Allied Digital Services
40+ Krishnae Infrastructure Interview Questions and Answers
Q1. What is mac address? How many mac in router?
A MAC address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
MAC stands for Media Access Control
It is a 48-bit address
It is used to uniquely identify devices on a network
A router can have multiple MAC addresses, one for each interface
MAC addresses are usually represented in hexadecimal format
Example: 00:1A:2B:3C:4D:5E
Q2. How to Install outlook through POP3/IMAP process?
Outlook can be installed through POP3/IMAP process by configuring the email account settings in Outlook.
Open Outlook and go to File > Add Account
Select 'Manual setup or additional server types' and click Next
Choose POP or IMAP and enter the email account details
Configure the incoming and outgoing server settings
Click on 'More Settings' and configure additional settings if required
Test the account settings and click Finish to complete the setup
Q3. What ipv6? How many are classes?
IPv6 is the latest version of Internet Protocol. There are no classes in IPv6.
IPv6 is a 128-bit address scheme, compared to IPv4's 32-bit address scheme.
IPv6 addresses are written in hexadecimal notation.
IPv6 uses a different header format than IPv4.
Unlike IPv4, there are no classes in IPv6 addressing.
Q4. Difference between private and public network?
Private networks are restricted to a specific group of users while public networks are open to everyone.
Private networks are commonly used in businesses, schools, and homes to share resources within a limited group of people.
Public networks are accessible to anyone and are commonly used in public places like coffee shops, airports, and libraries.
Private networks are more secure than public networks as they have restricted access and are protected by firewalls and other securi...read more
Q5. What is the latest version of windows 10?
The latest version of Windows 10 is version 21H1.
Version 21H1 was released in May 2021.
It includes new features such as Windows Hello multicamera support and improvements to Windows Defender Application Guard.
It also includes security updates and bug fixes.
Q6. What is dns? How it works?
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is like a phonebook for the internet, translating human-readable domain names into machine-readable IP addresses.
DNS works by using a hierarchical system of servers to look up and resolve domain names.
When you type a domain name into your browser, your computer sends a request to a DNS resolver, which then queries DNS servers to find the IP address associated with that domain ...read more
Q7. What is smb? How it works?
SMB stands for Server Message Block, a protocol used for file sharing and printer sharing in a network.
SMB is used for sharing files and printers between computers in a network.
It allows multiple users to access the same resources simultaneously.
SMB operates on the application layer of the OSI model.
It uses TCP/IP as the underlying transport protocol.
SMB has evolved over the years and the latest version is SMB3.
Examples of SMB implementations include Windows file sharing and ...read more
Q8. What can you tell us about TCP/IP stack? How is it different than OSI Model.
TCP/IP stack is a set of protocols used for communication over the internet, while OSI Model is a conceptual framework for understanding network communication.
TCP/IP stack is a practical implementation of networking protocols used for communication over the internet.
It consists of four layers: Application, Transport, Internet, and Link.
Each layer has its own set of protocols and functions, such as HTTP, TCP, IP, and Ethernet.
OSI Model, on the other hand, is a theoretical fram...read more
Q9. What is domain?
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain is a logical grouping of network resources such as computers, printers, and servers.
It allows for centralized management of users, computers, and security policies.
Domains are commonly used in Windows environments and are identified by a unique name, such as example.com.
Users within a domain can access resources on any computer within that domain...read more
Q10. How do you power on an smps without plug it in?
You cannot power on an SMPS without plugging it in.
It is not possible to power on an SMPS without plugging it in.
An SMPS requires a power source to function.
Attempting to power on an SMPS without plugging it in can be dangerous and should not be attempted.
Q11. What is biggest challenge while managing client
The biggest challenge while managing a client is to meet their expectations and maintain a good relationship.
Understanding the client's needs and requirements
Ensuring timely delivery of services
Maintaining effective communication
Managing conflicts and resolving issues
Adapting to changes in client's expectations
Building trust and maintaining a good relationship
Q12. What are the technologies and tools used to manage a transition project?
Various technologies and tools are used to manage a transition project, including project management software, communication tools, and data analytics platforms.
Project management software such as Microsoft Project or Asana is used to create and track project plans.
Communication tools like Slack or Microsoft Teams help team members collaborate and stay connected.
Data analytics platforms like Tableau or Power BI can be used to analyze project data and make informed decisions.
C...read more
Q13. What is routing protocol
Routing protocol is a set of rules that determine how data is transmitted between devices on a network.
Routing protocols are used to facilitate communication between different networks.
They determine the best path for data to travel from one network to another.
Examples of routing protocols include OSPF, BGP, and RIP.
Routing protocols can be classified as either interior gateway protocols (IGPs) or exterior gateway protocols (EGPs).
Q14. Why is router .?
A router is a networking device that forwards data packets between computer networks.
Routers connect multiple networks together.
They determine the best path for data packets to travel.
Routers use routing tables to make forwarding decisions.
They provide network address translation (NAT) to allow multiple devices to share a single public IP address.
Routers can prioritize certain types of network traffic for better performance.
Examples of routers include Cisco routers, TP-Link r...read more
Q15. What is meant by mac address?
A MAC address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
MAC stands for Media Access Control
It is a 48-bit address, usually represented in hexadecimal format
It is used to identify devices on a network
It is assigned by the manufacturer of the network interface controller
Example: 00:1A:2B:3C:4D:5E
Q16. What is Microsoft Outlook?
Microsoft Outlook is a personal information manager and email client developed by Microsoft.
It allows users to send and receive emails
It has a calendar feature for scheduling appointments and meetings
It can manage contacts and tasks
It integrates with other Microsoft Office applications
It supports various email protocols such as POP, IMAP, and Exchange
It has a search feature for finding specific emails or information
Q17. How file server works explain in detail
A file server is a computer that stores and manages files for multiple users on a network.
File server acts as a central repository for files and data
Users can access files on the server from their own computers
File server can be accessed remotely over the internet
File server can be configured with different levels of access for different users
File server can be backed up regularly to prevent data loss
Q18. How to identify SMPS working or not with help of only power cord and smps.
To identify if SMPS is working or not with only power cord and SMPS, check for LED light and fan movement.
Check if the LED light on the SMPS is on
Listen for the sound of the fan movement
Check if the SMPS is heating up
Use a multimeter to check the voltage output
Check if the computer or device is receiving power
Q19. Whya is the main use of polymorphism in current coding practices
Polymorphism allows for flexibility and reusability in coding by enabling objects to be treated as instances of their parent class.
Polymorphism allows for code reusability by enabling objects to be treated as instances of their parent class.
It allows for flexibility in coding as different objects can be treated as instances of a common superclass.
Polymorphism enables the use of interfaces to define common behavior that multiple classes can implement.
Example: In a program with...read more
Q20. How to replace fusior in a printer?
To replace a fuser in a printer, follow these steps carefully.
Turn off the printer and unplug it from the power source.
Open the printer cover and locate the fuser unit.
Remove the screws or clips holding the fuser in place.
Carefully pull out the old fuser and replace it with a new one.
Secure the new fuser in place with screws or clips.
Close the printer cover and plug the printer back in.
Turn on the printer and test if the new fuser is working properly.
Q21. What is nfs server?
NFS server is a network file system server that allows clients to access files over the network as if they were on the local machine.
NFS stands for Network File System.
It is a distributed file system protocol that allows a user on a client computer to access files over a network as if those files were on the local computer.
The NFS server is responsible for managing the shared file system and making it available to clients.
It is commonly used in Unix and Linux environments.
Exa...read more
Q22. Deff between pst and ost file?
PST and OST files are both used by Microsoft Outlook to store email data, but they differ in their location and usage.
PST files are stored locally on a user's computer and can be used for archiving or backing up email data.
OST files are used for offline access to email data and are stored on a server.
PST files can be imported or exported to transfer email data between computers or accounts.
OST files are automatically created when a user sets up an email account in Outlook and...read more
Q23. How to Install dual boot?
To install dual boot, create a partition, install the second OS on it, and configure the boot loader.
Create a partition on the hard drive for the second OS
Install the second OS on the newly created partition
Configure the boot loader to allow selection of the OS at startup
Ensure that both OSes are compatible with each other
Q24. What is switch
A switch is a networking device that connects devices together on a computer network.
Switches operate at the data link layer of the OSI model.
They use MAC addresses to forward data to the correct destination.
Switches can improve network performance by reducing network congestion.
Examples of switches include Cisco Catalyst and Juniper EX Series switches.
Q25. What is DHCP?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP assigns IP addresses to devices on a network
It also provides other network configuration information such as subnet mask and default gateway
DHCP servers can be configured to reserve specific IP addresses for certain devices
DHCP leases have a set expiration time and must be renewed periodically
DHCP can help simplify network administration by aut...read more
Q26. What is ping, tcp/udp,static ip and dynemic ip
Ping is a network utility used to test connectivity. TCP/UDP are protocols used for data transmission. Static IP is a fixed IP address assigned to a device. Dynamic IP is an IP address assigned by DHCP.
Ping is used to check if a device is reachable on a network.
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are used for sending data over a network.
Static IP is manually assigned to a device and remains the same unless changed.
Dynamic IP is assigned by a D...read more
Q27. What is inheritance and its benefits in real world
Inheritance is the passing down of assets, properties, or rights from one individual to another after their death.
Inheritance allows for the transfer of wealth and property within families.
It can provide financial security for future generations.
Inheritance can also include passing down family traditions, values, and heirlooms.
Beneficiaries of inheritance may use the assets received to invest, start a business, or further their education.
Inheritance laws vary by country and c...read more
Q28. What is Ad replication
Ad replication is the process of copying Active Directory data from one domain controller to another.
Ad replication ensures that all domain controllers in a network have the same information about user accounts, computers, and other objects.
It is important for maintaining consistency and avoiding data loss.
Replication can occur automatically or manually, and can be configured to occur at specific intervals.
Examples of data that can be replicated include passwords, group membe...read more
Q29. What is PST & OST?
PST & OST are file formats used by Microsoft Outlook to store email data.
PST stands for Personal Storage Table and is used to store email data on a local computer.
OST stands for Offline Storage Table and is used to store email data when Outlook is used in cached mode.
PST files can be imported and exported to transfer email data between computers.
OST files are automatically created when Outlook is used in cached mode and can be rebuilt if corrupted.
Both PST and OST files can b...read more
Q30. How to find critical issue in application
To find critical issues in an application, thorough testing, monitoring, and analyzing user feedback are essential.
Perform thorough testing of all functionalities and scenarios
Monitor application performance and logs for any anomalies
Analyze user feedback and reported issues to prioritize critical issues
Use debugging tools and techniques to identify root causes of critical issues
Q31. What is active directory?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources such as users, computers, and printers.
It provides authentication and authorization for network users.
It allows administrators to manage network resources from a central location.
It uses a hierarchical structure of domains and organizational units (OUs) to organize resources.
It supports group policies that can be used to enforce security set...read more
Q32. SMPS failure, What need to do
Check power supply, replace SMPS if necessary
Check power cord and connections
Test power outlet with another device
Replace SMPS if it is not functioning properly
Q33. Types of ip address
There are two types of IP addresses: IPv4 and IPv6.
IPv4 addresses are 32-bit and expressed in dotted decimal notation (e.g. 192.168.0.1)
IPv6 addresses are 128-bit and expressed in hexadecimal notation (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Q34. How to check a SMPS?
To check a SMPS, you can use a multimeter to test the voltage output and check for any physical damage.
Use a multimeter to test the voltage output of the SMPS
Check for any physical damage such as burnt components or bulging capacitors
Ensure all connections are secure and properly plugged in
Listen for any unusual noises coming from the SMPS during operation
Q35. Dhcp dora process in detail
DHCP DORA process is a four-step process that enables a client to obtain an IP address from a DHCP server.
DORA stands for Discover, Offer, Request, and Acknowledge.
The client sends a broadcast Discover message to locate available DHCP servers.
The server responds with an Offer message containing an available IP address.
The client sends a Request message to request the offered IP address.
The server sends an Acknowledge message to confirm the IP address assignment.
The client the...read more
Q36. What is DHCP and it's functioning
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP assigns IP addresses to devices on a network dynamically
It helps in reducing the manual effort of assigning IP addresses
DHCP servers lease IP addresses to devices for a specific period of time
DHCP also provides other network configuration information like subnet mask, default gateway, DNS server
Example: When a device connects to a ...read more
Q37. What are different IP classes?
IP classes are categories of IP addresses used to identify networks and hosts.
There are five classes of IP addresses: A, B, C, D, and E.
Classes A, B, and C are commonly used for host addresses, while classes D and E are reserved for special purposes.
Each class has a different range of possible IP addresses.
Class A addresses start with 1-126, Class B addresses start with 128-191, and Class C addresses start with 192-223.
Classes D and E are used for multicast and experimental p...read more
Q38. What is Network?
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.
Networks can be classified based on their size (LAN, WAN, MAN)
Networks can be wired or wireless
Examples of networks include the internet, intranets, and extranets
Q39. Explain what is VPN?
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure and encrypted connection between the user's device and the private network.
It helps in protecting sensitive data from unauthorized access or interception.
VPN can be used to access region-restricted websites or services.
Common VPN protocols include OpenVPN, L2TP/IPsec, and PPTP.
Q40. What is dns and dhcp
DNS is a system that translates domain names to IP addresses. DHCP is a protocol that assigns IP addresses to devices on a network.
DNS stands for Domain Name System
DNS translates domain names to IP addresses
DHCP stands for Dynamic Host Configuration Protocol
DHCP assigns IP addresses to devices on a network
DNS and DHCP are both essential components of network infrastructure
Q41. What's is domain and workgroup
A domain is a group of computers that share a common security database, while a workgroup is a smaller group of computers that share resources.
Domain is used in a business environment for centralized management of users, computers, and resources
Workgroup is used in a small network where each computer has its own security settings
Example: A company may have a domain for all employees to access shared resources, while a home network may use a workgroup for sharing files
Q42. Explain SIEM architecture
SIEM architecture refers to the design and structure of a Security Information and Event Management system.
SIEM architecture typically consists of data collection, normalization, correlation, and analysis components.
Data collection involves gathering security event data from various sources such as logs, network traffic, and endpoints.
Normalization standardizes the collected data into a common format for easier analysis and correlation.
Correlation involves identifying pattern...read more
Q43. Explain Fsmo roles
FSMO (Flexible Single Master Operations) roles are specialized domain controller tasks in Active Directory.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master: responsible for maintaining and modifying the Active Directory schema.
Domain Naming Master: responsible for adding or removing domains in the forest.
RID Master: responsible for allocating RIDs (Relative Identifiers) to domain controllers.
PDC Emu...read more
Q44. How to take remote
To take remote, use remote desktop software like TeamViewer or Remote Desktop Connection.
Install remote desktop software on both the local and remote computers.
Obtain the remote computer's IP address or ID.
Enter the remote computer's IP address or ID in the remote desktop software.
Establish a connection and enter the required credentials to access the remote computer.
Once connected, you can control the remote computer as if you were physically present.
Q45. Brefly explain our company
Our company is a leading financial services firm specializing in investment management and advisory services.
Specializes in investment management and advisory services
Offers a wide range of financial products and solutions
Has a strong reputation in the industry for delivering high-quality services
Serves a diverse client base including individuals, corporations, and institutions
Top HR Questions asked in Krishnae Infrastructure
Interview Process at Krishnae Infrastructure
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month