Filter interviews by
FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
These roles are responsible for performing specific tasks within the Active Directory environment.
For example, the PDC Emulator role is responsible for time synchronization in the domain.
To create a PST file, you can use Microsoft Outlook or third-party software.
Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.
Name the file and choose a location to save it.
Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.
Make sure to regularly back up your PST files to prevent data loss.
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
Backup work flow , how vss takes backup
Failover and failback are processes used in disaster recovery to switch from a primary system to a secondary system and then back again.
Failover is the process of automatically switching to a secondary system when the primary system fails.
Failback is the process of switching back to the primary system once it is restored.
Examples include using virtualization technology to failover to a backup server in case of hardware...
Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.
Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.
Includes backup strategies, data replication, and testing procedures.
Goal is to minimize downtime and ensure business continuity.
Examples: restoring data from backups after a ransomware attack, switching to a secondary da
I applied via Company Website and was interviewed before Dec 2022. There were 2 interview rounds.
The route cause for rectification when mail is not sent from Outlook application.
Check if there is an issue with the internet connection.
Verify if the email account settings are correct.
Ensure that the email server is functioning properly.
Check if there are any restrictions or limitations set by the email service provider.
Verify if the email is not being blocked by antivirus or firewall software.
Ensure that the email i...
The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.
Incorrect email address: Double-check if the recipient's email address is entered correctly.
Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.
Network problems: Verify if there are any net...
The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).
IMAP is a standard protocol used for accessing and managing email messages on a mail server.
It allows users to access their email from multiple devices while keeping the messages synchronized.
IMAP supports both online and offline modes, allowing users to access and manage their emails even without an active i...
I applied via Naukri.com and was interviewed before Oct 2022. There were 2 interview rounds.
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS servers store a database of domain names and their corresponding IP addresses.
When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.
DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.
DNS records include A records (IPv4 addresses), AAA...
Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.
Email is composed and sent from an email client (e.g. Gmail, Outlook)
The email client connects to an SMTP server to send the email
The SMTP server communicates with the recipient's SMTP server via DNS records
The recipient's SMTP server receives the email and stores it in the recipient's inbox
Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.
Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)
Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)
Port 22 is commonly used for SSH (Secure Shell)
Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)
Port 21 is commonly used for FTP (File Transfer Protocol)
Logix Infosecurity interview questions for popular designations
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Aug 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Top trending discussions
I have over 5 years of experience in customer support roles at various companies.
Managed customer inquiries via phone, email, and chat
Resolved customer complaints and issues in a timely manner
Provided product support and troubleshooting assistance
Collaborated with other departments to ensure customer satisfaction
Trained new customer support representatives
Current CTC is $50,000, Expected CTC is $60,000, Notice period is 30 days.
Current CTC: $50,000
Expected CTC: $60,000
Notice Period: 30 days
Palindrome code should be designed to check if a given string is the same forwards and backwards.
Create a function that takes a string as input
Remove any spaces and punctuation from the string
Reverse the string and compare it to the original string to check if it is a palindrome
ES6 introduced several new features and improvements to JavaScript, making it more powerful and efficient.
Arrow functions for more concise syntax
Let and const for block-scoped variables
Classes for easier object-oriented programming
Template literals for easier string interpolation
Default parameters and rest parameters for function arguments
Destructuring assignment for easier data extraction
Promises for asynchronous prog
Yes, let and const variables are hoisted but not initialized.
let and const variables are hoisted to the top of their block scope, but they are not initialized until the actual line of code is executed.
This means that you cannot access a let or const variable before it is declared in the code.
For example, trying to access a let variable before it is declared will result in a ReferenceError.
Global context refers to the overall environment or setting in which something exists or operates.
Global context encompasses all variables, functions, and objects that are accessible throughout an entire program.
It can be thought of as the 'big picture' view of a program's execution.
In web development, global context includes the window object in JavaScript.
Temporal dead zone is a period during the variable creation process where accessing the variable results in a ReferenceError.
Occurs when trying to access a variable before it has been declared with let or const
Happens due to the variable being in the temporal dead zone until it is declared
Example: accessing a variable before its declaration will result in a ReferenceError
Modules in Node.js are reusable blocks of code that encapsulate related functionality.
Modules in Node.js can be built-in modules like fs (file system) or third-party modules like express.
Modules help in organizing code into separate files for better maintainability and reusability.
Modules can be imported using the require() function in Node.js.
Indexes in MongoDB improve query performance by allowing the database to quickly locate and retrieve specific documents.
Indexes help to speed up query performance by allowing the database to quickly locate specific documents based on the indexed fields.
Without indexes, MongoDB would have to perform a collection scan, which can be slow and resource-intensive.
Indexes can be created on single fields or compound fields to ...
Hooks are a feature in React that allow you to use state and other React features in functional components. useRef is a hook that allows you to create a mutable object that persists for the lifetime of the component.
Hooks are used to add state and lifecycle methods to functional components in React
useRef is used to create a mutable reference that persists between renders
useRef can be used to access DOM elements directl
Mongoose is an Object Data Modeling (ODM) library for MongoDB that provides a higher level of abstraction and simplifies interactions with the database.
Mongoose provides schema validation which helps maintain data integrity.
Mongoose simplifies querying and data manipulation with built-in functions.
Mongoose supports middleware functions for pre and post processing of data operations.
Interview experience
based on 46 reviews
Rating in categories
Technical Support Engineer
40
salaries
| ₹2 L/yr - ₹6 L/yr |
Network Security Engineer
27
salaries
| ₹2.4 L/yr - ₹7 L/yr |
Cyber Security Engineer
20
salaries
| ₹3 L/yr - ₹6.6 L/yr |
Assistant Manager
7
salaries
| ₹6.5 L/yr - ₹14 L/yr |
Senior Engineer
7
salaries
| ₹4.5 L/yr - ₹10.1 L/yr |
QUICK HEAL TECHNOLOGIES
TCS
Wipro
Symantec Software Solutions