i
Stefanini
Filter interviews by
After getting a system infected with a virus, the first step is to isolate the infected system from the network.
Isolate the infected system from the network to prevent further spread of the virus
Disconnect the infected system from the internet
Disable any network connections on the infected system
Notify the IT security team about the infection
Run a full system scan using an updated antivirus software
Quarantine and remov...
The levels of Office 365 Administration include Global Administrator, Billing Administrator, User Management Administrator, etc.
Global Administrator has full control over all aspects of Office 365 administration
Billing Administrator manages the billing and subscription aspects of Office 365
User Management Administrator handles user accounts and permissions
Exchange Administrator manages Exchange Online
SharePoint Adminis...
Top trending discussions
posted on 3 Jan 2022
posted on 4 Apr 2023
I applied via Walk-in and was interviewed before Apr 2022. There were 3 interview rounds.
AD stands for Active Directory, a Microsoft technology used for managing users, computers, and other resources in a network. DHCP stands for Dynamic Host Configuration Protocol, a network protocol used for assigning IP addresses to devices.
AD is used for centralized management of network resources
AD allows for authentication and authorization of users and devices
DHCP automatically assigns IP addresses to devices on a n...
I applied via Naukri.com and was interviewed before Sep 2022. There was 1 interview round.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more unique addresses and improved security features.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
IPv4 supports up to 4.3 billion unique addresses, which is becoming insufficient with the growth of internet-connected devices, w...
I will install the OS using a bootable installation media or network deployment tools.
Create a bootable installation media (USB or DVD) with the OS image
Boot the computer from the installation media
Follow the on-screen instructions to install the OS
Configure settings such as language, time zone, and user accounts
Install necessary drivers and updates post installation
posted on 5 Oct 2022
I applied via Approached by Company and was interviewed in Sep 2022. There were 3 interview rounds.
Windows OS is a popular operating system developed by Microsoft.
Windows OS is available in different versions such as Windows 7, 8, 10, etc.
It has a graphical user interface (GUI) and supports multitasking.
Windows OS supports various file systems such as NTFS, FAT32, exFAT, etc.
It comes with built-in applications such as Microsoft Office, Internet Explorer, Windows Media Player, etc.
Windows OS can be customized with th...
I applied via Naukri.com and was interviewed in Apr 2022. There were 2 interview rounds.
PST and OST are Outlook data files. BSOD is Blue Screen of Death. DNS is Domain Name System. VPN is Virtual Private Network.
PST and OST are data files used by Microsoft Outlook to store emails, contacts, and other data.
BSOD is a critical error screen displayed by Windows operating system when it encounters a system error.
DNS is a system that translates domain names into IP addresses, allowing computers to communicate w...
POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.
POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.
IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.
SMTP (Simple Mail Transfer Protocol) is used for sending emails from a c...
To backup a PST file, you can simply copy and paste it to an external drive or cloud storage. To speed up a slow system, try cleaning up temporary files and disabling unnecessary startup programs.
Copy and paste the PST file to an external drive or cloud storage
Use a backup software to automate the backup process
Clean up temporary files to free up space and improve performance
Disable unnecessary startup programs to redu
I applied via Naukri.com and was interviewed in Oct 2021. There were 5 interview rounds.
Desktop l2 level related questions
How to configur system in domain
To configure SAP in user's system, follow these steps:
Install SAP GUI on the user's system
Configure the SAP logon pad with the necessary system details
Create a user ID and assign the necessary authorizations
Test the connection to ensure successful configuration
Outlook 365 offers numerous advantages for users.
Access to emails, contacts, and calendar from anywhere with internet connection
Collaboration and sharing features for team projects
Integration with other Microsoft Office applications
Automatic updates and security features
Large storage capacity for emails and attachments
Mobile app for easy access on-the-go
Bitlocker is important for securing data on Windows devices.
Encrypts data on Windows devices to prevent unauthorized access
Protects against theft or loss of devices
Meets compliance requirements for data protection
Can be managed centrally through Active Directory
Can be used in combination with other security measures like TPM and Secure Boot
Helps prevent data breaches and protects sensitive information
MFA stands for Multi-Factor Authentication, which is a security process that requires users to provide two or more forms of identification to access a system.
MFA adds an extra layer of security to protect against unauthorized access.
The most common forms of identification used in MFA are passwords, security tokens, and biometric data.
MFA can be implemented through various methods such as SMS codes, mobile apps, or hard...
I was interviewed before Sep 2016.
I was interviewed in Mar 2017.
Oops concepts in Java
Encapsulation - hiding implementation details
Inheritance - reusing code and creating parent-child relationships
Polymorphism - multiple forms of a method or object
Abstraction - creating abstract classes and interfaces
Example: Encapsulation - using private variables and public methods
Example: Inheritance - creating a subclass that inherits from a superclass
Example: Polymorphism - using method overloa...
Altering columns in databases involves modifying the structure of a table by adding, deleting or modifying columns.
Use ALTER TABLE statement to modify columns
Add new columns using ADD COLUMN
Delete columns using DROP COLUMN
Modify columns using MODIFY COLUMN
Changing column data type may result in data loss
Reversing a number in Java
Convert the number to a string
Use StringBuilder to reverse the string
Convert the reversed string back to a number
To extract words from a line in Java, split the line using whitespace as delimiter.
Use the split() method of String class
Pass the whitespace regex as argument to split() method
Iterate over the resulting array to get individual words
posted on 23 Sep 2017
I was interviewed in Sep 2017.
System Administrator
133
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator 2
57
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
53
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior System Administrator
50
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator 1
49
salaries
| ₹0 L/yr - ₹0 L/yr |
Accenture
IBM
TCS
Infosys