Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by Logix Infosecurity Team. If you also belong to the team, you can get access from here

Logix Infosecurity

Compare button icon Compare button icon Compare

Filter interviews by

Logix Infosecurity Interview Questions and Answers

Updated 18 Feb 2025
Popular Designations

13 Interview questions

A Cloud Engineer was asked 9mo ago
Q. How can you create a PST file?
Ans. 

To create a PST file, you can use Microsoft Outlook or third-party software.

  • Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.

  • Name the file and choose a location to save it.

  • Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.

  • Make sure to regularly back up your PST files to prevent data loss.

View all Cloud Engineer interview questions
A Cloud Engineer was asked 9mo ago
Q. What is an FSMO role?
Ans. 

FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.

  • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • These roles are responsible for performing specific tasks within the Active Directory environment.

  • For example, the PDC Emulator role is responsible for time synchronization in the domain.

View all Cloud Engineer interview questions
A Backup Administrator was asked
Q. What is disaster recovery?
Ans. 

Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.

  • Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.

  • Includes backup strategies, data replication, and testing procedures.

  • Goal is to minimize downtime and ensure business continuity.

  • Examples: restoring data from backups after a ransomware attack, switching to a seconda...

View all Backup Administrator interview questions
A Technical Support Engineer was asked
Q. What type of protocol is used for mail ID configuration in PC/Mobile devices, and what are some troubleshooting queries related to it?
Ans. 

The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).

  • IMAP is a standard protocol used for accessing and managing email messages on a mail server.

  • It allows users to access their email from multiple devices while keeping the messages synchronized.

  • IMAP supports both online and offline modes, allowing users to access and manage their emails even without an act...

View all Technical Support Engineer interview questions
A Technical Support Engineer was asked
Q. If an email is not sent from the Outlook application, what could be the root cause and how would you rectify it?
Ans. 

The route cause for rectification when mail is not sent from Outlook application.

  • Check if there is an issue with the internet connection.

  • Verify if the email account settings are correct.

  • Ensure that the email server is functioning properly.

  • Check if there are any restrictions or limitations set by the email service provider.

  • Verify if the email is not being blocked by antivirus or firewall software.

  • Ensure that the em...

View all Technical Support Engineer interview questions
A Technical Support Engineer was asked
Q. If an email is not delivered to the recipient, what are the possible root causes and how would you rectify them?
Ans. 

The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.

  • Incorrect email address: Double-check if the recipient's email address is entered correctly.

  • Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.

  • Network problems: Verify if there are an...

View all Technical Support Engineer interview questions
A Technical Support Engineer was asked
Q. How does DNS work?
Ans. 

DNS (Domain Name System) is a system that translates domain names to IP addresses.

  • DNS servers store a database of domain names and their corresponding IP addresses.

  • When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.

  • DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.

  • DNS records include A records (IPv4 addresses)...

View all Technical Support Engineer interview questions
Are these interview questions helpful?
A Technical Support Engineer was asked
Q. How is email sent?
Ans. 

Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.

  • Email is composed and sent from an email client (e.g. Gmail, Outlook)

  • The email client connects to an SMTP server to send the email

  • The SMTP server communicates with the recipient's SMTP server via DNS records

  • The recipient's SMTP server receives the email and stores it in the recipient's inbox

View all Technical Support Engineer interview questions
A Technical Support Engineer was asked
Q. Which ports are used?
Ans. 

Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.

  • Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)

  • Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)

  • Port 22 is commonly used for SSH (Secure Shell)

  • Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)

  • Port 21 is commonly used for FTP (File Transfer Protocol)

View all Technical Support Engineer interview questions
A Technical Support Engineer was asked
Q. What technical knowledge is required for this role?
Ans. 

Technical knowledge for a Technical Support Engineer includes troubleshooting, software knowledge, and customer service skills.

  • Understanding of operating systems (e.g., Windows, Linux) for troubleshooting issues.

  • Familiarity with networking concepts (e.g., TCP/IP, DNS) to resolve connectivity problems.

  • Knowledge of software applications relevant to the company’s products (e.g., CRM software).

  • Experience with ticketin...

View all Technical Support Engineer interview questions

Logix Infosecurity Interview Experiences

8 interviews found

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed before Dec 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
View all tips
Round 2 - Technical 

(3 Questions)

  • Q1. If mail not sent from Outlook application, what is the route cause for rectification
  • Ans. 

    The route cause for rectification when mail is not sent from Outlook application.

    • Check if there is an issue with the internet connection.

    • Verify if the email account settings are correct.

    • Ensure that the email server is functioning properly.

    • Check if there are any restrictions or limitations set by the email service provider.

    • Verify if the email is not being blocked by antivirus or firewall software.

    • Ensure that the email i...

  • Answered by AI
  • Q2. If mail is not reached to recipient, then what will be the route cause to rectification
  • Ans. 

    The route cause for mail not reaching the recipient can be due to various factors such as incorrect email address, server issues, network problems, or spam filters.

    • Incorrect email address: Double-check if the recipient's email address is entered correctly.

    • Server issues: Check if the sender's email server or the recipient's email server is experiencing any technical problems.

    • Network problems: Verify if there are any net...

  • Answered by AI
  • Q3. What type of protocol will use for mail id configuration in PC/Mobile device and its trouble shootings related queries
  • Ans. 

    The protocol used for mail ID configuration in PC/Mobile devices is the Internet Message Access Protocol (IMAP).

    • IMAP is a standard protocol used for accessing and managing email messages on a mail server.

    • It allows users to access their email from multiple devices while keeping the messages synchronized.

    • IMAP supports both online and offline modes, allowing users to access and manage their emails even without an active i...

  • Answered by AI

Skills evaluated in this interview

Cloud Engineer Interview Questions & Answers

user image VIKASH YADAV

posted on 9 Sep 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What is fsmo role.
  • Ans. 

    FSMO (Flexible Single Master Operations) roles are specialized Active Directory domain controller tasks.

    • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

    • These roles are responsible for performing specific tasks within the Active Directory environment.

    • For example, the PDC Emulator role is responsible for time synchronization in the domain.

  • Answered by AI
  • Q2. How can creat PST.
  • Ans. 

    To create a PST file, you can use Microsoft Outlook or third-party software.

    • Open Microsoft Outlook and go to 'File' > 'New' > 'Outlook Data File'. Choose the PST format.

    • Name the file and choose a location to save it.

    • Alternatively, you can use third-party software like Stellar Converter for PST to create PST files.

    • Make sure to regularly back up your PST files to prevent data loss.

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.

Round 1 - Case Study 

Backup work flow , how vss takes backup

Round 2 - Technical 

(2 Questions)

  • Q1. What failover and failback
  • Ans. 

    Failover and failback are processes used in disaster recovery to switch from a primary system to a secondary system and then back again.

    • Failover is the process of automatically switching to a secondary system when the primary system fails.

    • Failback is the process of switching back to the primary system once it is restored.

    • Examples include using virtualization technology to failover to a backup server in case of hardware...

  • Answered by AI
  • Q2. What is disaster recovery
  • Ans. 

    Disaster recovery is the process of restoring data, applications, and systems after a disruptive event.

    • Involves creating a plan to recover from natural disasters, cyber attacks, hardware failures, etc.

    • Includes backup strategies, data replication, and testing procedures.

    • Goal is to minimize downtime and ensure business continuity.

    • Examples: restoring data from backups after a ransomware attack, switching to a secondary da...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Please study backup process.

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I appeared for an interview before Feb 2024.

Round 1 - Technical 

(2 Questions)

  • Q1. How DNS Work, Outlook Congratulation and its trouble shootings
  • Ans. 

    DNS is a system that translates domain names to IP addresses. Outlook configuration can have various troubleshooting steps.

    • DNS translates domain names to IP addresses

    • Outlook configuration troubleshooting includes checking server settings, account credentials, and network connectivity

    • Common DNS issues include incorrect DNS settings, DNS server downtime, and DNS cache poisoning

  • Answered by AI
  • Q2. What is MX, DMARC, SPF, DKIM and how its work
  • Ans. 

    MX, DMARC, SPF, and DKIM are email authentication protocols used to prevent email spoofing and phishing attacks.

    • MX (Mail Exchange) records specify the mail servers responsible for receiving email on behalf of a domain.

    • DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a policy that helps prevent email spoofing.

    • SPF (Sender Policy Framework) validates that an email message comes from an authorized...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Who want to learn more skills on linux, VM ware and E-mail security and firewall. They can preferably select and work here
Interview experience
1
Bad
Difficulty level
Moderate
Process Duration
More than 8 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Oct 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(4 Questions)

  • Q1. Basics about email
  • Q2. How Dns work ?
  • Ans. 

    DNS (Domain Name System) is a system that translates domain names to IP addresses.

    • DNS servers store a database of domain names and their corresponding IP addresses.

    • When a user types a domain name in a web browser, the DNS server is queried to find the corresponding IP address.

    • DNS uses a hierarchical system of servers to efficiently resolve domain names to IP addresses.

    • DNS records include A records (IPv4 addresses), AAA...

  • Answered by AI
  • Q3. How email is sent
  • Ans. 

    Email is sent through a series of steps involving SMTP servers, DNS records, and email clients.

    • Email is composed and sent from an email client (e.g. Gmail, Outlook)

    • The email client connects to an SMTP server to send the email

    • The SMTP server communicates with the recipient's SMTP server via DNS records

    • The recipient's SMTP server receives the email and stores it in the recipient's inbox

  • Answered by AI
  • Q4. Which ports are used
  • Ans. 

    Various ports are used for different purposes in networking, such as port 80 for HTTP and port 443 for HTTPS.

    • Port 80 is commonly used for HTTP (Hypertext Transfer Protocol)

    • Port 443 is commonly used for HTTPS (Hypertext Transfer Protocol Secure)

    • Port 22 is commonly used for SSH (Secure Shell)

    • Port 25 is commonly used for SMTP (Simple Mail Transfer Protocol)

    • Port 21 is commonly used for FTP (File Transfer Protocol)

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Logix Infosecurity Technical Support Engineer interview:
  • email
Interview preparation tips for other job seekers - Don't go worst culture to work

If you are fresher and ready to give all your time and leave personal time can go

Have seen egoism rulling and manager want you to go "hanji and adore them"

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Aug 2022. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(1 Question)

  • Q1. All your basic information
Round 3 - Technical 

(1 Question)

  • Q1. Basic security related questions
Round 4 - One-on-one 

(1 Question)

  • Q1. Hard questions by manager

Interview Preparation Tips

Interview preparation tips for other job seekers - If you only looking for only money please don't come here. This is best place gain Knowledge and get practical experience in cyber security market

I applied via Recruitment Consultant and was interviewed before Aug 2020. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. Basic Networking questions, what are the email protocols, how Email works, what are the reasons of mail bounce, explain mail flow, etc.

Interview Preparation Tips

Interview preparation tips for other job seekers - This interview would be more focusing on Email ralated questions, as this company basically providing Anti Threat Protection services related to mails and it is working mail security and administration field.

I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Technical knowledge required here is?
  • Ans. 

    Technical knowledge for a Technical Support Engineer includes troubleshooting, software knowledge, and customer service skills.

    • Understanding of operating systems (e.g., Windows, Linux) for troubleshooting issues.

    • Familiarity with networking concepts (e.g., TCP/IP, DNS) to resolve connectivity problems.

    • Knowledge of software applications relevant to the company’s products (e.g., CRM software).

    • Experience with ticketing sys...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - you must have email service, email security, firewall, network knowledge to work.

Top trending discussions

View All
Interview Tips & Stories
2w
toobluntforu
·
works at
Cvent
Can speak English, can’t deliver in interviews
I feel like I can't speak fluently during interviews. I do know english well and use it daily to communicate, but the moment I'm in an interview, I just get stuck. since it's not my first language, I struggle to express what I actually feel. I know the answer in my head, but I just can’t deliver it properly at that moment. Please guide me
Got a question about Logix Infosecurity?
Ask anonymously on communities.

Interview questions from similar companies

Interview Questionnaire 

1 Question

  • Q1. Questions regards node js and java script concept, event loop, why node is single threaded, how event loop works in node js, database queries and previous work experience.

Interview Preparation Tips

Interview preparation tips for other job seekers - Interview experience was absolutely amazing and fantastic.
Advice:
Answer question with confidence.
Feel comfortable with interviewer.

I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.

Interview Questionnaire 

4 Questions

  • Q1. To find if a number is Prime or not and optimise your written code.
  • Ans. 

    Check if a number is prime and optimize the code.

    • Start by checking if the number is less than 2, in which case it is not prime.

    • Iterate from 2 to the square root of the number and check if any of them divide the number evenly.

    • If a divisor is found, the number is not prime. Otherwise, it is prime.

  • Answered by AI
  • Q2. Css question related to flex box, Grid and cross browser compatibility
  • Q3. To call an API in react and optimise your written code.
  • Ans. 

    To optimise API calls in React, use asynchronous functions and caching techniques.

    • Use async/await to handle API calls

    • Implement caching to reduce network requests

    • Use memoization to avoid unnecessary re-renders

    • Consider using a state management library like Redux

    • Use performance profiling tools like React DevTools

  • Answered by AI
  • Q4. Questions on JS concepts like Objects and Prototype Inheritance.

Interview Preparation Tips

Interview preparation tips for other job seekers - Know your basic concepts and prepare well for the interview.

Skills evaluated in this interview

Logix Infosecurity Interview FAQs

How many rounds are there in Logix Infosecurity interview?
Logix Infosecurity interview process usually has 2 rounds. The most common rounds in the Logix Infosecurity interview process are Technical, Resume Shortlist and One-on-one Round.
How to prepare for Logix Infosecurity interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Logix Infosecurity. The most common topics and skills that interviewers at Logix Infosecurity expect are Troubleshooting, IT Sales, DNS, Network Security and Procurement.
What are the top questions asked in Logix Infosecurity interview?

Some of the top questions asked at the Logix Infosecurity interview -

  1. What type of protocol will use for mail id configuration in PC/Mobile device an...read more
  2. If mail not sent from Outlook application, what is the route cause for rectific...read more
  3. If mail is not reached to recipient, then what will be the route cause to recti...read more

Tell us how to improve this page.

Overall Interview Experience Rating

4.3/5

based on 6 interview experiences

Difficulty level

Moderate 100%

Duration

Less than 2 weeks 80%
More than 8 weeks 20%
View more

Interview Questions from Similar Companies

Webdew Interview Questions
4.5
 • 108 Interviews
HyScaler Interview Questions
4.5
 • 104 Interviews
Snovasys Interview Questions
4.0
 • 38 Interviews
Quantsapp Interview Questions
2.9
 • 36 Interviews
NexTurn Interview Questions
4.1
 • 34 Interviews
View all

Logix Infosecurity Reviews and Ratings

based on 52 reviews

3.8/5

Rating in categories

4.1

Skill development

3.7

Work-life balance

3.7

Salary

4.3

Job security

3.6

Company culture

3.6

Promotions

3.6

Work satisfaction

Explore 52 Reviews and Ratings
Service Desk Support Co-Ordinator (Email Service)

Navi Mumbai,

Mahape

0-3 Yrs

₹ 1-4 LPA

Engineer - Cybersecurity L2

Navi Mumbai

3-7 Yrs

Not Disclosed

Field IT Sales Manager

Chennai

0-5 Yrs

₹ 3-6.5 LPA

Explore more jobs
Technical Support Engineer
34 salaries
unlock blur

₹2 L/yr - ₹6 L/yr

Cyber Security Engineer
32 salaries
unlock blur

₹3 L/yr - ₹6.6 L/yr

Network Security Engineer
29 salaries
unlock blur

₹3 L/yr - ₹8 L/yr

Assistant Manager
7 salaries
unlock blur

₹6.5 L/yr - ₹14 L/yr

Technical Engineer
7 salaries
unlock blur

₹2.4 L/yr - ₹7 L/yr

Explore more salaries
Compare Logix Infosecurity with

Zidio Development

4.5
Compare

Northcorp Software

4.5
Compare

Accel Frontline

4.1
Compare

Elentec Power India (EPI) Pvt. Ltd.

3.8
Compare
write
Share an Interview