox rules: Look for any rules that might be moving emails to other folders or deleting them.
Inspe...
Asset management involves tracking and managing an organization's physical assets to optimize usage and reduce costs.
Maintain an inventory of all assets including hardware, software, and equipment
Track asset location, status, and usage to prevent loss or theft
Implement a system for asset tagging and labeling for easy identification
Regularly update asset records and conduct audits to ensure accuracy
Utilize asset ma...
I applied via Approached by Company and was interviewed in Mar 2024. There were 3 interview rounds.
Yes, I am comfortable working in shifts.
I have previous experience working in shifts at my previous job.
I am flexible with my schedule and can easily adapt to different shift timings.
I understand the importance of round-the-clock support in a Systems & Network Engineer role.
I am a Systems & Network Engineer with extensive experience in managing and optimizing IT infrastructure and network systems.
Network Design: I have designed and implemented scalable network architectures for organizations, ensuring high availability and performance.
Troubleshooting: I excel in diagnosing and resolving network issues, having successfully reduced downtime by 30% in my previous role.
Security Protocols:...
Yes, I have experience working on active directory and running scripts.
I have experience managing user accounts, groups, and permissions in Active Directory.
I have written and executed PowerShell scripts to automate tasks in Active Directory.
I have experience troubleshooting issues related to Active Directory replication and DNS.
I have worked on integrating third-party applications with Active Directory for single sign...
Softphones are applications that allow users to make phone calls over the internet using a computer or mobile device.
Softphones can work on various operating systems such as Windows, macOS, and Linux.
They require an internet connection to function properly.
Softphones can be used with different VoIP services like Skype, Zoom, and Cisco Webex.
They often have features like call recording, video calling, and instant messag...
To add a system to a domain, follow these steps and ensure proper configuration before handing it over to the user.
Join the system to the domain by accessing System Properties > Computer Name > Change > Domain
Enter the domain name and provide domain credentials when prompted
Restart the system to apply the changes and ensure successful domain join
Configure domain-specific settings such as group policies, network shares,...
AWS is a comprehensive cloud platform offering a wide range of services for computing, storage, and networking.
EC2 Instances: I have launched and managed EC2 instances for scalable computing, using different instance types based on workload requirements.
S3 Storage: I utilized Amazon S3 for storing and retrieving data, implementing lifecycle policies for cost management and data archiving.
VPC Configuration: I designed a...
Yes, I have worked on exchange servers in previous roles.
Managed and maintained exchange servers for email communication
Configured email accounts, distribution lists, and mail flow rules
Troubleshooted and resolved issues related to exchange servers
Implemented security measures to protect exchange server data
Yes, I have experience working with ticketing tools such as ServiceNow and Jira.
Experience with ServiceNow and Jira ticketing tools
Created, updated, and resolved tickets for various IT issues
Assigned tickets to appropriate team members for resolution
Monitored ticket queues and ensured timely responses
Generated reports on ticketing metrics and trends
I would start by checking the user's computer for any potential issues with the operating system or files.
Check if the computer is properly connected to the network
Verify if the user has the necessary permissions to access the files
Check for any recent software updates or changes that may have caused the issue
Run diagnostic tools to identify any hardware or software issues
Test accessing the files from a different devic...
Yes, you can use commands like md5sum, sha1sum, and sha256sum to scan files for corruption.
Use md5sum command to calculate and check the MD5 checksum of a file
Use sha1sum command to calculate and check the SHA-1 checksum of a file
Use sha256sum command to calculate and check the SHA-256 checksum of a file
I am highly skilled in network troubleshooting and familiar with commands like ipconfig /release and /renew.
I have extensive experience in troubleshooting network issues, including identifying and resolving connectivity problems.
I am proficient in using commands like ipconfig /release and /renew to troubleshoot network configurations.
I have successfully resolved issues related to IP address conflicts, DNS resolution, a...
To give file access to a shared folder, you can set permissions for specific users or groups.
Use the file system's security settings to grant read, write, or execute permissions to users or groups.
Consider creating a new user group specifically for accessing the shared folder.
Regularly review and update permissions to ensure security and access control.
Example: Use the 'chmod' command in Linux to change file permission...
Troubleshoot Outlook email issues by checking settings, connectivity, and account configurations.
Check internet connectivity: Ensure the device is connected to the internet by browsing a website.
Verify Outlook settings: Check if the correct email account is configured and the server settings are accurate.
Examine the inbox rules: Look for any rules that might be moving emails to other folders or deleting them.
Inspect th...
Shared mailbox is accessed by multiple users with a single login, while distributed mailbox is spread across multiple servers for load balancing.
Shared mailbox allows multiple users to access the same mailbox with a single login credential
Distributed mailbox is spread across multiple servers for load balancing and redundancy
Shared mailbox is typically used for team collaboration and sharing information
Distributed mailb...
Asset management involves tracking and managing an organization's physical assets to optimize usage and reduce costs.
Maintain an inventory of all assets including hardware, software, and equipment
Track asset location, status, and usage to prevent loss or theft
Implement a system for asset tagging and labeling for easy identification
Regularly update asset records and conduct audits to ensure accuracy
Utilize asset managem...
Top trending discussions
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Jun 2020. There were 6 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2019. There were 4 interview rounds.
Java is a high-level programming language known for its platform independence and object-oriented approach.
Java is widely used for developing desktop, web, and mobile applications.
It is known for its robustness, security, and scalability.
Java programs are compiled into bytecode that can run on any Java Virtual Machine (JVM).
It supports multithreading, exception handling, and automatic memory management.
Popular framewor...
I applied via Naukri.com and was interviewed in Sep 2020. There was 1 interview round.
I applied via Walk-in and was interviewed in Sep 2020. There was 1 interview round.
Some of the top questions asked at the Designway interview -
based on 2 interview experiences
Difficulty level
Duration
Software Developer
6
salaries
| ₹3 L/yr - ₹7.1 L/yr |
Network & System Engineer
4
salaries
| ₹3 L/yr - ₹4.5 L/yr |
DOT NET Developer
4
salaries
| ₹4 L/yr - ₹9.8 L/yr |
Software Tester
3
salaries
| ₹4.8 L/yr - ₹5 L/yr |
Junior Frontend Developer
3
salaries
| ₹1.8 L/yr - ₹2.9 L/yr |
TCS
Accenture
Wipro
Cognizant