Logix Infosecurity
10+ Syncom Formulations India Interview Questions and Answers
Q1. What type of protocol will use for mail id configuration in PC/Mobile device and its trouble shootings related queries
The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).
IMAP is a standard protocol used for accessing and managing email messages on a mail server.
It allows users to access their email from multiple devices while keeping the messages synchronized.
IMAP supports both online and offline modes, allowing users to access and manage their emails even without an active internet connection.
Common troubleshooting queries related ...read more
Q2. If mail not sent from Outlook application, what is the route cause for rectification
The route cause for rectification when mail is not sent from Outlook application.
Check if there is an issue with the internet connection.
Verify if the email account settings are correct.
Ensure that the email server is functioning properly.
Check if there are any restrictions or limitations set by the email service provider.
Verify if the email is not being blocked by antivirus or firewall software.
Ensure that the email is not stuck in the Outbox folder.
Check if there are any is...read more
Q3. If mail is not reached to recipient, then what will be the route cause to rectification
The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.
Incorrect email address: Double-check if the recipient's email address is entered correctly.
Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.
Network problems: Verify if there are any network issues that could be preventing the mail from being d...read more
Q4. How Dns work ?
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS servers store a database of domain names and their corresponding IP addresses.
When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.
DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.
DNS records include A records (IPv4 addresses), AAAA records (IPv6 addresses), MX records (mail servers), and...read more
Q5. How email is sent
Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.
Email is composed and sent from an email client (e.g. Gmail, Outlook)
The email client connects to an SMTP server to send the email
The SMTP server communicates with the recipient's SMTP server via DNS records
The recipient's SMTP server receives the email and stores it in the recipient's inbox
Q6. Which ports are used
Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.
Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)
Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)
Port 22 is commonly used for SSH (Secure Shell)
Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)
Port 21 is commonly used for FTP (File Transfer Protocol)
Q7. What failover and failback
Failover and failback are processes used in disaster recovery to switch from a primary system to a secondary system and then back again.
Failover is the process of automatically switching to a secondary system when the primary system fails.
Failback is the process of switching back to the primary system once it is restored.
Examples include using virtualization technology to failover to a backup server in case of hardware failure, and then failing back once the primary server is...read more
Q8. What is disaster recovery
Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.
Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.
Includes backup strategies, data replication, and testing procedures.
Goal is to minimize downtime and ensure business continuity.
Examples: restoring data from backups after a ransomware attack, switching to a secondary data center after a power outage.
Q9. What is fsmo role.
FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
These roles are responsible for performing specific tasks within the Active Directory environment.
For example, the PDC Emulator role is responsible for time synchronization in the domain.
Q10. How can creat PST.
To create a PST file, you can use Microsoft Outlook or third-party software.
Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.
Name the file and choose a location to save it.
Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.
Make sure to regularly back up your PST files to prevent data loss.
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month