Filter interviews by
I applied via Approached by Company and was interviewed in Nov 2023. There were 3 interview rounds.
Oil cost saving, plant 5S
Foaming & reuse of oil is a common concern in CMS administration.
Foaming of oil occurs when air or gas is trapped in the oil, leading to reduced lubrication and potential damage to equipment.
Foaming can be caused by factors such as high oil temperature, contamination, or incorrect oil viscosity.
To prevent foaming, it is important to use the correct oil viscosity for the application and maintain proper oil levels.
Regula...
Top trending discussions
I applied via Walk-in and was interviewed in Apr 2024. There was 1 interview round.
I applied via Job Portal
Experienced System Administrator with strong troubleshooting skills and a passion for technology.
Over 5 years of experience managing and maintaining IT systems
Proficient in Windows and Linux server administration
Skilled in network configuration and security protocols
Certified in Cisco networking and Microsoft server technologies
posted on 6 Apr 2024
I applied via Job Fair and was interviewed in Mar 2024. There was 1 interview round.
The Linux kernel is the core component of the Linux operating system, responsible for managing hardware resources and providing essential services.
Manages hardware resources such as CPU, memory, and peripherals
Provides essential services like process management, file system support, and device drivers
Open source and constantly updated by a global community of developers
Examples: version 5.4, developed by Linus Torvalds
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Assignment BPm Infosys
I applied via Referral and was interviewed in Jan 2023. There were 2 interview rounds.
OSI (Open Systems Interconnection) model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
OSI model has 7 layers, each layer has a specific function and communicates with the layer above and below it.
Examples of OSI layers are: Physical layer (transmitting bits over a medium), Data link layer (framing data into packets), Network layer (rout...
CMD commands are used for various tasks like managing files, network settings, system configurations, and more.
CMD commands are used to navigate and manage files and directories on a computer.
They can be used to configure network settings and troubleshoot network issues.
CMD commands can also be used to manage system configurations and services.
Some commonly used CMD commands include dir, cd, ipconfig, ping, netstat, an
I applied via Referral and was interviewed in Dec 2018. There was 1 interview round.
Data backup can be taken using various methods such as cloud storage, external hard drives, and network-attached storage (NAS).
Cloud storage: Use services like Google Drive, Dropbox, or Amazon S3 to store data remotely.
External hard drives: Connect an external hard drive to the system and copy the data onto it.
Network-attached storage (NAS): Set up a dedicated storage device on the network to backup data from multiple ...
An archive is a collection of historical records or documents.
Archives are used to preserve and organize important documents and records.
Archives can be physical or digital.
Examples of archives include the National Archives and Records Administration and the Internet Archive.
Archives can be used for research, historical preservation, and legal purposes.
A System Administrator can manage Https sites by configuring and maintaining the necessary security protocols and certificates.
A System Administrator should have knowledge of SSL/TLS protocols and certificates.
They should be able to configure web servers to support Https.
They should regularly update and renew SSL certificates.
They should monitor and troubleshoot any issues related to Https connections.
They should ensur...
Samba is a free and open-source software that allows file and print sharing between Linux and Windows systems.
Samba server enables Linux machines to share files and printers with Windows machines.
It uses the SMB/CIFS protocol to provide seamless integration with Windows clients.
Samba can also act as a domain controller, allowing Windows clients to authenticate against a Linux server.
Samba can be configured through its ...
NFS secure server is a network file system that provides secure access to shared files over a network.
NFS secure server uses Kerberos authentication to provide secure access to shared files.
It encrypts the data being transferred over the network to prevent eavesdropping.
It also uses Access Control Lists (ACLs) to control access to shared files.
Examples of NFS secure servers include Red Hat Enterprise Linux and Ubuntu.
N...
TCP Wrapper is a host-based network access control mechanism.
It provides an additional layer of security by filtering incoming network traffic based on the IP address of the remote host.
It uses the /etc/hosts.allow and /etc/hosts.deny files to determine which hosts are allowed or denied access.
It can be used to restrict access to specific services such as SSH, FTP, and Telnet.
It can also be used to log connection attem...
Network teaming is the process of combining multiple network interfaces to work as a single interface.
Teaming provides redundancy and load balancing.
It can be done at the software or hardware level.
Teaming can be configured for different modes such as active-backup, round-robin, and LACP.
Examples of teaming software include Linux bonding and Windows NIC teaming.
iptables is a Linux-based firewall tool that uses packet filtering and NAT to control network traffic.
iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel.
It can be used to block or allow traffic based on various criteria such as IP address, port number, protocol, etc.
iptables can also be used for Network Address Translation (NAT) to modify the source or destination...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed before Sep 2022. There were 3 interview rounds.
To modify quorum type in failover cluster, use PowerShell cmdlet Set-ClusterQuorum.
Use PowerShell cmdlet Set-ClusterQuorum to modify quorum type in failover cluster
Specify the new quorum type using the -QuorumType parameter
For example, to set the quorum type to Node Majority, use the command: Set-ClusterQuorum -Cluster ClusterName -QuorumType NodeMajority
Promiscuous mode in VMware allows a virtual machine to receive all network traffic, regardless of the destination MAC address.
Promiscuous mode is a setting in VMware that allows a virtual machine to see all network traffic on a virtual switch.
This can be useful for network monitoring, troubleshooting, or security analysis.
Promiscuous mode should be used with caution as it can potentially expose sensitive information to
I applied via Naukri.com
based on 1 review
Rating in categories
Senior Engineer
343
salaries
| ₹6.4 L/yr - ₹13.1 L/yr |
Assistant Engineer
313
salaries
| ₹4 L/yr - ₹9.2 L/yr |
Engineer
310
salaries
| ₹5 L/yr - ₹11 L/yr |
Graduate Apprentice Trainee
280
salaries
| ₹0.7 L/yr - ₹3.5 L/yr |
Assistant Manager
276
salaries
| ₹9 L/yr - ₹17 L/yr |
Tata Motors
Mahindra & Mahindra
Maruti Suzuki
Ashok Leyland