Filter interviews by
FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
These roles are responsible for performing specific tasks within the Active Directory environment.
For example, the PDC Emulator role is responsible for time synchronization in the domain.
To create a PST file, you can use Microsoft Outlook or third-party software.
Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.
Name the file and choose a location to save it.
Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.
Make sure to regularly back up your PST files to prevent data loss.
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
Backup work flow , how vss takes backup
Failover and failback are processes used in disaster recovery to switch from a primary system to a secondary system and then back again.
Failover is the process of automatically switching to a secondary system when the primary system fails.
Failback is the process of switching back to the primary system once it is restored.
Examples include using virtualization technology to failover to a backup server in case of hardware...
Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.
Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.
Includes backup strategies, data replication, and testing procedures.
Goal is to minimize downtime and ensure business continuity.
Examples: restoring data from backups after a ransomware attack, switching to a secondary da
I was interviewed before Feb 2024.
I applied via Company Website and was interviewed before Dec 2022. There were 2 interview rounds.
The route cause for rectification when mail is not sent from Outlook application.
Check if there is an issue with the internet connection.
Verify if the email account settings are correct.
Ensure that the email server is functioning properly.
Check if there are any restrictions or limitations set by the email service provider.
Verify if the email is not being blocked by antivirus or firewall software.
Ensure that the email i...
The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.
Incorrect email address: Double-check if the recipient's email address is entered correctly.
Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.
Network problems: Verify if there are any net...
The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).
IMAP is a standard protocol used for accessing and managing email messages on a mail server.
It allows users to access their email from multiple devices while keeping the messages synchronized.
IMAP supports both online and offline modes, allowing users to access and manage their emails even without an active i...
Logix Infosecurity interview questions for popular designations
I applied via Naukri.com and was interviewed before Oct 2022. There were 2 interview rounds.
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS servers store a database of domain names and their corresponding IP addresses.
When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.
DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.
DNS records include A records (IPv4 addresses), AAA...
Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.
Email is composed and sent from an email client (e.g. Gmail, Outlook)
The email client connects to an SMTP server to send the email
The SMTP server communicates with the recipient's SMTP server via DNS records
The recipient's SMTP server receives the email and stores it in the recipient's inbox
Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.
Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)
Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)
Port 22 is commonly used for SSH (Secure Shell)
Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)
Port 21 is commonly used for FTP (File Transfer Protocol)
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Aug 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Top trending discussions
I was interviewed in Feb 2025.
Three questions to be solved out of five.
One assignment project will be submitted within seven days.
Palindrome code should be designed to check if a given string is the same forwards and backwards.
Create a function that takes a string as input
Remove any spaces and punctuation from the string
Reverse the string and compare it to the original string to check if it is a palindrome
Some of the top questions asked at the Logix Infosecurity interview -
based on 6 interviews
Interview experience
based on 48 reviews
Rating in categories
Technical Support Engineer
40
salaries
| ₹2 L/yr - ₹6 L/yr |
Network Security Engineer
25
salaries
| ₹3 L/yr - ₹7.5 L/yr |
Cyber Security Engineer
22
salaries
| ₹3 L/yr - ₹6.6 L/yr |
Assistant Manager
7
salaries
| ₹6.5 L/yr - ₹14 L/yr |
Senior Engineer
7
salaries
| ₹4.5 L/yr - ₹10.1 L/yr |
QUICK HEAL TECHNOLOGIES
TCS
Wipro
Symantec Software Solutions