i
TCS
Filter interviews by
Hybrid migration from on-premises to Office 365 using PowerShell commands.
Ensure that the on-premises environment meets the prerequisites for hybrid migration.
Install and configure Azure AD Connect to synchronize on-premises AD with Office 365.
Use the Exchange Admin Center or PowerShell to create a migration endpoint.
Use the New-MigrationBatch cmdlet to create a migration batch.
Use the Start-MigrationBatch cmdlet to st...
Transport rule is a feature in Office 365 that allows administrators to apply actions to messages in transit.
Transport rules can be used to block messages from specific senders or domains
They can also be used to add disclaimers or signatures to messages
Transport rules can be based on various conditions such as message content, recipient, or sender
They can be created and managed using the Exchange admin center or PowerS
I applied via Referral and was interviewed before Oct 2023. There was 1 interview round.
The mailing system in Office 365 is a cloud-based email service that allows users to send and receive emails, manage calendars, and collaborate on documents.
Office 365 uses Exchange Online as the email service provider.
Users can access their emails through Outlook on the web, Outlook desktop client, or mobile devices.
Features include email encryption, spam filtering, and shared calendars.
Administrators can manage user ...
Office 365 is a cloud-based suite of productivity apps and services offered by Microsoft.
Includes apps like Word, Excel, PowerPoint, and Outlook
Also includes collaboration tools like Teams and SharePoint
Offers various subscription plans for individuals and businesses
Allows access to files and apps from anywhere with an internet connection
What people are saying about TCS
Conditional access is a feature in Office 365 that allows administrators to control access to resources based on specific conditions.
Allows administrators to set policies that determine when and how users can access resources
Can be based on factors such as user location, device compliance, or IP address
Helps enhance security by ensuring that only authorized users can access sensitive data
Transport rule is a set of conditions and actions that define how email messages are processed and delivered.
Transport rules are used in Exchange Online to apply actions to email messages based on defined conditions.
Conditions can include sender, recipient, message content, etc.
Actions can include adding a disclaimer, encrypting the message, redirecting the message, etc.
Transport rules help in enforcing organizational ...
Mailbox permission levels determine the level of access a user has to another user's mailbox in Office 365.
There are different levels of mailbox permissions in Office 365, such as Full Access, Send As, and Send on Behalf.
Full Access permission allows a user to open another user's mailbox, read, and manage the contents.
Send As permission allows a user to send emails on behalf of another user.
Send on Behalf permission al...
DLP policy helps prevent data loss by monitoring and protecting sensitive information.
DLP stands for Data Loss Prevention
It helps organizations prevent the accidental or intentional sharing of sensitive information
DLP policies can be set to monitor and protect data across various platforms and devices
Examples of sensitive information include credit card numbers, social security numbers, and confidential company data
I applied via Walk-in and was interviewed in Jan 2024. There was 1 interview round.
posted on 19 Dec 2024
I applied via campus placement at NBKR Institute of Science and Technology, Vidyanagar and was interviewed in Nov 2024. There were 4 interview rounds.
It was about an aptitude test which is on English grammar and athematic reasoning.
The Fibonacci series can be applied to alphabets, and the same should be printed.
Print numbers in descending order 123456
Create an array of strings containing the numbers 1 to 6
Sort the array in descending order
Print the sorted array
I am choosing your organization because of its reputation for innovation, strong company culture, and opportunities for growth.
Reputation for innovation in the industry
Strong company culture that values employee development
Opportunities for growth and advancement within the organization
Yes, I am open to relocation for the right opportunity.
I am willing to relocate for the right job opportunity that aligns with my career goals.
I am open to exploring new locations and experiencing different cultures.
I understand that relocation may be necessary for career advancement and personal growth.
Yes, I am comfortable with rotational shifts as I have prior experience working in such shifts.
I have previous experience working in rotational shifts at my previous job.
I am adaptable and can easily adjust my schedule to accommodate rotational shifts.
I understand the importance of being available during different shifts to ensure smooth operations.
I am willing to work in rotational shifts to support the team and meet
To schedule a cron job, use the crontab command to edit the cron table file.
Use the crontab -e command to open the cron table file for editing
Add a new line to the file with the schedule timing and the command to be executed
Save and exit the file to schedule the cron job
Sticky bit is a permission in Unix/Linux that allows only the owner of a file to delete or rename it.
Sticky bit is represented by a 't' in the permissions of a file or directory.
When the sticky bit is set on a directory, only the owner of a file within that directory can delete or rename the file.
Commonly used on directories like /tmp to prevent users from deleting each other's files.
Example: chmod +t directory_name
posted on 18 Nov 2024
Reasoning arthemetic
Basic coding skills technical questions
I applied via Naukri.com and was interviewed in Mar 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Dec 2023. There were 2 interview rounds.
The boot process of Linux involves several stages, including BIOS, bootloader, kernel initialization, and system initialization.
The boot process starts with the BIOS (Basic Input/Output System) initializing hardware and performing a Power-On Self-Test (POST).
The bootloader, such as GRUB or LILO, is then loaded to locate and load the Linux kernel.
The kernel initializes essential components, sets up memory, and mounts th...
Interview experience
based on 1 review
Rating in categories
System Engineer
1.1L
salaries
| ₹1 L/yr - ₹9 L/yr |
IT Analyst
67.4k
salaries
| ₹5.1 L/yr - ₹16 L/yr |
AST Consultant
51.3k
salaries
| ₹8 L/yr - ₹25 L/yr |
Assistant System Engineer
29.9k
salaries
| ₹2.2 L/yr - ₹5.6 L/yr |
Associate Consultant
29k
salaries
| ₹9 L/yr - ₹32 L/yr |
Amazon
Wipro
Infosys
Accenture