Filter interviews by
Softphones are applications that allow users to make phone calls over the internet using a computer or mobile device.
Softphones can work on various operating systems such as Windows, macOS, and Linux.
They require an internet connection to function properly.
Softphones can be used with different VoIP services like Skype, Zoom, and Cisco Webex.
They often have features like call recording, video calling, and instant m...
Yes, I am comfortable working in shifts.
I have previous experience working in shifts at my previous job.
I am flexible with my schedule and can easily adapt to different shift timings.
I understand the importance of round-the-clock support in a Systems & Network Engineer role.
To give file access to a shared folder, you can set permissions for specific users or groups.
Use the file system's security settings to grant read, write, or execute permissions to users or groups.
Consider creating a new user group specifically for accessing the shared folder.
Regularly review and update permissions to ensure security and access control.
Example: Use the 'chmod' command in Linux to change file permi...
Shared mailbox is accessed by multiple users with a single login, while distributed mailbox is spread across multiple servers for load balancing.
Shared mailbox allows multiple users to access the same mailbox with a single login credential
Distributed mailbox is spread across multiple servers for load balancing and redundancy
Shared mailbox is typically used for team collaboration and sharing information
Distributed ...
Yes, I have experience working with ticketing tools such as ServiceNow and Jira.
Experience with ServiceNow and Jira ticketing tools
Created, updated, and resolved tickets for various IT issues
Assigned tickets to appropriate team members for resolution
Monitored ticket queues and ensured timely responses
Generated reports on ticketing metrics and trends
Yes, you can use commands like md5sum, sha1sum, and sha256sum to scan files for corruption.
Use md5sum command to calculate and check the MD5 checksum of a file
Use sha1sum command to calculate and check the SHA-1 checksum of a file
Use sha256sum command to calculate and check the SHA-256 checksum of a file
To add a system to a domain, follow these steps and ensure proper configuration before handing it over to the user.
Join the system to the domain by accessing System Properties > Computer Name > Change > Domain
Enter the domain name and provide domain credentials when prompted
Restart the system to apply the changes and ensure successful domain join
Configure domain-specific settings such as group policies, network sh...
Yes, I have worked on exchange servers in previous roles.
Managed and maintained exchange servers for email communication
Configured email accounts, distribution lists, and mail flow rules
Troubleshooted and resolved issues related to exchange servers
Implemented security measures to protect exchange server data
Troubleshoot Outlook email issues by checking settings, connectivity, and account configurations.
Check internet connectivity: Ensure the device is connected to the internet by browsing a website.
Verify Outlook settings: Check if the correct email account is configured and the server settings are accurate.
Examine the inbox rules: Look for any rules that might be moving emails to other folders or deleting them.
Inspe...
Asset management involves tracking and managing an organization's physical assets to optimize usage and reduce costs.
Maintain an inventory of all assets including hardware, software, and equipment
Track asset location, status, and usage to prevent loss or theft
Implement a system for asset tagging and labeling for easy identification
Regularly update asset records and conduct audits to ensure accuracy
Utilize asset ma...
I applied via Approached by Company and was interviewed in Mar 2024. There were 3 interview rounds.
Yes, I am comfortable working in shifts.
I have previous experience working in shifts at my previous job.
I am flexible with my schedule and can easily adapt to different shift timings.
I understand the importance of round-the-clock support in a Systems & Network Engineer role.
I am a Systems & Network Engineer with extensive experience in managing and optimizing IT infrastructure and network systems.
Network Design: I have designed and implemented scalable network architectures for organizations, ensuring high availability and performance.
Troubleshooting: I excel in diagnosing and resolving network issues, having successfully reduced downtime by 30% in my previous role.
Security Protocols:...
Yes, I have experience working on active directory and running scripts.
I have experience managing user accounts, groups, and permissions in Active Directory.
I have written and executed PowerShell scripts to automate tasks in Active Directory.
I have experience troubleshooting issues related to Active Directory replication and DNS.
I have worked on integrating third-party applications with Active Directory for single sign...
Softphones are applications that allow users to make phone calls over the internet using a computer or mobile device.
Softphones can work on various operating systems such as Windows, macOS, and Linux.
They require an internet connection to function properly.
Softphones can be used with different VoIP services like Skype, Zoom, and Cisco Webex.
They often have features like call recording, video calling, and instant messag...
To add a system to a domain, follow these steps and ensure proper configuration before handing it over to the user.
Join the system to the domain by accessing System Properties > Computer Name > Change > Domain
Enter the domain name and provide domain credentials when prompted
Restart the system to apply the changes and ensure successful domain join
Configure domain-specific settings such as group policies, network shares,...
AWS is a comprehensive cloud platform offering a wide range of services for computing, storage, and networking.
EC2 Instances: I have launched and managed EC2 instances for scalable computing, using different instance types based on workload requirements.
S3 Storage: I utilized Amazon S3 for storing and retrieving data, implementing lifecycle policies for cost management and data archiving.
VPC Configuration: I designed a...
Yes, I have worked on exchange servers in previous roles.
Managed and maintained exchange servers for email communication
Configured email accounts, distribution lists, and mail flow rules
Troubleshooted and resolved issues related to exchange servers
Implemented security measures to protect exchange server data
Yes, I have experience working with ticketing tools such as ServiceNow and Jira.
Experience with ServiceNow and Jira ticketing tools
Created, updated, and resolved tickets for various IT issues
Assigned tickets to appropriate team members for resolution
Monitored ticket queues and ensured timely responses
Generated reports on ticketing metrics and trends
I would start by checking the user's computer for any potential issues with the operating system or files.
Check if the computer is properly connected to the network
Verify if the user has the necessary permissions to access the files
Check for any recent software updates or changes that may have caused the issue
Run diagnostic tools to identify any hardware or software issues
Test accessing the files from a different devic...
Yes, you can use commands like md5sum, sha1sum, and sha256sum to scan files for corruption.
Use md5sum command to calculate and check the MD5 checksum of a file
Use sha1sum command to calculate and check the SHA-1 checksum of a file
Use sha256sum command to calculate and check the SHA-256 checksum of a file
I am highly skilled in network troubleshooting and familiar with commands like ipconfig /release and /renew.
I have extensive experience in troubleshooting network issues, including identifying and resolving connectivity problems.
I am proficient in using commands like ipconfig /release and /renew to troubleshoot network configurations.
I have successfully resolved issues related to IP address conflicts, DNS resolution, a...
To give file access to a shared folder, you can set permissions for specific users or groups.
Use the file system's security settings to grant read, write, or execute permissions to users or groups.
Consider creating a new user group specifically for accessing the shared folder.
Regularly review and update permissions to ensure security and access control.
Example: Use the 'chmod' command in Linux to change file permission...
Troubleshoot Outlook email issues by checking settings, connectivity, and account configurations.
Check internet connectivity: Ensure the device is connected to the internet by browsing a website.
Verify Outlook settings: Check if the correct email account is configured and the server settings are accurate.
Examine the inbox rules: Look for any rules that might be moving emails to other folders or deleting them.
Inspect th...
Shared mailbox is accessed by multiple users with a single login, while distributed mailbox is spread across multiple servers for load balancing.
Shared mailbox allows multiple users to access the same mailbox with a single login credential
Distributed mailbox is spread across multiple servers for load balancing and redundancy
Shared mailbox is typically used for team collaboration and sharing information
Distributed mailb...
Asset management involves tracking and managing an organization's physical assets to optimize usage and reduce costs.
Maintain an inventory of all assets including hardware, software, and equipment
Track asset location, status, and usage to prevent loss or theft
Implement a system for asset tagging and labeling for easy identification
Regularly update asset records and conduct audits to ensure accuracy
Utilize asset managem...
Top trending discussions
I appeared for an interview in Oct 2017.
I have a strong technical knowledge in network and system engineering.
Extensive experience in configuring and troubleshooting network devices such as routers and switches
Proficient in setting up and maintaining servers, including virtualization technologies
Skilled in network security protocols and best practices
Familiar with scripting languages like Python for automation tasks
I am a detail-oriented, problem-solving individual with strong communication skills and a passion for technology.
Detail-oriented
Problem-solving
Strong communication skills
Passion for technology
I applied via Naukri.com and was interviewed before Mar 2022. There were 3 interview rounds.
The question asks for information about current salary, notice period, and expected salary.
Provide the current salary, notice period, and expected salary.
If you don't have the information, mention that you don't have the data.
Format the response in JSON.
I applied via Naukri.com and was interviewed before Aug 2020. There were 4 interview rounds.
Reversing a string involves rearranging its characters in the opposite order, which can be done using various methods.
Use built-in functions: In Python, you can reverse a string with slicing: `reversed_string = original_string[::-1]`.
Iterative approach: Loop through the string from the end to the beginning and build a new string.
Using recursion: Define a function that calls itself with a smaller substring until it reac...
I applied via Campus Placement and was interviewed in Aug 2021. There was 1 interview round.
Dynamic professional with diverse experience in management, team leadership, and strategic planning, eager to contribute to organizational success.
Over 5 years of experience in management roles, leading teams to achieve operational goals.
Successfully implemented a new project management system that improved efficiency by 30%.
Strong background in customer service, enhancing client satisfaction scores by 20% through effe...
Python is a high-level, interpreted programming language known for its simplicity, readability, and versatility.
Python is used for web development, data analysis, artificial intelligence, and more.
It has a large standard library and supports multiple programming paradigms.
Python code is often shorter and easier to read than other languages.
It uses indentation to indicate code blocks instead of curly braces or keywords.
...
High-level languages are programming languages that are easier to read and write than low-level languages.
High-level languages are closer to human language than machine language.
They are easier to learn and use than low-level languages.
Examples of high-level languages include Java, Python, and C++.
HCL Technologies is a leading global IT services company based in India, specializing in software development and IT consulting.
Founded in 1976, HCL is one of India's original IT services companies.
HCL operates in over 50 countries, providing services to clients across various industries.
The company focuses on innovation and has invested heavily in R&D, exemplified by its HCL Innovation Labs.
HCL's services include ...
posted on 2 Mar 2022
Good Practice
I appeared for an interview in Nov 2020.
Round duration - 120 minutes
Round difficulty - Medium
This was an online coding, mcq and debugging round round held on Amcat platform, there were 3 sections in the test.
1)20 MCQ questions {10 involving mathematics and the other 10 on programming fundamentals}; duration:20 mins;
you cannot navigate back to a questions after moving further, so have to answer carefully
2)debugging section- it involved 7 questions which were to be completed within 20 mins, 5 of them were very easy, each question only took almost a minute to figure out the problem with the code, last 2 questions were relatively moderate and there were errors at 3-4 sections of the entire code. I was able to solve all the questions in 15 mins
3)2 Coding questions- duration:80 mins, one was moderate on string while the other one involved dynamic programming, I was able to successfully execute all the available test cases.
Given two strings, S
and X
, your task is to find the smallest substring in S
that contains all the characters present in X
.
S = "abdd", X = "bd"
Find the smallest substring in S that contains all characters in X.
Use a sliding window approach to find the smallest window in S containing all characters of X.
Maintain a hashmap to keep track of characters in X and their frequencies.
Slide the window by moving the right pointer until all characters in X are found, then move the left pointer to minimize the window size.
Return the smallest window found.
Example: S = 'abd...
You are given a 2D matrix 'ARR' of size 'N x 3' with integers, where 'N' is the number of rows. Your task is to compute the smallest sum achievable by selecting one...
Find the smallest sum achievable by selecting one element from each row of a 2D matrix, following certain constraints.
Iterate through each row and find the minimum element that does not violate the constraints.
Keep track of the minimum sum achieved by selecting elements from each row.
Avoid selecting elements directly beneath previously selected elements.
Round duration - 45 minutes
Round difficulty - Hard
The interview started with introduction, there were two interviewers, they both introduced themselves and then asked me to introduce myself. Then we had a brief description on my projects, and they really appreciated my projects. Then as they were more concerned with DSA part, so we moved towards solving a coding problem. It was a famous rotten oranges problem with some change in language but as I haven't seen it beforehand, I wasn't able to give them an optimal approach and had to ask for some hints, but with a certain amount of help and hints, I was able to solve the problem and successfully coded it in 5 mins. Then the interviewers went for a dry run of the algorithm and tried to run it on each and every corner case, but as my algorithm was kind of bullet proof, it successfully passed all the corner cases.
Then they went for some questions on OOPS concepts involving inheritance and we had a long discussion on virtual function and runtime polymorphism. Then the interview was ended after a Q/A round that lasted for 3-4 minutes.
Given a grid containing oranges in three possible states:
Every second, any fresh orange adjac...
Given a grid with fresh and rotten oranges, determine the minimum time for all oranges to become rotten.
Create a queue to store the coordinates of rotten oranges and perform BFS to rot adjacent fresh oranges
Track the time taken to rot all oranges and return -1 if some fresh oranges remain
Handle edge cases like empty grid or no fresh oranges present
Example: For input grid = [[2,1,1],[1,1,0],[0,1,1]], the minimum time to...
Tip 1 : Try to keep yourself involved in competitive programming on regular basis {ex-Codechef, codeforces etc}
Tip 2 : brush up concepts on DSA and practice at least all questions from interviewbit and around 300 questions from GFG and Leetcode of upto intermediate level, this will help you in building your concepts and you will be quickly able to answer the questions in face to face interviews
Tip 3 : Complete some courses on data structures and algorithms and some programming languages{coding ninjas courses are preferable for valuable content}
Tip 1 : Try to keep only those things in resume on which you have very good command and you should be able to answer all of the questions(upto moderate level) related to your technical skills
Tip 2 : Mention your projects with brief description, try avoiding very high level description because some times reader might not be able to understand your work, keep it descriptive and understandable
posted on 26 May 2022
I applied via Approached by Company and was interviewed before May 2021. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Nov 2021. There were 4 interview rounds.
MCQ's and Coding Problem - 1 related with Java, RDBMS, JS
Some of the top questions asked at the Designway Network & System Engineer interview -
based on 1 interview experience
Difficulty level
Duration
based on 1 review
Rating in categories
Software Developer
6
salaries
| ₹3 L/yr - ₹7.1 L/yr |
Network & System Engineer
4
salaries
| ₹3 L/yr - ₹4.5 L/yr |
DOT NET Developer
4
salaries
| ₹4 L/yr - ₹9.8 L/yr |
Software Tester
3
salaries
| ₹4.8 L/yr - ₹5 L/yr |
Junior Frontend Developer
3
salaries
| ₹1.8 L/yr - ₹2.9 L/yr |
TCS
Accenture
Wipro
Cognizant