Filter interviews by
I applied via Walk-in and was interviewed before Aug 2023. There was 1 interview round.
Type of backup refers to the method used to back up data, such as full, incremental, or differential backups.
Full Backup: A complete copy of all data is made.
Incremental Backup: Only changes made since the last backup are saved.
Differential Backup: Only changes made since the last full backup are saved.
Mirror Backup: An exact copy of the data is created.
Snapshot Backup: A point-in-time copy of data is taken.
Cloud Backu...
Yes, LVM (Logical Volume Manager) is used for managing disk storage in Linux systems.
LVM allows for dynamic resizing of logical volumes
Commands like pvcreate, vgcreate, lvcreate are used for LVM configuration
LVM provides flexibility in managing storage space
RAID 6 is a type of RAID that uses block-level striping with double distributed parity.
RAID 6 requires a minimum of 4 drives.
It can withstand the failure of up to 2 drives without losing data.
Provides high fault tolerance and data protection.
Slower write performance compared to RAID 5 due to dual parity calculations.
Example: A RAID 6 array with 6 drives can survive the failure of any 2 drives.
Patch processing involves identifying, downloading, testing, and applying software patches to ensure system security and stability.
Identify which patches are needed for the system
Download the necessary patches from official sources
Test the patches in a controlled environment to ensure compatibility
Apply the patches to the system following best practices
Verify that the patches were successfully applied and the system is
I am a dedicated and experienced System Engineer with a strong background in network infrastructure and troubleshooting.
Over 5 years of experience in designing, implementing, and maintaining network systems
Proficient in troubleshooting hardware and software issues
Skilled in network security protocols and best practices
Certified in Cisco CCNA and CompTIA Network+
Strong communication and problem-solving skills
STAR process is a structured method used in interviews to answer behavioral questions by outlining the Situation, Task, Action, and Result.
Situation - Describe the context or background of the situation
Task - Explain the specific task or goal that needed to be accomplished
Action - Detail the actions taken to address the task
Result - Summarize the outcome or impact of the actions taken
Example: 'Can you give me an exampl...
posted on 22 Oct 2024
My last CTC was $70,000 per year.
My last CTC was $70,000 per year
I received a salary of $70,000 annually in my previous job
My last compensation package was $70,000 per annum
posted on 8 Nov 2023
Securing data over the public internet involves using encryption, secure protocols, VPNs, and regular security audits.
Use encryption to protect data in transit, such as SSL/TLS for websites.
Implement secure protocols like HTTPS, SSH, and SFTP for secure communication.
Utilize Virtual Private Networks (VPNs) to create secure tunnels for data transmission.
Regularly conduct security audits and updates to identify and patch...
I applied via Naukri.com
This is the round in which basic quant questions were asked
In this round basic 2 java questions were asked
In this round one topic was given and we need to discuss about that topic
Java is a high-level, object-oriented programming language used to develop applications for various platforms.
Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)
It is known for its security features, such as the ability to run code in a sandbox environment
Java is used for developing a wide range of applications, from web applications to mobile apps and games
It is also used...
Searching is finding a specific item in a collection of items. Sorting is arranging items in a specific order.
Searching involves looking for a specific item in a collection of items.
Sorting involves arranging items in a specific order, such as alphabetical or numerical.
Searching and sorting are commonly used in computer science and data analysis.
Examples of searching algorithms include linear search and binary search.
E...
A binary tree is a data structure consisting of nodes, where each node has at most two children.
Nodes in a binary tree have a left and/or right child node.
The topmost node is called the root node.
Binary trees are used in search algorithms and data compression.
Examples of binary trees include binary search trees and heap trees.
posted on 13 Oct 2023
I applied via Referral and was interviewed before Oct 2022. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in Oct 2020. There was 1 interview round.
System Administrator
5
salaries
| ₹3.9 L/yr - ₹4.9 L/yr |
Assistant Manager
4
salaries
| ₹5.4 L/yr - ₹6 L/yr |
Technical Support Engineer
4
salaries
| ₹2.6 L/yr - ₹4.2 L/yr |
Senior HR Executive
4
salaries
| ₹3.6 L/yr - ₹4.9 L/yr |
PMO Executive
4
salaries
| ₹2.2 L/yr - ₹2.5 L/yr |
Tech Mahindra
HCLTech
Wipro
Infosys