Filter interviews by
Clear (1)
I was interviewed before Feb 2024.
Top trending discussions
I handle pressure by prioritizing tasks, taking breaks, and seeking support when needed.
I prioritize tasks based on urgency and importance
I take short breaks to clear my mind and recharge
I seek support from colleagues or supervisors when necessary
I maintain a positive attitude and focus on solutions rather than problems
I applied via LinkedIn and was interviewed in May 2021. There were 3 interview rounds.
Handled a critical situation with a customer
Identified the issue and its impact on the customer
Communicated effectively with the customer to understand their concerns
Collaborated with the team to find a solution
Implemented the solution and ensured customer satisfaction
Followed up with the customer to ensure the issue was resolved
NGFw stands for Next-Generation Firewall and it has advanced features compared to traditional firewalls.
NGFw can identify and block advanced threats like malware, ransomware, and phishing attacks.
It can perform deep packet inspection to analyze network traffic and detect anomalies.
NGFw can also provide application-level visibility and control to manage network traffic based on application usage.
It can integrate with ot...
SSL handshake and IPsec negotiation are both security protocols used to establish secure communication channels.
SSL handshake is used to establish secure communication between a client and a server over the internet.
IPsec negotiation is used to establish secure communication between two network devices.
SSL handshake uses a combination of public and private keys to encrypt and decrypt data.
IPsec negotiation uses a combi...
posted on 18 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There was 1 interview round.
To assign an IP address to a Windows PC, you can do so through the network settings.
Go to Control Panel > Network and Sharing Center
Click on Change adapter settings
Right-click on the network connection you want to assign an IP address to and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties
Choose 'Use the following IP address' and enter the IP address, subnet mask, default gateway,
When browsing a website, various components work at the backend to deliver content and functionality.
Web server processes requests and serves web pages
Database stores and retrieves data
Application server executes application logic
Content delivery network (CDN) may cache and deliver content
Load balancer distributes incoming traffic to multiple servers
Web browser renders the content for the user
posted on 8 Dec 2024
During the lockdown, I focused on enhancing my technical skills and learning new technologies.
Took online courses and certifications to improve my knowledge in areas like networking and troubleshooting
Participated in virtual workshops and webinars to stay updated with the latest industry trends
Practiced troubleshooting scenarios on virtual machines to sharpen my problem-solving abilities
Contributed to online technical ...
As a Technical Support Engineer, my day is spent troubleshooting and resolving technical issues for customers.
I start my day by checking emails and responding to any urgent customer inquiries.
I prioritize and manage my workload, addressing high-priority issues first.
I collaborate with other team members to share knowledge and seek assistance when needed.
I troubleshoot technical problems reported by customers, analyzing...
posted on 14 Nov 2024
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
posted on 7 May 2017
I was interviewed in Feb 2017.
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Technical Support Engineer
104
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
74
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
33
salaries
| ₹0 L/yr - ₹0 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen