i
Movate
Filter interviews by
Day to day work activities involve troubleshooting network issues, configuring devices, and providing technical support to customers.
Troubleshooting network issues
Configuring devices
Providing technical support to customers
I have handled various types of tickets including network connectivity issues, security policy configurations, VPN troubleshooting, and software upgrades.
Network connectivity issues
Security policy configurations
VPN troubleshooting
Software upgrades
I applied via LinkedIn and was interviewed in May 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
TCP and SSL headers are used in network communication to provide reliable and secure data transmission.
TCP header contains source and destination port numbers, sequence and acknowledgment numbers, and control flags.
SSL header contains information about the SSL version, cipher suite, and other parameters for secure communication.
TCP header is 20 bytes long, while SSL header size varies depending on the SSL version and c...
Encryption and deception of packet
Encryption is the process of converting plain text into cipher text to protect data from unauthorized access
Packet deception is a technique used to mislead attackers by sending fake packets to divert their attention
Combining encryption and packet deception can enhance network security by making it difficult for attackers to intercept and decipher data
Tools like honeypots and honeynets
Movate interview questions for designations
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
ARP (Address Resolution Protocol) is used to map a network address (such as an IP address) to a physical address (such as a MAC address).
ARP is used in Ethernet networks to find the MAC address of a device based on its IP address.
When a device needs to send data to another device on the network, it sends an ARP request asking for the MAC address of the destination device.
The destination device responds with its MAC add...
IP and TCP headers explained with purpose of each field
IP header contains source and destination IP addresses, version, header length, type of service, total length, identification, flags, fragment offset, time to live, protocol, header checksum
TCP header contains source and destination port numbers, sequence number, acknowledgement number, data offset, reserved, flags, window size, checksum, urgent pointer
Purpose of e...
IPSEC messages are used for secure communication. Troubleshooting scenarios include connectivity issues and misconfigured settings.
IPSEC messages are used to establish and maintain secure communication between two devices
Common troubleshooting scenarios include connectivity issues, such as failed VPN connections
Misconfigured settings can also cause IPSEC issues, such as incorrect encryption or authentication settings
To...
Get interview-ready with Top Movate Interview Questions
posted on 9 Feb 2015
SQL command for creating a table
Use CREATE TABLE statement
Specify table name and column names with data types
Add any constraints or indexes as needed
SQL commands for inserting, updating, and deleting data from a table.
INSERT INTO table_name (column1, column2, column3) VALUES (value1, value2, value3);
UPDATE table_name SET column1 = new_value1 WHERE condition;
DELETE FROM table_name WHERE condition;
Truncate and drop are SQL commands used to remove data from a table.
Truncate removes all data from a table but keeps the structure intact.
Drop removes the entire table and its structure.
Truncate is faster than drop as it only removes data.
Drop cannot be undone while truncate can be rolled back.
Truncate resets the identity of the table while drop does not.
Examples: TRUNCATE TABLE table_name; DROP TABLE table_name;
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) while C does not.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
I am a software developer with experience in Java and Python.
I have a Bachelor's degree in Computer Science.
I have worked on various projects involving web development and data analysis.
I am proficient in Java and Python programming languages.
I have experience with frameworks such as Spring and Django.
I am familiar with databases such as MySQL and MongoDB.
I have always been fascinated by technology and its ability to solve complex problems.
I enjoy problem-solving and logical thinking
I have a natural curiosity for how things work
I see the potential for technology to make a positive impact on society
I have experience in programming and find it rewarding
I am excited about the constant innovation and evolution in the IT industry
My strengths include problem-solving, adaptability, and teamwork. My weakness is public speaking.
Strengths: problem-solving, adaptability, teamwork
Examples: I have successfully solved complex coding problems, adapted to new technologies quickly, and collaborated effectively with team members.
Weakness: public speaking
Examples: I get nervous when speaking in front of large groups, but I am working on improving my present
I have the technical skills, experience, and passion to excel in this role.
I have a strong background in software development, with expertise in multiple programming languages and frameworks.
I have experience working on complex projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in the industry.
I am a quick learner and adaptable to new ...
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
I am a software developer with experience in multiple programming languages and a passion for problem-solving.
Experienced in Java, C++, and Python
Strong knowledge of data structures and algorithms
Proficient in web development using HTML, CSS, and JavaScript
Familiar with agile development methodologies
Excellent problem-solving and analytical skills
Automation framework is a set of guidelines, standards, and coding practices used to create automated test scripts.
It provides a structured way to develop and maintain automated tests
It includes tools, libraries, and reusable components
It helps in reducing the time and effort required for testing
Examples include Selenium, Appium, and Robot Framework
High severity refers to critical defects that impact the core functionality of the software, while low severity refers to minor issues that have minimal impact on functionality.
High severity issues can cause the software to crash or result in data loss.
Low severity issues are cosmetic or minor usability problems.
From a QA point of view, high severity issues are more critical as they can significantly impact the user ex...
Class is a blueprint for creating objects while interface defines a contract for classes to implement.
A class can have attributes and methods while an interface only has method signatures.
A class can be instantiated while an interface cannot.
A class can only inherit from one class while it can implement multiple interfaces.
Example: Class - Animal, Interface - Flyable
Animal can have attributes like name, age, etc. and m...
Static keyword is used to declare a variable or method that belongs to the class rather than an instance of the class.
Static variables are shared among all instances of a class
Static methods can be called without creating an instance of the class
Static blocks are used to initialize static variables
Static keyword can also be used to create nested classes
Example: public static int count;
Access modifiers control the visibility and accessibility of class members.
Public: accessible from anywhere
Private: accessible only within the class
Protected: accessible within the class and its subclasses
Default: accessible within the same package
Used to enforce encapsulation and prevent unauthorized access
Interface defines only method signatures while abstract class can have both method signatures and implementations.
An interface can be implemented by multiple classes while an abstract class can only be extended by one class.
An abstract class can have constructors while an interface cannot.
An abstract class can have instance variables while an interface cannot.
An abstract class can provide default implementations for so...
A program for login scenario using defined automation architecture.
Identify the elements on the login page such as username, password, and login button
Use automation tools like Selenium to interact with the elements and input data
Verify successful login by checking for expected elements on the landing page
Implement error handling for incorrect login credentials
Use a modular and scalable architecture for maintainability
To store and print numbers from an array using arrayList.
Create an arrayList object
Loop through the array and add each element to the arrayList using add() method
Print the arrayList using toString() method
Example: int[] arr = {1, 2, 3}; ArrayList
Test scenario for download functionality of a songs website
Verify that the download button is visible and clickable
Check that the downloaded file is in the correct format
Ensure that the downloaded file is not corrupted
Test the download speed for different file sizes
Verify that the download progress is displayed to the user
Cache stores data temporarily to reduce server load while cookies store user information for website personalization.
Cache stores frequently accessed data to reduce server load and improve website performance.
Cookies store user information such as login credentials, preferences, and shopping cart items.
Cache is temporary and can be cleared at any time, while cookies can have an expiration date.
Cache is stored on the us...
based on 4 interviews
1 Interview rounds
based on 10 reviews
Rating in categories
Senior Engineer
1.5k
salaries
| ₹2.8 L/yr - ₹12 L/yr |
Technical Support Engineer
1.5k
salaries
| ₹1 L/yr - ₹5.5 L/yr |
Network Engineer
1.1k
salaries
| ₹1 L/yr - ₹9 L/yr |
Engineer
1.1k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Specialist
322
salaries
| ₹4.4 L/yr - ₹18.9 L/yr |
DXC Technology
Virtusa Consulting Services
CGI Group
Optum Global Solutions