Filter interviews by
iCloud is a cloud storage and computing service provided by Apple Inc.
iCloud allows users to store and sync data across multiple devices.
It can be used to backup photos, documents, and other files.
iCloud also includes features like Find My iPhone and iCloud Keychain.
Users can access their iCloud account through a web browser or through Apple's apps.
iCloud offers different storage plans ranging from 5GB to 2TB.
Top trending discussions
I applied via Naukri.com and was interviewed before Feb 2021. There were 3 interview rounds.
Must have knowege of the work
posted on 30 Jun 2022
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
posted on 3 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
IP stands for Internet Protocol. It is a unique numerical address assigned to each device connected to a computer network.
IP is used to identify and locate devices on a network.
There are two versions of IP: IPv4 and IPv6.
IPv4 uses a 32-bit address and is the most widely used version.
IPv6 uses a 128-bit address and provides a larger address space.
Examples of IP addresses: 192.168.0.1 (IPv4) and 2001:0db8:85a3:0000:0000:
I applied via Naukri.com and was interviewed in Nov 2022. There were 3 interview rounds.
Yes, I am comfortable with flexi shifts.
I am willing to work flexible hours to ensure smooth operations.
I understand the importance of being available during peak hours.
I have experience working in shifts and can adapt to changing schedules.
I am committed to meeting the needs of the team and the organization.
Outlook is a personal information manager and email client developed by Microsoft. Outlook 365 is a cloud-based subscription service of Outlook.
Outlook is a software application used for managing personal information such as emails, calendars, contacts, and tasks.
It allows users to send, receive, and organize emails from multiple email accounts.
Outlook provides features like calendar management, task tracking, note-tak...
Client OS is used by end-users to interact with the computer while Server OS is used to manage resources and provide services to clients.
Client OS is designed for personal computers and laptops, such as Windows 10, macOS, and Ubuntu.
Server OS is designed for servers, such as Windows Server, Linux Server, and Unix.
Client OS provides a graphical user interface (GUI) for end-users to interact with the computer, while Serv...
I applied via Walk-in and was interviewed in Feb 2022. There were 2 interview rounds.
RJ-45 and RJ-11 connectors differ in the number of pins and the OSI layer they operate on.
RJ-45 has 8 pins while RJ-11 has 4 or 6 pins.
RJ-45 operates on the Physical and Data Link layers of the OSI model.
RJ-11 operates on the Physical layer of the OSI model.
RJ-45 is used for Ethernet connections while RJ-11 is used for telephone connections.
Workgroup is a peer-to-peer network while domain is a centralized network managed by a domain controller.
Workgroup is suitable for small networks while domain is suitable for large networks.
In workgroup, each computer has its own user accounts while in domain, user accounts are managed centrally.
Domain provides better security and easier management of resources.
Workgroup does not have a centralized authentication syste...
To make a bootable pendrive, use a tool like Rufus or Windows Media Creation Tool.
Download and install a bootable USB tool like Rufus or Windows Media Creation Tool
Insert the USB drive and select it in the tool
Select the ISO file or operating system you want to make bootable
Click on the 'Start' button and wait for the process to complete
Once done, restart your computer and boot from the USB drive
I applied via Walk-in and was interviewed before Aug 2022. There were 4 interview rounds.
Women's empowerment
based on 10 reviews
Rating in categories
Desktop Support Engineer
146
salaries
| ₹1.8 L/yr - ₹3.6 L/yr |
System Administrator
75
salaries
| ₹1.8 L/yr - ₹5.6 L/yr |
Associate
70
salaries
| ₹1.6 L/yr - ₹4 L/yr |
Technical Support Engineer
57
salaries
| ₹1.7 L/yr - ₹4.5 L/yr |
Senior Associate
44
salaries
| ₹1.8 L/yr - ₹6 L/yr |
3i Infotech
Microland
Newgen Software Technologies
NSE.IT