i
Tech Mahindra
Filter interviews by
I applied via Company Website and was interviewed before Aug 2020. There was 1 interview round.
Dealing with an irate customer requires active listening, empathy, and problem-solving skills.
Remain calm and composed
Listen actively and let the customer vent their frustrations
Show empathy and understanding
Apologize for any inconvenience caused
Offer solutions or alternatives to resolve the issue
Follow up with the customer to ensure satisfaction
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure and encrypted connection between the user's device and the private network
It helps in protecting sensitive data from unauthorized access
VPN can be used to access resources remotely, bypass geo-restrictions, and enhance privacy online
Examples of VPN services include NordVPN, ExpressV
HTTP is a protocol used for transferring data over the internet, while HTTPS is a secure version of HTTP that encrypts data.
HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet
HTTPS is a secure version of HTTP that uses encryption to protect data
HTTPS is commonly used for secure transactions such as online banking or shopping
HTTP operates on port 80, while HTTPS operates on po
The port number of UDP is 17.
UDP uses port number 17 for communication.
UDP is a connectionless protocol, so it does not require a specific port number for each connection.
Port number 17 is commonly used for the Daytime Protocol.
UDP port numbers range from 0 to 65535.
I applied via Naukri.com and was interviewed in Mar 2023. There were 2 interview rounds.
Permissions applied on types determine the level of access and actions that can be performed on them.
Permissions can be applied to various types such as files, folders, databases, etc.
Examples of permissions include read, write, execute, delete, modify, etc.
Permissions can be granted to individual users or groups of users.
Permissions can be inherited from parent objects or explicitly set on individual objects.
A file is a collection of data or information that is stored on a computer or other digital device.
A file can contain text, images, audio, video, or any other type of digital data.
Files are organized into directories or folders for easy access and management.
Files can be created, edited, moved, copied, and deleted by users or programs.
Examples of files include documents, spreadsheets, presentations, photos, music, and
I applied via Referral and was interviewed in Mar 2022. There were 2 interview rounds.
Linux Boot Process is the sequence of events that occur from power on to the login prompt.
BIOS/UEFI firmware initializes hardware
Bootloader loads kernel into memory
Kernel initializes system processes and mounts filesystems
Init process starts system services and user login
Graphical user interface (GUI) or command line interface (CLI) is presented to user
NIC teaming is the process of combining multiple network interface controllers to work as a single virtual NIC.
NIC teaming provides redundancy and load balancing for network traffic.
It can be configured in different modes such as switch independent, LACP, and static.
NIC teaming is commonly used in server environments to improve network performance and availability.
Example: Combining two 1 Gbps NICs to create a 2 Gbps v...
To create a Repository file/YUM client Configuration, follow these steps:
Create a new repository file in the /etc/yum.repos.d/ directory
Specify the repository name, base URL, enabled status, and other options in the file
Save the file and exit the editor
Run 'yum clean all' command to clear the cache
Run 'yum repolist' command to verify the repository configuration
Restarting a service stops and then starts it again, while reloading a service refreshes its configuration without stopping it.
Restarting a service completely stops it and then starts it again
Reloading a service refreshes its configuration without stopping it
Restarting a service is useful when there are critical changes or issues
Reloading a service is useful when only the configuration needs to be updated
To recover root password, boot into single-user mode and reset the password.
Reboot the system and press 'e' at the GRUB menu to edit the boot options.
Add 'single' or 'init=/bin/bash' to the end of the 'linux' line and press F10 to boot.
Run 'passwd' command to reset the root password.
Reboot the system and login with the new password.
To check available physical volumes, volume groups, and logical volumes, you can use the 'pvdisplay', 'vgdisplay', and 'lvdisplay' commands.
Use 'pvdisplay' command to display information about physical volumes.
Use 'vgdisplay' command to display information about volume groups.
Use 'lvdisplay' command to display information about logical volumes.
These commands provide detailed information about the available physical vol...
To extend LVM, follow these steps: 1. Create a new partition. 2. Initialize the partition as a physical volume. 3. Add the physical volume to the volume group. 4. Extend the logical volume. 5. Resize the file system.
Create a new partition using tools like fdisk or parted.
Initialize the partition as a physical volume using the pvcreate command.
Add the physical volume to the volume group using the vgextend command.
Extend...
To check server performance, monitor CPU, memory, disk usage. Use tools like top, htop, iostat. Check logs for errors.
Monitor CPU usage with top or htop command
Monitor memory usage with free or vmstat command
Monitor disk usage with df or iostat command
Check logs for errors related to the application
Use performance monitoring tools like Nagios or Zabbix
To activate a Volume Group or LV, use the vgchange or lvchange command.
Use the vgchange command to activate a Volume Group.
Use the lvchange command to activate a Logical Volume.
Specify the name of the Volume Group or Logical Volume as an argument.
Use the -a y option with vgchange to activate all Volume Groups.
Use the -a y option with lvchange to activate all Logical Volumes in a Volume Group.
To present a SAN LUN to Solaris LDOM or CDOM, we need to follow a few steps.
First, we need to identify the SAN LUN and the target LDOM/CDOM.
Then, we need to create a logical device using the format command.
Next, we need to configure the LUN using the cfgadm command.
Finally, we need to add the LUN to the LDOM/CDOM using the ldm add-vdsdev command.
I applied via Recruitment Consultant and was interviewed before Jan 2020. There were 3 interview rounds.
based on 50 reviews
Rating in categories
Software Engineer
26.3k
salaries
| ₹2 L/yr - ₹9.1 L/yr |
Senior Software Engineer
21.2k
salaries
| ₹5.5 L/yr - ₹22.6 L/yr |
Technical Lead
11.5k
salaries
| ₹9.2 L/yr - ₹37 L/yr |
Associate Software Engineer
5.4k
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Team Lead
4.9k
salaries
| ₹5.1 L/yr - ₹16.8 L/yr |
Infosys
Cognizant
Accenture
Wipro