i
Tech Mahindra
Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
Outlook configuration step by step
Open Outlook and click on 'File'
Select 'Add Account' and enter your email address
Enter your password and follow the prompts to complete setup
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows administrators to control access and permissions
Facilitates single sign-on for users across network services
BitLocker is a full disk encryption feature included with Windows operating systems.
BitLocker is a security feature that encrypts the entire hard drive to protect data from unauthorized access.
It is available on Windows operating systems such as Windows 10, 8.1, and 7.
Users can enable BitLocker through the Control Panel or Settings menu.
BitLocker requires a password or USB key to unlock the encrypted drive.
It is common...
OST and PST are file formats used by Microsoft Outlook to store email data.
OST stands for Outlook Offline Storage Table and is used for offline access to email data.
PST stands for Personal Storage Table and is used to store email data locally on a user's computer.
OST files are typically used in conjunction with Exchange Server for offline access to emails.
PST files can be imported/exported to backup or transfer email d
Windows 11 is the latest version of the Windows operating system, featuring a new design, improved performance, and enhanced productivity tools.
Windows 11 has a redesigned Start menu and taskbar for a more modern look and feel
Windows 11 offers better gaming performance with DirectStorage and Auto HDR support
Windows 11 introduces Snap Layouts and Snap Groups for easier multitasking
Windows 11 includes virtual desktops an...
DORA process stands for Define, Observe, Reflect, and Act. It is a problem-solving framework used in design thinking.
Define the problem or challenge at hand
Observe and gather information through research and empathy
Reflect on the gathered information and brainstorm potential solutions
Act on the chosen solution by prototyping and testing
Diskmenejmet is a term that does not have a known meaning or definition.
Diskmenejmet may be a made-up or misspelled word.
It could be a technical term in a specific field that is not widely known.
There is no clear reference or context for the term diskmenejmet.
I applied via Naukri.com and was interviewed in Sep 2024. There were 2 interview rounds.
To troubleshoot a server that booted up with the old kernel after a new kernel update, check the bootloader configuration, verify the kernel installation, and review the update process.
Check the bootloader configuration to ensure it is pointing to the correct kernel version.
Verify the kernel installation to see if the new kernel was successfully installed.
Review the update process to identify any errors or issues that ...
Various commands to check CPU and Memory utilization in Linux server.
To check CPU utilization: top, mpstat, sar
To check Memory utilization: free, vmstat, sar -r
To add a new disk to the system using LVM, you need to initialize the disk, create a physical volume, extend the volume group, and finally extend the logical volume.
Initialize the disk using fdisk or parted command
Create a physical volume using pvcreate command
Extend the volume group using vgextend command
Extend the logical volume using lvextend command
Resize the filesystem using resize2fs or xfs_growfs command
Experienced Linux Administrator with a passion for troubleshooting and optimizing systems.
Over 5 years of experience managing Linux servers in a corporate environment
Skilled in shell scripting, server configuration, and system monitoring tools like Nagios
Strong problem-solving skills and ability to work well under pressure
Certified in Red Hat Enterprise Linux (RHCE)
Passionate about staying up-to-date with the latest te
Some additional skills I possess include scripting languages, troubleshooting abilities, and strong communication skills.
Proficiency in scripting languages such as Python, Bash, or Perl can be beneficial for automating tasks and improving efficiency.
Strong troubleshooting abilities are essential for quickly identifying and resolving issues that may arise in a Linux environment.
Effective communication skills are importa...
Property and casualty insurance provides coverage for property damage and liability risks.
Property insurance covers damage to physical property such as homes, buildings, and personal belongings.
Casualty insurance covers liability risks such as bodily injury or property damage caused to others.
Examples include homeowners insurance, auto insurance, and commercial property insurance.
Endorsement and policy lifecycle in insurance involves making changes to an existing policy and managing it throughout its duration.
Endorsements are changes made to an existing insurance policy, such as adding or removing coverage, changing policy limits, or updating personal information.
The policy lifecycle includes the issuance of the policy, endorsements, renewals, and eventual cancellation or expiration.
Insurance c...
LVM stands for Logical Volume Manager, a tool used to manage disk storage in Linux systems.
LVM allows for dynamic resizing of logical volumes without downtime.
It consists of physical volumes, volume groups, and logical volumes.
Commands like pvcreate, vgcreate, lvcreate are used to create and manage LVM.
LVM provides flexibility in managing storage space by allowing logical volumes to span multiple physical disks.
To mount NFS, use the 'mount' command with the NFS server IP address and the mount point on the local machine.
Use the 'mount' command followed by the NFS server IP address and the mount point on the local machine
For example: sudo mount 192.168.1.100:/shared_folder /mnt/nfs_share
Ensure that the NFS server is properly configured and accessible from the local machine
Patching involves applying updates to software to fix vulnerabilities and improve performance.
Identify the software that needs to be patched
Download the appropriate patches from the vendor's website
Test the patches in a non-production environment before applying them to production systems
Schedule downtime for applying patches to minimize disruption
Document the patching process for future reference
To rollback a package, use package manager to uninstall current version and install previous version.
Use package manager to uninstall current version of the package
Install the previous version of the package using package manager
Check for any dependencies that may need to be rolled back as well
To remove older kernels in Linux, use package management tools like apt or yum.
Use 'apt autoremove' command in Debian-based systems to remove old kernels
Use 'yum remove
Check available kernels with 'uname -r' command before removing
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
Grant SFTP access exclusively to user David
Create a new group specifically for David, e.g. 'davidgroup'
Set the ChrootDirectory in the SSH configuration file to restrict David's access to a specific directory
Add David to the 'davidgroup' and configure the necessary permissions for SFTP access
To lock a user out after 6 unsuccessful password attempts for 30 minutes, modify the PAM configuration file.
Edit the PAM configuration file (/etc/pam.d/common-auth) to include the 'pam_tally2' module.
Set the 'deny' option in the 'pam_tally2' module to lock the user out after 6 failed attempts.
Specify the 'unlock_time' option in the 'pam_tally2' module to set the duration of the lockout period to 30 minutes.
Example: aut
Java, java Stream, spring boot, hibernate, JVM, JRE,string function annotations
JRE stands for Java Runtime Environment, which is used to run Java applications. JDK stands for Java Development Kit, which is used to develop Java applications.
JRE is necessary to run Java applications on a computer
JDK is necessary to develop Java applications, as it includes tools like compiler and debugger
JDK includes JRE, so if you have JDK installed, you also have JRE
I applied via Approached by Company
NFS can be configured by setting up the NFS server, exporting directories, and configuring client access.
Install NFS server package on the server
Edit /etc/exports file to specify directories to be shared
Restart NFS service to apply changes
Configure client access by mounting NFS shares on client machines
Patching involves applying updates to software to fix vulnerabilities and improve performance.
Identify the software that needs to be patched
Download the necessary patches from the vendor's website
Test the patches in a non-production environment before applying them to production systems
Schedule a maintenance window to apply the patches
Apply the patches using tools like yum, apt-get, or Windows Update
Verify that the pat...
Google Pay is a digital wallet platform and online payment system developed by Google.
Allows users to make payments using their mobile devices
Supports contactless payments in stores
Offers peer-to-peer money transfers
Integrates with various online platforms for easy checkout
Provides rewards and cashback for transactions
Pearson test where our verbal skills are tested
based on 1 review
Rating in categories
Software Engineer
26.3k
salaries
| ₹2 L/yr - ₹9 L/yr |
Senior Software Engineer
21.3k
salaries
| ₹5.5 L/yr - ₹22.9 L/yr |
Technical Lead
11.6k
salaries
| ₹9.5 L/yr - ₹37 L/yr |
Associate Software Engineer
5.4k
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Team Lead
4.9k
salaries
| ₹5.1 L/yr - ₹16.9 L/yr |
Infosys
Cognizant
Accenture
Wipro