Filter interviews by
I applied via Naukri.com and was interviewed before Jun 2022. There were 3 interview rounds.
DHCP assigns IP addresses to devices on a network, while DNS resolves domain names to IP addresses.
DHCP dynamically assigns IP addresses to devices on a network
DNS resolves domain names to IP addresses
DHCP is used for automatic IP address configuration
DNS is used for translating domain names to IP addresses
DHCP operates at the network layer (Layer 3)
DNS operates at the application layer (Layer 7)
Networking protocols and their respective port numbers are essential for communication between devices.
HTTP - Port 80
HTTPS - Port 443
FTP - Port 21
SMTP - Port 25
SSH - Port 22
DNS - Port 53
Top trending discussions
Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.
Microservices are small, independent, and autonomous services that communicate with each other through APIs.
Each microservice is responsible for a specific business capability and can be developed, deployed, and scaled independently.
Microservices promote flexibility, scalability, and fault tole...
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user
I applied via Approached by Company and was interviewed before Apr 2023. There was 1 interview round.
I was interviewed before Apr 2022.
Asked to create unix shell scripts for deployment in weblogic
KYC Associate
139
salaries
| ₹2.5 L/yr - ₹5 L/yr |
Team Lead
54
salaries
| ₹4 L/yr - ₹10.7 L/yr |
Collections Executive
47
salaries
| ₹2.5 L/yr - ₹4.5 L/yr |
Customer Support Executive
40
salaries
| ₹3.1 L/yr - ₹6 L/yr |
Customer Service Executive
27
salaries
| ₹3.2 L/yr - ₹6.1 L/yr |
ZestMoney
Paysense Services India
EarlySalary Services
Kissht Finance