Filter interviews by
Clear (1)
Top trending discussions
posted on 4 Apr 2023
I applied via Walk-in and was interviewed before Apr 2022. There were 3 interview rounds.
AD stands for Active Directory, a Microsoft technology used for managing users, computers, and other resources in a network. DHCP stands for Dynamic Host Configuration Protocol, a network protocol used for assigning IP addresses to devices.
AD is used for centralized management of network resources
AD allows for authentication and authorization of users and devices
DHCP automatically assigns IP addresses to devices on a n...
I applied via Naukri.com and was interviewed before Sep 2022. There was 1 interview round.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more unique addresses and improved security features.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
IPv4 supports up to 4.3 billion unique addresses, which is becoming insufficient with the growth of internet-connected devices, w...
I will install the OS using a bootable installation media or network deployment tools.
Create a bootable installation media (USB or DVD) with the OS image
Boot the computer from the installation media
Follow the on-screen instructions to install the OS
Configure settings such as language, time zone, and user accounts
Install necessary drivers and updates post installation
posted on 5 Oct 2022
I applied via Approached by Company and was interviewed in Sep 2022. There were 3 interview rounds.
Windows OS is a popular operating system developed by Microsoft.
Windows OS is available in different versions such as Windows 7, 8, 10, etc.
It has a graphical user interface (GUI) and supports multitasking.
Windows OS supports various file systems such as NTFS, FAT32, exFAT, etc.
It comes with built-in applications such as Microsoft Office, Internet Explorer, Windows Media Player, etc.
Windows OS can be customized with th...
I applied via Naukri.com and was interviewed in Apr 2022. There were 2 interview rounds.
PST and OST are Outlook data files. BSOD is Blue Screen of Death. DNS is Domain Name System. VPN is Virtual Private Network.
PST and OST are data files used by Microsoft Outlook to store emails, contacts, and other data.
BSOD is a critical error screen displayed by Windows operating system when it encounters a system error.
DNS is a system that translates domain names into IP addresses, allowing computers to communicate w...
POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.
POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.
IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.
SMTP (Simple Mail Transfer Protocol) is used for sending emails from a c...
To backup a PST file, you can simply copy and paste it to an external drive or cloud storage. To speed up a slow system, try cleaning up temporary files and disabling unnecessary startup programs.
Copy and paste the PST file to an external drive or cloud storage
Use a backup software to automate the backup process
Clean up temporary files to free up space and improve performance
Disable unnecessary startup programs to redu
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Desktop l2 level related questions
How to configur system in domain
To configure SAP in user's system, follow these steps:
Install SAP GUI on the user's system
Configure the SAP logon pad with the necessary system details
Create a user ID and assign the necessary authorizations
Test the connection to ensure successful configuration
Outlook 365 offers numerous advantages for users.
Access to emails, contacts, and calendar from anywhere with internet connection
Collaboration and sharing features for team projects
Integration with other Microsoft Office applications
Automatic updates and security features
Large storage capacity for emails and attachments
Mobile app for easy access on-the-go
Bitlocker is important for securing data on Windows devices.
Encrypts data on Windows devices to prevent unauthorized access
Protects against theft or loss of devices
Meets compliance requirements for data protection
Can be managed centrally through Active Directory
Can be used in combination with other security measures like TPM and Secure Boot
Helps prevent data breaches and protects sensitive information
MFA stands for Multi-Factor Authentication, which is a security process that requires users to provide two or more forms of identification to access a system.
MFA adds an extra layer of security to protect against unauthorized access.
The most common forms of identification used in MFA are passwords, security tokens, and biometric data.
MFA can be implemented through various methods such as SMS codes, mobile apps, or hard...
posted on 3 Jan 2022
I was interviewed in Sep 2017.
I applied via Referral
Data structures are a way to organize and store data efficiently.
Data structures are used to store and manipulate data in a structured manner.
They provide different ways to access and perform operations on the data.
Examples include arrays, linked lists, stacks, queues, trees, and graphs.
Developed a web-based project management tool for tracking tasks and deadlines
Used React.js for front-end development
Implemented RESTful APIs using Node.js and Express for back-end
Utilized MongoDB for database management
Incorporated user authentication and authorization features
Integrated real-time notifications using Socket.io
My name is John Smith.
Full name is John Smith
Common name in English-speaking countries
Easy to remember and pronounce
The question is unrelated to the medical field and is not a puzzle or riddle.
The question is asking about the meaning of the interviewer's name.
You can ask the interviewer about the origin or cultural significance of their name.
You can also mention that names often have different meanings in different languages or cultures.
My strengths include problem-solving skills, attention to detail, and strong communication abilities.
Strong problem-solving skills - I enjoy tackling complex issues and finding creative solutions.
Attention to detail - I am meticulous in my work and strive for accuracy in all tasks.
Strong communication abilities - I can effectively convey ideas and collaborate with team members.
Some of the top questions asked at the IDC Technologies Desktop Support Engineer L2 interview -
based on 1 interview
Interview experience
based on 25 reviews
Rating in categories
Information Technology Recruiter
295
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Recruiter
271
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior IT Recruiter
270
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
245
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Recruiter
236
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech