i
Genzeon Corporation
Filter interviews by
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
TCP/IP model is a networking protocol suite that defines how data is transmitted over a network. DNS is a system that translates domain names to IP addresses. DHCP is a protocol that assigns IP addresses to devices on a network. Networking protocols are rules that define how data is transmitted and received over a network. Active Directory is a directory service used in Windows environments to manage users, computers, ...
Top trending discussions
I applied via campus placement at Noida Institute of Engineering & Technology, Greater Noida and was interviewed in Jan 2024. There were 3 interview rounds.
Windows and Android OS have evolved with new features and improvements compared to past versions.
Windows 10 introduced a new Start menu and Cortana virtual assistant.
Android 11 focused on improved privacy controls and messaging features.
Both OS have enhanced security measures compared to their past versions.
I applied via Apna Jobs and was interviewed in Oct 2022. There were 2 interview rounds.
VPN is a secure connection between two or more devices over the internet.
VPN encrypts data to ensure privacy and security
It allows remote access to a private network
It can be used to bypass geo-restrictions and access blocked content
Examples include OpenVPN, Cisco AnyConnect, and NordVPN
Ping cmd is a network diagnostic tool used to test connectivity between two devices.
Ping sends ICMP packets to the destination device and measures the response time.
It can be used to test network latency, packet loss, and network congestion.
Ping can also be used to determine the IP address of a device.
Ping can be run from the command prompt on Windows, macOS, and Linux systems.
Ping can be used with various options such...
Dual booting allows two operating systems to be installed on one computer, giving the user the option to choose which to use.
Create a separate partition for each operating system
Install the first operating system on one partition
Install the second operating system on the other partition
Use a boot manager to choose which operating system to boot into
Examples of boot managers include GRUB and Windows Boot Manager
A virtual machine is a software emulation of a physical computer that can run multiple operating systems and applications.
Virtual machines allow for efficient use of hardware resources by sharing them among multiple virtual machines
They provide a secure and isolated environment for running applications
Virtual machines can be easily created, cloned, and moved between physical hosts
Examples of virtual machine software in
I applied via Walk-in and was interviewed in Feb 2022. There were 3 interview rounds.
There where two paper one was of maths and second paper was of engligh.
There where ten person in one GD, topic was provided us by them.
I applied via Naukri.com and was interviewed in Aug 2020. There was 1 interview round.
Anypoint Runtime Manager is a cloud-based tool for managing and monitoring Mule applications.
It provides real-time visibility into application performance and health.
It allows for easy deployment and scaling of applications.
It offers centralized logging and alerting for quick issue resolution.
It integrates with other Anypoint Platform tools for end-to-end application management.
Example: Anypoint Runtime Manager can be ...
Runtime fabric is a platform that enables the deployment and management of distributed applications.
It provides a unified view of the distributed application
It manages the deployment and scaling of application components
It enables communication between application components across different environments
Examples include MuleSoft's Anypoint Runtime Fabric and Microsoft's Azure Service Fabric
Mule 4 is a major upgrade from Mule 3 with improved performance, simplified development, and enhanced security features.
Mule 4 has a new simplified syntax for dataweave
Mule 4 has a new error handling mechanism
Mule 4 has improved performance with reduced memory usage
Mule 4 has enhanced security features with TLS 1.2 support
Mule 4 has a new deployment model with standalone and cluster modes
Secure properties in Mule are used to store sensitive information such as passwords and API keys.
Secure properties are encrypted and can only be accessed by authorized users.
They are commonly used to store credentials for external systems such as databases and APIs.
Secure properties can be defined in a separate file or in the Mule configuration file.
They can be accessed in Mule flows using the secure:: prefix.
Examples ...
I applied via campus placement at Noida Institute of Engineering & Technology, Greater Noida and was interviewed in Jan 2024. There were 3 interview rounds.
Windows and Android OS have evolved with new features and improvements compared to past versions.
Windows 10 introduced a new Start menu and Cortana virtual assistant.
Android 11 focused on improved privacy controls and messaging features.
Both OS have enhanced security measures compared to their past versions.
I applied via Apna Jobs and was interviewed in Oct 2022. There were 2 interview rounds.
VPN is a secure connection between two or more devices over the internet.
VPN encrypts data to ensure privacy and security
It allows remote access to a private network
It can be used to bypass geo-restrictions and access blocked content
Examples include OpenVPN, Cisco AnyConnect, and NordVPN
Ping cmd is a network diagnostic tool used to test connectivity between two devices.
Ping sends ICMP packets to the destination device and measures the response time.
It can be used to test network latency, packet loss, and network congestion.
Ping can also be used to determine the IP address of a device.
Ping can be run from the command prompt on Windows, macOS, and Linux systems.
Ping can be used with various options such...
Dual booting allows two operating systems to be installed on one computer, giving the user the option to choose which to use.
Create a separate partition for each operating system
Install the first operating system on one partition
Install the second operating system on the other partition
Use a boot manager to choose which operating system to boot into
Examples of boot managers include GRUB and Windows Boot Manager
A virtual machine is a software emulation of a physical computer that can run multiple operating systems and applications.
Virtual machines allow for efficient use of hardware resources by sharing them among multiple virtual machines
They provide a secure and isolated environment for running applications
Virtual machines can be easily created, cloned, and moved between physical hosts
Examples of virtual machine software in
Aptitude and reasoning
I applied via Walk-in and was interviewed in Feb 2022. There were 3 interview rounds.
There where two paper one was of maths and second paper was of engligh.
There where ten person in one GD, topic was provided us by them.
I applied via Naukri.com and was interviewed before Feb 2023. There was 1 interview round.
Sticky bit is a permission set on a directory to allow only the owner to delete or rename files within that directory.
Sticky bit is represented by a 't' at the end of the permission string for a directory.
It is commonly used on directories like /tmp to prevent users from deleting each other's files.
Example: chmod +t /tmp
The /tmp directory is a temporary directory used for storing temporary files in Unix-like operating systems.
Used for storing temporary files
Files in /tmp are typically deleted upon system reboot
Should not be used for storing important data
Interview experience
Senior Software Engineer
30
salaries
| ₹9 L/yr - ₹24.8 L/yr |
Software Engineer
25
salaries
| ₹3 L/yr - ₹9.9 L/yr |
Associate Software Engineer
24
salaries
| ₹3 L/yr - ₹5 L/yr |
QA Engineer
12
salaries
| ₹6.2 L/yr - ₹13 L/yr |
Senior QA Engineer
10
salaries
| ₹13 L/yr - ₹20.2 L/yr |
TCS
Infosys
Wipro
HCLTech