Filter interviews by
I applied via Monster and was interviewed in Jan 2024. There was 1 interview round.
Compliance used in BPO include data protection laws, industry regulations, and company policies.
Data protection laws such as GDPR and HIPAA
Industry regulations like PCI DSS for payment processing
Company policies on confidentiality and information security
I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.
Yes, I have knowledge of Windows OS configuration.
I am familiar with configuring network settings, such as IP addresses and DNS servers.
I know how to manage user accounts and permissions.
I am experienced in installing and updating software and drivers.
I am proficient in troubleshooting common issues, such as blue screens and slow performance.
I am knowledgeable in configuring security settings, such as firewalls and ant
Yes, I have completed network training.
I have completed courses in CCNA, CCNP, and CompTIA Network+.
I have also attended workshops on network security and troubleshooting.
I keep myself updated with the latest technologies and industry trends.
Yes, I have completed the CCNA certification.
I have a strong understanding of networking concepts and protocols.
I am proficient in configuring and troubleshooting Cisco routers and switches.
I have experience in designing and implementing network solutions.
I am familiar with network security and have knowledge of VPNs and firewalls.
Yes, I have plans to pursue CCNA certification in the near future.
I have already started studying for the CCNA exam
I believe that obtaining the CCNA certification will enhance my skills and knowledge in network engineering
I plan to take the exam within the next 6 months
STP stands for Spanning Tree Protocol. It is used to prevent loops in a network and ensure redundancy.
STP is a protocol used in network switches to prevent loops in a network.
It ensures that there is only one active path between any two network devices.
STP works by creating a tree-like structure of the network, with one root bridge and multiple branches.
If a link fails, STP will automatically reroute traffic to an alte...
HSRP is a protocol used to provide redundancy for IP networks. It allows two or more routers to share a virtual IP address.
Configure HSRP on two or more routers with the same group number and virtual IP address
One router is elected as the active router and forwards packets sent to the virtual IP address
The other router(s) are in standby mode and take over if the active router fails
HSRP can be used to provide default ga...
VLANs are used to logically separate network traffic and improve network performance and security.
VLANs allow for better network management and organization by grouping devices based on their function or location.
They also reduce network congestion by limiting broadcast traffic to devices within the same VLAN.
VLANs can improve network security by isolating sensitive data or devices from the rest of the network.
For exam...
Firewalls are used to protect networks from unauthorized access and have features like packet filtering, NAT, VPN, and IDS/IPS.
Firewalls prevent unauthorized access to a network by filtering incoming and outgoing traffic based on predefined rules.
They can also perform Network Address Translation (NAT) to hide the internal IP addresses from external networks.
Firewalls can establish Virtual Private Networks (VPNs) to sec...
L2 switches operate at the data link layer and L3 switches operate at the network layer of the OSI model.
L2 switches forward traffic based on MAC addresses while L3 switches forward traffic based on IP addresses.
L2 switches are used for LANs while L3 switches are used for both LANs and WANs.
L2 switches are simpler and less expensive than L3 switches.
L3 switches can perform routing functions while L2 switches cannot.
Exa...
Routers are used to connect different networks together and route traffic between them.
Routers provide network segmentation and security by separating broadcast domains.
They can also prioritize traffic and optimize network performance.
Examples of routers include Cisco, Juniper, and MikroTik.
Routers are essential for connecting to the internet and accessing remote networks.
I appeared for an interview before Feb 2024.
Kserve Bpo interview questions for popular designations
I applied via Walk-in and was interviewed in Sep 2021. There were 2 interview rounds.
I applied via Apna Jobs and was interviewed before May 2021. There were 2 interview rounds.
I applied via Referral and was interviewed before Jan 2020. There were 3 interview rounds.
I appeared for an interview before Nov 2016.
I am a dedicated and experienced consultant with a strong background in problem-solving and client management.
Over 5 years of experience in consulting roles
Skilled in analyzing data and providing strategic recommendations
Excellent communication and interpersonal skills
Proven track record of successfully managing client relationships
Strong ability to work in fast-paced environments and meet deadlines
I appeared for an interview in May 2017.
I appeared for an interview before Jun 2016.
I am a passionate software developer with 5 years of experience in web development and a strong background in computer science.
5 years of experience in web development
Strong background in computer science
Passionate about software development
To separate personal and professional calls, and to ensure availability and accessibility.
Separate personal and professional calls
Ensure availability and accessibility
Maintain work-life balance
Avoid mixing personal and work-related contacts
based on 8 interviews
Interview experience
based on 108 reviews
Rating in categories
Customer Service Executive
38
salaries
| ₹1.2 L/yr - ₹4 L/yr |
Team Lead
27
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Customer Response Executive
22
salaries
| ₹1.4 L/yr - ₹4.4 L/yr |
Customer Service Representative
16
salaries
| ₹1.4 L/yr - ₹2.3 L/yr |
Customer Care Executive
15
salaries
| ₹1.5 L/yr - ₹2.4 L/yr |
Genpact
WNS
EXL Service
HGS