Add office photos
Employer?
Claim Account for FREE

Rackspace

3.8
based on 607 Reviews
Video summary
Filter interviews by

60+ Express Logistics Interview Questions and Answers

Updated 18 Sep 2024

Q1. Where would you go to review windows events/logs? What kind of events would you see in each log App/security/system?

Ans.

Windows events/logs can be reviewed in Event Viewer. App log shows application events, Security log shows security-related events, and System log shows system events.

  • Open Event Viewer by typing 'eventvwr' in the Run dialog box

  • Application log shows events related to applications and programs

  • Security log shows events related to security, such as logon attempts and resource access

  • System log shows events related to the operating system, such as driver failures and system crashes

Add your answer

Q2. What is load average in Linux? What is the command and path for the same?

Ans.

Load average is the average number of processes waiting to run on a CPU. Command: 'uptime' or 'top'.

  • Load average is a measure of system utilization.

  • It is the average number of processes waiting to run on a CPU.

  • It is calculated over a period of time, usually 1, 5, and 15 minutes.

  • High load average indicates that the system is overloaded.

  • Command to check load average: 'uptime' or 'top'.

  • Path for 'uptime': /usr/bin/uptime

  • Path for 'top': /usr/bin/top

Add your answer

Q3. Why would you choose a Cloud solution over a "traditional" dedicated solution?

Ans.

Cloud solutions offer scalability, flexibility, and cost-effectiveness compared to traditional dedicated solutions.

  • Scalability: Cloud solutions can easily scale up or down based on demand.

  • Flexibility: Cloud solutions offer more flexibility in terms of customization and integration with other services.

  • Cost-effectiveness: Cloud solutions can be more cost-effective as they eliminate the need for expensive hardware and maintenance costs.

  • Examples: AWS, Azure, Google Cloud Platform

Add your answer

Q4. Difference between public and private cloud? Which one is more secure and why?

Ans.

Public cloud is shared by multiple organizations while private cloud is dedicated to a single organization. Private cloud is more secure.

  • Public cloud is accessible to anyone on the internet while private cloud is accessible only to authorized users.

  • Public cloud is less secure as it is shared by multiple organizations and there is a risk of data breaches.

  • Private cloud is more secure as it is dedicated to a single organization and has more control over security measures.

  • Example...read more

Add your answer
Discover Express Logistics interview dos and don'ts from real experiences

Q5. What is a Cron job and set it up process in Linux?

Ans.

A Cron job is a scheduled task that runs automatically at specified intervals in Linux.

  • Cron is a time-based job scheduler in Linux.

  • It is used to automate repetitive tasks like backups, updates, etc.

  • Cron jobs are defined in a crontab file.

  • The syntax for setting up a Cron job is: * * * * * command-to-be-executed

  • The five asterisks represent the minute, hour, day of the month, month, and day of the week respectively.

  • For example, to run a script every day at 3 AM, the syntax would...read more

Add your answer

Q6. What is All path down & permanent device loss? How to troubleshoot or which log to check for the event/ sense code?

Ans.

All path down is a condition where all paths to a storage device become unavailable. Permanent device loss refers to a situation where a storage device is permanently inaccessible.

  • All path down occurs when all paths to a storage device fail, resulting in loss of connectivity.

  • Permanent device loss happens when a storage device becomes permanently inaccessible due to hardware failure or other issues.

  • To troubleshoot all path down, check the host logs for any error messages relat...read more

View 1 answer
Are these interview questions helpful?

Q7. Cloud hosting Advantages and Disadvantages of cloud technology?

Ans.

Cloud technology offers flexibility and scalability, but also comes with security concerns and potential downtime.

  • Advantages: flexibility, scalability, cost-effectiveness, accessibility, automatic updates

  • Disadvantages: security concerns, potential downtime, dependency on internet connectivity, limited control over infrastructure

  • Examples: Amazon Web Services, Microsoft Azure, Google Cloud Platform

  • Security concerns: data breaches, unauthorized access, data loss

  • Downtime: can res...read more

Add your answer

Q8. Difference between PowerShell and CMD? Troubleshooting commands for both.

Ans.

PowerShell is a more advanced command-line interface than CMD, with more features and capabilities.

  • PowerShell is object-oriented, while CMD is text-based

  • PowerShell has more advanced scripting capabilities

  • PowerShell has more built-in commands and modules

  • CMD is more limited in its capabilities

  • Troubleshooting commands for PowerShell include Get-Help, Get-Command, and Test-NetConnection

  • Troubleshooting commands for CMD include Ping, Ipconfig, and Netstat

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Difference between public IP and private IP?

Ans.

Public IP is accessible from the internet while private IP is only accessible within a local network.

  • Public IP is assigned by the ISP and is unique to the internet.

  • Private IP is assigned by a router and is unique within a local network.

  • Public IP allows devices to communicate with the internet.

  • Private IP allows devices to communicate within a local network.

  • Examples of public IP include 8.8.8.8 and 216.58.194.174.

  • Examples of private IP include 192.168.0.1 and 10.0.0.1.

Add your answer

Q10. How AD replication works and troubleshooting steps if AD replication fails.

Ans.

AD replication is the process of copying and distributing data between domain controllers in Active Directory.

  • AD replication ensures that changes made on one domain controller are synchronized with other domain controllers in the network.

  • Troubleshooting steps for AD replication failure include checking network connectivity, DNS configuration, firewall settings, and replication topology.

  • Common tools used for troubleshooting AD replication issues include Repadmin, DCDiag, and E...read more

Add your answer

Q11. How to check who owns an IP?

Ans.

To check who owns an IP, use a WHOIS lookup tool.

  • Use a WHOIS lookup tool to find the owner of an IP address.

  • WHOIS lookup tools can be found online or through command line interfaces.

  • Enter the IP address into the WHOIS lookup tool to retrieve information about the owner.

  • The information provided may include the owner's name, contact information, and organization.

  • Some WHOIS lookup tools may require payment or registration to access certain information.

Add your answer

Q12. Load balancers and how they work

Ans.

Load balancers distribute network traffic across multiple servers to improve performance and availability.

  • Load balancers can be hardware or software-based

  • They use algorithms to distribute traffic based on factors like server health and response time

  • Load balancers can improve scalability and reduce downtime

  • Examples of load balancers include NGINX, F5, and Amazon ELB

Add your answer

Q13. What is Active directory Tree, Forest, OU, sites, DNS

Ans.

Active Directory is a directory service that stores information about objects on a network and allows for centralized management.

  • Active Directory Tree: A collection of domains that share a contiguous namespace.

  • Active Directory Forest: A collection of one or more AD trees that do not share a contiguous namespace.

  • OU (Organizational Unit): A container within a domain that can hold users, groups, computers, and other OUs.

  • Sites: Physical or logical network locations that help opti...read more

Add your answer

Q14. What are cloud Service Models?

Ans.

Cloud service models are the different ways in which cloud computing services are offered to users.

  • There are three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)

  • IaaS provides users with virtualized computing resources, such as servers and storage, over the internet

  • PaaS provides users with a platform for developing, running, and managing applications without having to worry about the underlying infr...read more

Add your answer

Q15. Difference between HTTP and HTTPS?

Ans.

HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.

  • HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.

  • HTTP operates on port 80 while HTTPS operates on port 443.

  • HTTP is vulnerable to attacks like man-in-the-middle and eavesdropping while HTTPS is secure against such attacks.

  • HTTPS uses SSL/TLS encryption to secure the communication between the client and server.

  • Examples of websites using HTTPS are banking websites...read more

Add your answer

Q16. Difference between IDS and IPS?

Ans.

IDS detects and alerts about potential threats, while IPS detects and prevents them.

  • IDS stands for Intrusion Detection System

  • IPS stands for Intrusion Prevention System

  • IDS monitors network traffic and alerts about potential threats

  • IPS actively blocks potential threats

  • IDS is passive and does not interfere with network traffic

  • IPS is active and can modify or block network traffic

  • IDS can be used for forensic analysis after an attack

  • IPS can prevent attacks in real-time

  • Examples of I...read more

Add your answer

Q17. Protocols used to login to Linux server.

Ans.

SSH and Telnet are the most commonly used protocols to login to Linux servers.

  • SSH (Secure Shell) is a secure protocol that encrypts the data transmitted between the client and server.

  • Telnet is an unencrypted protocol that transmits data in plain text.

  • SSH is the recommended protocol for logging in to Linux servers due to its security features.

  • Other protocols like FTP and SFTP can also be used for file transfer and remote access.

  • Authentication methods like password-based, key-b...read more

Add your answer

Q18. Diffrent between VM Cloning and templete.

Ans.

VM cloning creates an exact copy of a virtual machine, while a template is a pre-configured image used to create new VMs.

  • VM cloning duplicates an existing VM with all configurations and data intact.

  • Templates are pre-configured images used as a baseline for creating new VMs.

  • Cloning results in an identical copy, while templates are used as a starting point for customization.

  • Cloning is useful for creating backups or testing, while templates streamline VM deployment.

  • Example: Clon...read more

Add your answer

Q19. Troubleshoot ESXi in a not responding & disconnected state?

Ans.

To troubleshoot ESXi in a not responding & disconnected state, check network connectivity, reboot the host, and verify hardware.

  • Check network connectivity to ensure the host is reachable

  • Reboot the host to clear any hung processes

  • Verify hardware to ensure there are no underlying issues causing the disconnect

  • Check logs for any errors or warnings that may indicate the cause of the issue

Add your answer

Q20. DRS Affinity/ Anti-affinity rule? Used case of must and should?

Ans.

DRS Affinity/Anti-affinity rules are used to control VM placement on hosts in a cluster.

  • Affinity rules ensure that VMs are placed on the same host

  • Anti-affinity rules ensure that VMs are placed on different hosts

  • Must rules enforce the rule strictly, while should rules try to enforce the rule but allow exceptions

  • Use cases include ensuring high availability, separating workloads, and optimizing resource utilization

Add your answer

Q21. OSI vs TCP/IP

Ans.

OSI and TCP/IP are both networking models, but OSI has 7 layers while TCP/IP has 4 layers.

  • OSI stands for Open Systems Interconnection and TCP/IP stands for Transmission Control Protocol/Internet Protocol.

  • OSI has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • TCP/IP has 4 layers: Network Interface, Internet, Transport, and Application.

  • OSI is a theoretical model while TCP/IP is a practical model used in the internet.

  • TCP/IP is more wide...read more

Add your answer

Q22. Firewalls and its types

Ans.

Firewalls are network security systems that monitor and control incoming and outgoing network traffic.

  • Firewalls can be hardware, software, or cloud-based.

  • Types of firewalls include packet-filtering, stateful inspection, proxy, and next-generation firewalls.

  • Packet-filtering firewalls examine packets and filter them based on pre-defined rules.

  • Stateful inspection firewalls keep track of the state of network connections and filter traffic based on that information.

  • Proxy firewalls...read more

Add your answer

Q23. RAID and clustering in Windows

Ans.

RAID and clustering are two different technologies used in Windows for data redundancy and high availability.

  • RAID stands for Redundant Array of Independent Disks and is used to combine multiple physical disks into a single logical unit for data redundancy and performance improvement.

  • Clustering is used to provide high availability for applications and services by grouping multiple servers together to act as a single system.

  • Windows Server supports various RAID levels such as RA...read more

Add your answer

Q24. Whats the name of the event where all Scrum Masters get together?

Add your answer

Q25. Whats Scope Creep? What would you do if you encounter any?

Ans.

Scope creep is the gradual expansion of project scope beyond its original goals and objectives.

  • Identify the cause of scope creep

  • Evaluate the impact on project timeline and budget

  • Communicate with stakeholders and team members

  • Revisit project goals and objectives

  • Implement change control procedures

  • Document all changes and their impact

Add your answer

Q26. What is route map ? What is redistribution? What is prefix list ? What is acl ? Neighborship criteria in eigrp and ospf ? What is the range of private ip addresses ?

Add your answer

Q27. What is Sysprep ?

Ans.

Sysprep is a tool used to prepare a Windows system for cloning or imaging by removing unique identifiers and resetting system settings.

  • Sysprep stands for System Preparation Tool.

  • It is used to remove system-specific information from a Windows installation, such as unique identifiers like SID and computer name.

  • Sysprep resets the Windows activation and licensing information.

  • After running Sysprep, the system is ready to be captured as an image for deployment on multiple machines.

Add your answer

Q28. Program to find pair of elements whose sum matches to k

Ans.

Program to find pair of elements whose sum matches to k

  • Use a hash set to store elements as you iterate through the array

  • For each element, check if k minus the element is already in the set

  • If found, return the pair of elements

  • Time complexity: O(n)

Add your answer

Q29. Are you CCNA or CCNP certified?

Add your answer

Q30. What is the responsibility of Scrum Master?

Ans.

The Scrum Master is responsible for ensuring that the Scrum team follows the Scrum framework and practices.

  • Facilitating Scrum events and ceremonies

  • Removing impediments that hinder the team's progress

  • Coaching the team on Scrum principles and practices

  • Ensuring the team is self-organizing and cross-functional

  • Protecting the team from external distractions and disruptions

Add your answer

Q31. What values you can bring to the process?

Ans.

I can bring strong problem-solving skills, attention to detail, and a proactive approach to the process.

  • Strong problem-solving skills to troubleshoot and resolve issues efficiently

  • Attention to detail to ensure accuracy and precision in system administration tasks

  • Proactive approach to anticipate potential problems and implement preventive measures

  • Ability to work well under pressure and prioritize tasks effectively

  • Experience in implementing automation tools to streamline proces...read more

Add your answer

Q32. Challenges faced in implementing salesforce project

Ans.

Implementing Salesforce project can face challenges such as resistance to change, data migration issues, and user adoption.

  • Resistance to change from employees who are used to old systems

  • Data migration issues such as incomplete or inaccurate data

  • User adoption challenges due to lack of training or understanding of the new system

  • Integration issues with other systems

  • Customization challenges to meet specific business needs

  • Security and access control challenges

  • Cost and resource all...read more

Add your answer

Q33. How Agile will help in cloud projects

Ans.

Agile methodology allows for flexibility and adaptability in cloud projects, leading to quicker delivery and improved collaboration.

  • Agile promotes iterative development, allowing for continuous feedback and improvements in cloud projects.

  • Agile encourages collaboration between cross-functional teams, leading to better communication and coordination in cloud projects.

  • Agile helps in managing changing requirements and priorities effectively in cloud projects.

  • Agile enables faster ...read more

Add your answer

Q34. If customer having any query how u solve????

Ans.

I would listen to the customer's query carefully and provide them with a clear and concise solution.

  • Listen attentively to the customer's query

  • Ask clarifying questions to fully understand the issue

  • Provide a clear and concise solution

  • Ensure customer satisfaction before ending the call

Add your answer

Q35. What is your expected CTC?

Add your answer

Q36. What is BGP in detail?

Add your answer

Q37. What is the HSRP protocol?

Add your answer

Q38. What is the BGP confederation?

Add your answer

Q39. what's TCP/IP, explain packet flow, port numbers

Ans.

TCP/IP is a set of protocols used for communication between devices on the internet.

  • TCP/IP stands for Transmission Control Protocol/Internet Protocol.

  • Packet flow refers to the process of data being broken down into packets and transmitted across a network.

  • Port numbers are used to identify specific applications or services running on a device.

  • TCP/IP operates at the network and transport layers of the OSI model.

  • Examples of TCP/IP protocols include HTTP, FTP, and SMTP.

Add your answer

Q40. Give an example of Risk that RTE mitigates.

Add your answer

Q41. what is the expected CTC ?

Ans.

The expected CTC (Cost to Company) is the salary package that the employer is willing to offer for the Solution Architect role.

  • The expected CTC depends on various factors such as the company's budget, the candidate's experience and skills, and the market rates for Solution Architects.

  • It is common for Solution Architects to have a higher CTC compared to other roles due to their specialized knowledge and responsibilities.

  • The expected CTC can be negotiated during the interview p...read more

View 1 answer

Q42. What are the types of cloud

Ans.

Types of cloud include public, private, hybrid, and community clouds.

  • Public cloud: Services are delivered over the internet and shared across multiple organizations (e.g. AWS, Microsoft Azure)

  • Private cloud: Services are maintained on a private network and dedicated to a single organization (e.g. VMware)

  • Hybrid cloud: Combination of public and private clouds, allowing data and applications to be shared between them

  • Community cloud: Shared infrastructure among several organizatio...read more

Add your answer

Q43. What does prepare phase do in asol cycle.

Ans.

Prepare phase in ASOL cycle involves planning and defining the project scope.

  • Defines project scope and objectives

  • Identifies stakeholders and their requirements

  • Develops project plan and schedule

  • Assesses risks and constraints

  • Creates project charter and obtains approval

Add your answer

Q44. Difference of database clone process between cdb and noncdb databases

Ans.

The process of cloning a database differs between cdb and noncdb databases.

  • In cdb databases, the clone process involves creating a new PDB by copying the existing PDB's metadata and data files.

  • In noncdb databases, the clone process involves creating a new database by copying the existing database's data files and redo logs.

  • CDB clones can be created using the DBMS_PDB package, while non-CDB clones can be created using RMAN or the DUPLICATE command.

  • CDB clones can be created as ...read more

Add your answer

Q45. Program to find smallest element in an array

Ans.

Program to find smallest element in an array of strings

  • Iterate through the array and compare each element to find the smallest one

  • Use a variable to keep track of the smallest element found so far

  • Return the smallest element at the end

Add your answer

Q46. how you manage difficult customers

Ans.

I listen to their concerns, empathize with them, and offer solutions to resolve their issues.

  • Listen actively to their concerns

  • Empathize with their situation

  • Offer solutions to resolve their issues

  • Remain calm and professional

  • Avoid taking their behavior personally

Add your answer

Q47. What is cloud migration

Ans.

Cloud migration is the process of moving data, applications, and other business elements from an organization's on-premises infrastructure to the cloud.

  • Involves transferring data, applications, and workloads to a cloud environment

  • Can improve scalability, flexibility, and cost-efficiency

  • Requires careful planning, assessment of current infrastructure, and consideration of security measures

  • Examples include migrating from on-premises servers to cloud platforms like AWS, Azure, or...read more

Add your answer

Q48. Why Cyber Security is essential

Ans.

Cyber security is essential to protect sensitive information, prevent cyber attacks, and maintain business continuity.

  • Cyber attacks can cause financial loss, reputational damage, and legal consequences.

  • Sensitive information such as personal data, financial records, and intellectual property must be protected.

  • Cyber security measures include firewalls, antivirus software, encryption, and employee training.

  • Business continuity planning ensures that operations can continue in the ...read more

Add your answer

Q49. What are path attributes of bgp ?

Ans.

BGP path attributes are used to influence the path selection process in BGP.

  • Path attributes are used to determine the best path for a BGP route.

  • Some common path attributes include AS path, next hop, origin, local preference, and MED.

  • AS path attribute shows the path of autonomous systems that the route has traversed.

  • Next hop attribute indicates the IP address of the next router that should be used to reach the destination.

  • Origin attribute indicates the origin of the BGP route....read more

Add your answer

Q50. What AD value of ebgp ?

Ans.

The AD value of ebgp is used to determine the best path for external BGP routes.

  • AD stands for Administrative Distance and is a value assigned to different routing protocols to determine the best path for a particular route.

  • The AD value for ebgp is 20 by default, which means it is preferred over other external routing protocols like OSPF or RIP.

  • However, the AD value can be manually adjusted to give preference to a different routing protocol if needed.

Add your answer

Q51. Ur convincing power to the customer??

Ans.

My convincing power lies in understanding the customer's needs and providing them with personalized solutions.

  • Active listening to understand customer's needs

  • Empathizing with customer's situation

  • Providing personalized solutions

  • Highlighting benefits of the product/service

  • Addressing customer's concerns

  • Using persuasive language

  • Building rapport with the customer

Add your answer

Q52. Please name all SCRUM Ceremonies

Ans.

SCRUM ceremonies are events that help the team to inspect and adapt their work.

  • Sprint Planning: Planning the work for the upcoming sprint

  • Daily Scrum: A daily meeting to inspect progress and plan for the day

  • Sprint Review: A review of the work completed during the sprint

  • Sprint Retrospective: A reflection on the previous sprint and planning for improvements

  • Backlog Refinement: A meeting to refine and prioritize the product backlog

Add your answer

Q53. What are Servlets

Ans.

Servlets are Java classes that dynamically process requests and responses on a web server.

  • Servlets are server-side components used to create dynamic web applications.

  • They extend the functionality of web servers by generating dynamic content.

  • Servlets can handle HTTP requests, process data, and generate responses.

  • They are platform-independent and can be used with any web server that supports the Java Servlet API.

  • Servlets are commonly used for tasks like form processing, databas...read more

View 1 answer

Q54. Why we use Javascript

Ans.

Javascript is used for creating interactive web pages and web applications.

  • Javascript allows for dynamic content and user interaction on web pages.

  • It can be used for form validation, animations, and creating responsive designs.

  • Javascript is also used for building web applications, such as React and Angular.

  • It can be used for server-side scripting with Node.js.

  • Javascript is a versatile language that can be used for both front-end and back-end development.

Add your answer

Q55. synchronous and asynchronous architect

Ans.

Synchronous and asynchronous architectures refer to different ways of handling communication and processing in software systems.

  • Synchronous architecture involves processes occurring in a sequential order, where each task must wait for the previous one to complete before starting.

  • Asynchronous architecture allows tasks to be executed independently, without waiting for each other to finish.

  • Synchronous communication is like making a phone call - you wait for the other person to r...read more

Add your answer

Q56. Explain DDOS attack and remidiation

Ans.

DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.

  • DDOS stands for Distributed Denial of Service

  • Attackers use botnets to generate massive traffic to the target server or network

  • DDOS attacks can be mitigated by using firewalls, load balancers, and intrusion prevention systems

  • Cloud-based DDOS protection services like Cloudflare and Akamai can also be used

  • Regularly updating software and...read more

Add your answer

Q57. What is C++ Java

Ans.

C++ and Java are programming languages used for software development.

  • C++ is a high-performance language used for system programming, game development, and other performance-critical applications.

  • Java is an object-oriented language used for developing web applications, mobile apps, and enterprise software.

  • C++ is compiled, while Java is both compiled and interpreted.

  • C++ allows for direct memory manipulation, while Java has automatic memory management.

  • C++ is known for its speed ...read more

Add your answer

Q58. What is OSPF ?

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to exchange routing information within a single autonomous system.

  • OSPF is a link-state protocol that uses Dijkstra's algorithm to calculate the shortest path.

  • It supports variable-length subnet masks (VLSM) and classless inter-domain routing (CIDR).

  • OSPF routers exchange information about their directly connected networks and use this information to build a topology map of the network.

  • It is commonly used in large enterp...read more

Add your answer

Q59. SQL and NOSQL difference

Ans.

SQL is a relational database management system, while NoSQL is a non-relational database management system.

  • SQL databases are table-based, while NoSQL databases are document, key-value, graph, or wide-column stores.

  • SQL databases use structured query language for defining and manipulating the data, while NoSQL databases use different query languages.

  • SQL databases are vertically scalable, while NoSQL databases are horizontally scalable.

  • SQL databases are good for complex queries ...read more

Add your answer

Q60. Working of NewRelic

Ans.

NewRelic is a performance monitoring tool that helps in identifying and resolving issues in web applications.

  • NewRelic provides real-time insights into the performance of web applications.

  • It helps in identifying bottlenecks and optimizing the performance of the application.

  • NewRelic provides detailed metrics on server response time, throughput, error rates, and more.

  • It also offers features like alerting, tracing, and profiling to help in troubleshooting issues.

  • NewRelic supports...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Express Logistics

based on 48 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 571 Interview Questions
4.0
 • 570 Interview Questions
3.4
 • 507 Interview Questions
4.2
 • 223 Interview Questions
4.1
 • 140 Interview Questions
4.0
 • 137 Interview Questions
View all
Top Rackspace Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter