i
Logix Infosecurity
Filter interviews by
To create a PST file, you can use Microsoft Outlook or third-party software.
Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.
Name the file and choose a location to save it.
Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.
Make sure to regularly back up your PST files to prevent data loss.
FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
These roles are responsible for performing specific tasks within the Active Directory environment.
For example, the PDC Emulator role is responsible for time synchronization in the domain.
Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.
Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.
Includes backup strategies, data replication, and testing procedures.
Goal is to minimize downtime and ensure business continuity.
Examples: restoring data from backups after a ransomware attack, switching to a seconda...
The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).
IMAP is a standard protocol used for accessing and managing email messages on a mail server.
It allows users to access their email from multiple devices while keeping the messages synchronized.
IMAP supports both online and offline modes, allowing users to access and manage their emails even without an act...
The route cause for rectification when mail is not sent from Outlook application.
Check if there is an issue with the internet connection.
Verify if the email account settings are correct.
Ensure that the email server is functioning properly.
Check if there are any restrictions or limitations set by the email service provider.
Verify if the email is not being blocked by antivirus or firewall software.
Ensure that the em...
The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.
Incorrect email address: Double-check if the recipient's email address is entered correctly.
Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.
Network problems: Verify if there are an...
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS servers store a database of domain names and their corresponding IP addresses.
When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.
DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.
DNS records include A records (IPv4 addresses)...
Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.
Email is composed and sent from an email client (e.g. Gmail, Outlook)
The email client connects to an SMTP server to send the email
The SMTP server communicates with the recipient's SMTP server via DNS records
The recipient's SMTP server receives the email and stores it in the recipient's inbox
Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.
Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)
Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)
Port 22 is commonly used for SSH (Secure Shell)
Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)
Port 21 is commonly used for FTP (File Transfer Protocol)
Technical knowledge for a Technical Support Engineer includes troubleshooting, software knowledge, and customer service skills.
Understanding of operating systems (e.g., Windows, Linux) for troubleshooting issues.
Familiarity with networking concepts (e.g., TCP/IP, DNS) to resolve connectivity problems.
Knowledge of software applications relevant to the company’s products (e.g., CRM software).
Experience with ticketin...
I applied via Company Website and was interviewed before Dec 2022. There were 2 interview rounds.
The route cause for rectification when mail is not sent from Outlook application.
Check if there is an issue with the internet connection.
Verify if the email account settings are correct.
Ensure that the email server is functioning properly.
Check if there are any restrictions or limitations set by the email service provider.
Verify if the email is not being blocked by antivirus or firewall software.
Ensure that the email i...
The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.
Incorrect email address: Double-check if the recipient's email address is entered correctly.
Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.
Network problems: Verify if there are any net...
The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).
IMAP is a standard protocol used for accessing and managing email messages on a mail server.
It allows users to access their email from multiple devices while keeping the messages synchronized.
IMAP supports both online and offline modes, allowing users to access and manage their emails even without an active i...
FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
These roles are responsible for performing specific tasks within the Active Directory environment.
For example, the PDC Emulator role is responsible for time synchronization in the domain.
To create a PST file, you can use Microsoft Outlook or third-party software.
Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.
Name the file and choose a location to save it.
Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.
Make sure to regularly back up your PST files to prevent data loss.
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
Backup work flow , how vss takes backup
Failover and failback are processes used in disaster recovery to switch from a primary system to a secondary system and then back again.
Failover is the process of automatically switching to a secondary system when the primary system fails.
Failback is the process of switching back to the primary system once it is restored.
Examples include using virtualization technology to failover to a backup server in case of hardware...
Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.
Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.
Includes backup strategies, data replication, and testing procedures.
Goal is to minimize downtime and ensure business continuity.
Examples: restoring data from backups after a ransomware attack, switching to a secondary da...
I appeared for an interview before Feb 2024.
DNS is a system that translates domain names to IP addresses. Outlook configuration can have various troubleshooting steps.
DNS translates domain names to IP addresses
Outlook configuration troubleshooting includes checking server settings, account credentials, and network connectivity
Common DNS issues include incorrect DNS settings, DNS server downtime, and DNS cache poisoning
MX, DMARC, SPF, and DKIM are email authentication protocols used to prevent email spoofing and phishing attacks.
MX (Mail Exchange) records specify the mail servers responsible for receiving email on behalf of a domain.
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a policy that helps prevent email spoofing.
SPF (Sender Policy Framework) validates that an email message comes from an authorized...
I applied via Naukri.com and was interviewed before Oct 2022. There were 2 interview rounds.
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS servers store a database of domain names and their corresponding IP addresses.
When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.
DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.
DNS records include A records (IPv4 addresses), AAA...
Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.
Email is composed and sent from an email client (e.g. Gmail, Outlook)
The email client connects to an SMTP server to send the email
The SMTP server communicates with the recipient's SMTP server via DNS records
The recipient's SMTP server receives the email and stores it in the recipient's inbox
Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.
Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)
Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)
Port 22 is commonly used for SSH (Secure Shell)
Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)
Port 21 is commonly used for FTP (File Transfer Protocol)
I applied via Naukri.com and was interviewed before Aug 2022. There were 4 interview rounds.
I applied via Recruitment Consultant and was interviewed before Aug 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Technical knowledge for a Technical Support Engineer includes troubleshooting, software knowledge, and customer service skills.
Understanding of operating systems (e.g., Windows, Linux) for troubleshooting issues.
Familiarity with networking concepts (e.g., TCP/IP, DNS) to resolve connectivity problems.
Knowledge of software applications relevant to the company’s products (e.g., CRM software).
Experience with ticketing sys...
Top trending discussions
posted on 25 Aug 2021
posted on 19 Nov 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
Check if a number is prime and optimize the code.
Start by checking if the number is less than 2, in which case it is not prime.
Iterate from 2 to the square root of the number and check if any of them divide the number evenly.
If a divisor is found, the number is not prime. Otherwise, it is prime.
To optimise API calls in React, use asynchronous functions and caching techniques.
Use async/await to handle API calls
Implement caching to reduce network requests
Use memoization to avoid unnecessary re-renders
Consider using a state management library like Redux
Use performance profiling tools like React DevTools
Some of the top questions asked at the Logix Infosecurity interview -
based on 6 interview experiences
Difficulty level
Duration
based on 52 reviews
Rating in categories
Technical Support Engineer
34
salaries
| ₹2 L/yr - ₹6 L/yr |
Cyber Security Engineer
32
salaries
| ₹3 L/yr - ₹6.6 L/yr |
Network Security Engineer
29
salaries
| ₹3 L/yr - ₹8 L/yr |
Assistant Manager
7
salaries
| ₹6.5 L/yr - ₹14 L/yr |
Technical Engineer
7
salaries
| ₹2.4 L/yr - ₹7 L/yr |
Zidio Development
Northcorp Software
Accel Frontline
Elentec Power India (EPI) Pvt. Ltd.