i
Wipro
Filter interviews by
Regarding group discussion & system knowledge.
I applied via Naukri.com and was interviewed in Apr 2021.Β There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Feb 2021.Β There were 3 interview rounds.
posted on 27 Oct 2021
I applied via LinkedIn and was interviewed before Oct 2020.Β There was 1 interview round.
Patching physical servers involves identifying vulnerabilities, testing patches, scheduling downtime, and applying patches.
Identify vulnerabilities through vulnerability scanning or manual review
Test patches in a non-production environment to ensure compatibility and stability
Schedule downtime with stakeholders and communicate the impact of the patching
Apply patches using a patch management tool or manually
Verify the s...
Patching rollback can be done by identifying the patch, uninstalling it, and restoring the previous version.
Identify the patch that caused the issue
Uninstall the patch using the appropriate command
Restore the previous version of the software or package
Test to ensure the issue has been resolved
What people are saying about Wipro
posted on 13 Apr 2022
I applied via Company Website and was interviewed before Apr 2021.Β There were 2 interview rounds.
Quantitative aptitude and logical aptitude test
There will be 2 code and you need to understand and input missing lines then run it, after successful completion you will be selected for round 3. You need to run at least 1 code successfully.
Scheduling an interview can vary based on availability and coordination between parties involved.
Check the availability of both the interviewer and the candidate.
Consider time zones if the parties are in different locations.
Use scheduling tools like Calendly or Doodle to streamline the process.
Typically, scheduling can take anywhere from a few hours to a few days.
I applied via Referral and was interviewed before Jul 2021.Β There was 1 interview round.
I appeared for an interview in Apr 2022.
I applied via Recruitment Consultant and was interviewed in Apr 2021.Β There was 1 interview round.
LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.
LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.
It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.
LVM enables dynamic allocation of storage space, making it easier to add or remov...
LVM (Logical Volume Manager) is configured by creating physical volumes, volume groups, and logical volumes.
Create physical volumes using the 'pvcreate' command
Create volume groups using the 'vgcreate' command
Create logical volumes using the 'lvcreate' command
Format the logical volumes with a file system using the 'mkfs' command
Mount the logical volumes to desired mount points using the 'mount' command
Update the '/etc/...
Decommission is the process of retiring a system or service, while recommission is the process of bringing it back into service.
Decommission involves shutting down and removing a system or service from operation.
Recommission involves restoring a decommissioned system or service back into operation.
Decommission and recommission are common processes in IT infrastructure management.
Examples include retiring an old server ...
A user can be created in a single line command using the 'useradd' command in Linux.
Use the 'useradd' command followed by the username to create a user.
Specify additional options like home directory, shell, etc. if required.
Example: useradd john -m -s /bin/bash
Possible causes of user not able to login to an application
Incorrect username or password
Account locked or disabled
Expired password
Network connectivity issues
Application server down
Incorrect permissions or access rights
Firewall blocking access
Authentication server issues
Application configuration errors
To set the password for a newly created user in Linux, use the 'passwd' command followed by the username.
Open the terminal or SSH into the Linux system
Run the 'passwd' command followed by the username of the new user
Enter and confirm the new password when prompted
An I node number is a unique identifier assigned to each file in a Unix-like file system.
I node number is also known as index node number.
It contains metadata about the file such as ownership, permissions, timestamps, etc.
It is used by the operating system to locate and access the file on the disk.
The command 'ls -i' can be used to display the I node number of a file.
based on 1 interview experience
based on 64 reviews
Rating in categories
Project Engineer
33.3k
salaries
| βΉ3.2 L/yr - βΉ7.5 L/yr |
Senior Software Engineer
23.6k
salaries
| βΉ6.7 L/yr - βΉ19.5 L/yr |
Senior Associate
21.6k
salaries
| βΉ1.8 L/yr - βΉ5.7 L/yr |
Technical Lead
20.6k
salaries
| βΉ16.6 L/yr - βΉ30 L/yr |
Senior Project Engineer
18.5k
salaries
| βΉ6.4 L/yr - βΉ18.5 L/yr |
TCS
Infosys
Tesla
Amazon