Filter interviews by
I can submit around 5-10 relevant profiles in a day, depending on the complexity of the roles and availability of suitable candidates.
I aim to submit at least 5 high-quality profiles per day to ensure a diverse pool of candidates for the hiring manager.
The number of profiles submitted may vary based on the urgency of the role and the specific requirements provided by the hiring manager.
I prioritize quality over qu...
Various types of attacks in a network include DDoS, phishing, malware, man-in-the-middle, and SQL injection.
DDoS (Distributed Denial of Service) attack overwhelms a network with traffic.
Phishing attack tricks users into revealing sensitive information.
Malware attack involves malicious software infecting a network.
Man-in-the-middle attack intercepts communication between two parties.
SQL injection attack exploits vu...
Class is a blueprint or template for creating objects that define their properties and behaviors.
Classes are used in object-oriented programming.
They define the attributes and methods of an object.
Objects are instances of a class.
Classes can inherit properties and methods from other classes.
Examples of classes include Person, Car, and Animal.
Class is a non-primitive data type used in object-oriented programming.
A class is a blueprint for creating objects that have similar properties and methods.
It can contain variables, methods, constructors, and other classes.
Examples of classes include String, Integer, and ArrayList in Java.
Classes are used to achieve encapsulation, inheritance, and polymorphism in OOP.
Java is a high-level programming language used for developing applications and software.
Java is an object-oriented language
It is platform-independent
Java code is compiled into bytecode
Java Virtual Machine (JVM) executes the bytecode
Java is used for developing web applications, mobile applications, games, and more
The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
OSI stands for Open Systems Interconnection.
It has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure intero...
An IP address is a unique numerical identifier assigned to each device connected to a computer network.
IP stands for Internet Protocol
It consists of four sets of numbers separated by dots
It is used to identify and communicate with devices on a network
IPv4 addresses are 32-bit and IPv6 addresses are 128-bit
Example: 192.168.1.1
A network is a group of interconnected devices that communicate with each other to share resources and information.
Networks can be wired or wireless
They can be local (LAN) or wide area (WAN)
Networks can be used for sharing files, printers, and internet access
Examples of networks include the internet, home networks, and corporate networks
I have 10 years of experience in desktop support, focusing on troubleshooting, customer service, and system maintenance.
Provided technical support for Windows and Mac OS environments, resolving over 95% of issues on the first call.
Managed hardware and software installations, including setting up new workstations and configuring network settings.
Conducted training sessions for end-users on software applications, im...
BPO stands for Business Process Outsourcing.
It involves contracting out specific business processes to a third-party service provider.
Common BPO services include customer support, accounting, and data entry.
BPO is often used to reduce costs and improve efficiency.
Examples of BPO companies include Accenture, IBM, and Infosys.
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
Java is a high-level programming language used for developing applications and software.
Java is an object-oriented language
It is platform-independent
Java code is compiled into bytecode
Java Virtual Machine (JVM) executes the bytecode
Java is used for developing web applications, mobile applications, games, and more
Class is a blueprint or template for creating objects that define their properties and behaviors.
Classes are used in object-oriented programming.
They define the attributes and methods of an object.
Objects are instances of a class.
Classes can inherit properties and methods from other classes.
Examples of classes include Person, Car, and Animal.
Class is a non-primitive data type used in object-oriented programming.
A class is a blueprint for creating objects that have similar properties and methods.
It can contain variables, methods, constructors, and other classes.
Examples of classes include String, Integer, and ArrayList in Java.
Classes are used to achieve encapsulation, inheritance, and polymorphism in OOP.
My strength is my problem-solving skills and ability to learn quickly.
I am able to analyze complex problems and come up with effective solutions.
I am a quick learner and can adapt to new technologies and systems easily.
I am able to work well under pressure and prioritize tasks effectively.
I am a good communicator and can work well in a team environment.
I am detail-oriented and strive for accuracy in my work.
For example...
I tend to overthink and sometimes struggle with decision-making.
I am aware of this weakness and actively work on improving my decision-making skills.
I seek input from colleagues and mentors to help me make informed decisions.
I prioritize tasks and break them down into smaller, manageable steps to avoid feeling overwhelmed.
For example, when faced with a complex technical issue, I will gather all relevant information, co...
I appeared for an interview in Mar 2025, where I was asked the following questions.
A network is a collection of interconnected devices that communicate and share resources.
Networks can be wired (e.g., Ethernet) or wireless (e.g., Wi-Fi).
They enable data sharing between devices like computers, printers, and servers.
Common types include LAN (Local Area Network) and WAN (Wide Area Network).
Protocols like TCP/IP govern how data is transmitted over networks.
Examples include home networks connecting device...
LAN (Local Area Network) connects devices in a limited area, while WAN (Wide Area Network) connects devices over larger distances.
LAN typically covers a small geographic area, like a home, office, or campus.
WAN spans larger distances, connecting multiple LANs, often across cities or countries.
LANs use Ethernet or Wi-Fi technologies, while WANs may use leased lines, satellite links, or VPNs.
Examples of LAN: a home netwo...
The OSI model has seven layers that standardize network communication protocols.
1. Physical Layer: Deals with hardware transmission (e.g., cables, switches).
2. Data Link Layer: Manages node-to-node data transfer (e.g., Ethernet).
3. Network Layer: Handles routing of data packets (e.g., IP).
4. Transport Layer: Ensures reliable data transfer (e.g., TCP, UDP).
5. Session Layer: Manages sessions between applications (e.g., A...
Sharing of recourse information from one divice to another device And Types Communication Simplex. One way communication Half duplex. Two way communication but not simultaneously Full duplex. Two way communication simultaneously
I applied via Naukri.com and was interviewed in Jul 2023. There were 2 interview rounds.
Various types of attacks in a network include DDoS, phishing, malware, man-in-the-middle, and SQL injection.
DDoS (Distributed Denial of Service) attack overwhelms a network with traffic.
Phishing attack tricks users into revealing sensitive information.
Malware attack involves malicious software infecting a network.
Man-in-the-middle attack intercepts communication between two parties.
SQL injection attack exploits vulnera...
DDOS, Virus, and Worm are types of cyber threats that can harm computer systems and networks.
DDOS stands for Distributed Denial of Service, where multiple compromised systems attack a target, causing a denial of service for users.
A virus is a malicious software program that replicates itself by inserting copies into other programs or documents.
A worm is a self-replicating malware that spreads across networks without ne...
I can submit around 5-10 relevant profiles in a day, depending on the complexity of the roles and availability of suitable candidates.
I aim to submit at least 5 high-quality profiles per day to ensure a diverse pool of candidates for the hiring manager.
The number of profiles submitted may vary based on the urgency of the role and the specific requirements provided by the hiring manager.
I prioritize quality over quantit...
I appeared for an interview before Jun 2024, where I was asked the following questions.
I applied via Recruitment Consulltant and was interviewed in Dec 2021. There was 1 interview round.
I applied via Company Website and was interviewed in Feb 2022. There were 2 interview rounds.
My use is to perform tasks efficiently and effectively.
I help streamline processes and increase productivity.
I can automate repetitive tasks to save time and reduce errors.
I can provide insights and analytics to aid decision-making.
Examples include project management software, data analysis tools, and automation software.
I applied via Walk-in and was interviewed in Mar 2022. There were 4 interview rounds.
Aptitude reasoning and English
Some questions about coding Last one is write one or two codes with your sutible language..
The interview covered topics such as prime numbers, pattern programs, loops, data structures, and projects.
Prime numbers are numbers that are only divisible by 1 and themselves.
A pattern program is a program that prints a specific pattern of characters or numbers.
Loops are used to repeat a set of instructions until a certain condition is met.
Data structures are ways of organizing and storing data in a computer program.
...
Top trending discussions
based on 10 interview experiences
Difficulty level
Duration
based on 357 reviews
Rating in categories
Network Support Engineer
92
salaries
| ₹0.9 L/yr - ₹2.5 L/yr |
Desktop Support Engineer
57
salaries
| ₹1.3 L/yr - ₹3.6 L/yr |
Talent Acquisition Executive
49
salaries
| ₹1.5 L/yr - ₹3 L/yr |
Information Technology Recruiter
49
salaries
| ₹1.2 L/yr - ₹4.1 L/yr |
Network Engineer
44
salaries
| ₹1 L/yr - ₹4 L/yr |
HCL Infosystems
Kellogg Brown and Root
CS TECH Ai
Karvy Innotech