CMS IT Services
90+ Interview Questions and Answers
Q1. How to know the hostname of client system through the remote system.
To know the hostname of a client system through a remote system, use the command prompt or PowerShell.
Open the command prompt or PowerShell on the remote system
Type 'nslookup
' The hostname of the client system will be displayed
Alternatively, use the 'ping -a
' command to display the hostname
Q2. What is MAC address and IP address ?
MAC address is a unique identifier assigned to a network interface controller, while IP address is a numerical label assigned to devices connected to a network.
MAC address stands for Media Access Control address
It is a 48-bit address assigned to a network interface controller
It is used to identify devices on a network
IP address stands for Internet Protocol address
It is a numerical label assigned to devices connected to a network
It is used to identify devices and enable commun...read more
Q3. Where we can see system \ application error logs??
System and application error logs can be found in various locations.
System logs can be found in Event Viewer on Windows or Console on macOS.
Application logs can be found in the application's installation directory or in a designated log folder.
Third-party tools like Splunk or ELK can also be used to aggregate and analyze logs.
Logs can also be accessed remotely through SSH or other remote access protocols.
Q4. How to install os in desktop?
To install OS in desktop, create a bootable USB or DVD, insert it into the desktop, and follow the installation prompts.
Download the OS image file from the official website
Create a bootable USB or DVD using software like Rufus or Windows Media Creation Tool
Insert the bootable USB or DVD into the desktop and restart it
Press the key to enter the boot menu and select the USB or DVD as the boot device
Follow the installation prompts and select the desired options like language, ti...read more
Q5. What is ip address, subnet, vpn, cloud computing.
IP address is a unique identifier for devices on a network. Subnet is a way to divide a network. VPN is a secure connection over the internet. Cloud computing is using remote servers to store, manage, and process data.
IP address is a numerical label assigned to each device on a network
Subnet is a way to divide a network into smaller subnetworks
VPN is a secure way to connect to a network over the internet
Cloud computing is using remote servers to store, manage, and process dat...read more
Q6. How many classes have IP address ?
There are three classes of IP addresses: A, B, and C.
Class A addresses start with 1-126 and have a subnet mask of 255.0.0.0
Class B addresses start with 128-191 and have a subnet mask of 255.255.0.0
Class C addresses start with 192-223 and have a subnet mask of 255.255.255.0
Q7. What is SSD, HHD, size of 1 gb, etc.
SSD and HDD are types of storage devices. 1 GB is a unit of storage capacity.
SSD stands for Solid State Drive and uses flash memory to store data.
HDD stands for Hard Disk Drive and uses spinning disks to store data.
1 GB is equal to 1024 MB or 1000 MB depending on the context.
SSDs are faster and more expensive than HDDs.
HDDs have larger storage capacities and are cheaper than SSDs.
Q8. What is cloud computing and types?
Cloud computing is the delivery of computing services over the internet.
Types of cloud computing include public, private, and hybrid clouds.
Public clouds are owned and operated by third-party providers, while private clouds are dedicated to a single organization.
Hybrid clouds combine public and private clouds to allow for greater flexibility and scalability.
Examples of cloud computing services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Q9. Where momory dum log store?
Memory dump logs store in the hard disk or SSD of the computer.
Memory dump logs are created when a system crashes or encounters a critical error.
These logs contain information about the state of the system at the time of the crash.
They can be used by support engineers to diagnose and troubleshoot issues.
The location of the logs may vary depending on the operating system and configuration.
Q10. What is a Help Desk? ... What are the different forms of a help desk? ... Name a few self-management skills for Help Desk Analyst? ... How important IT skills are in help desk service and how you keep yourself ...
read moreQ11. How to data backup when os is courrtp
Data backup when OS is corrupt
Boot from a live CD/USB and backup data to an external drive
Use a data recovery software to extract data from the corrupt OS
Connect the hard drive to another computer and backup data
Use cloud storage services to backup important data regularly
Q12. What is client outlook configurarion
Client Outlook configuration refers to the setup and customization of the Microsoft Outlook email client for a specific user or organization.
Configuration includes setting up email accounts, creating rules and filters, customizing the user interface, and managing contacts and calendars.
Outlook can be configured to work with various email protocols such as POP, IMAP, and Exchange.
Configuration can be done manually or through automated tools such as Group Policy.
Examples of con...read more
Q13. What is the difference between RAM and HRD DRIVE?
RAM is a volatile memory used for temporary storage while HRD DRIVE is a non-volatile memory used for permanent storage.
RAM stands for Random Access Memory while HRD DRIVE stands for Hard Disk Drive.
RAM is faster but smaller in capacity while HRD DRIVE is slower but larger in capacity.
RAM loses its data when power is turned off while HRD DRIVE retains its data even when power is off.
RAM is used for temporary storage of data while HRD DRIVE is used for permanent storage of dat...read more
Q14. What's steps are perform when you recieved call of my system in not on?
When receiving a call that a system is not on, perform the following steps:
Verify if the power cable is properly connected
Check if the power outlet is functioning
Ensure the power button is pressed or try a different power source
Inspect the power supply unit for any issues
Test the system with a different power cable or adapter
Q15. How to install macfee drive incrption
McAfee Drive Encryption can be installed by following a few simple steps.
Download the McAfee Drive Encryption software from the official website
Run the installer and follow the on-screen instructions
Configure the encryption settings according to your requirements
Activate the software using the license key provided
Restart the system to complete the installation process
Q16. How oracle architecture is work. How to check if user password expired If dataguard not in synch what steps to follow and synch the standby database from primary. What is ASM and how to start and stop ASM. How ...
read moreOracle architecture is a multi-tiered structure that includes the client, application server, and database server.
Oracle architecture consists of multiple components such as the client, application server, and database server.
The client sends requests to the application server, which in turn communicates with the database server.
The database server manages the storage, retrieval, and manipulation of data.
Oracle architecture follows a client-server model.
The client can be a us...read more
Q17. What is Dns? What is DHCP? Which port is useing smtp?
DNS is a system that translates domain names into IP addresses. DHCP is a protocol that assigns IP addresses to devices on a network. SMTP uses port 25.
DNS stands for Domain Name System
It translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1)
DHCP stands for Dynamic Host Configuration Protocol
It automatically assigns IP addresses to devices on a network
SMTP stands for Simple Mail Transfer Protocol
It is used for sending email messages
SMTP uses por...read more
Q18. Define colour stright through cable? If os corrupt. How it is resolved?
A color straight through cable is a type of Ethernet cable used to connect devices in a network.
A color straight through cable is also known as a patch cable or a straight-through cable.
It is used to connect devices such as computers, switches, and routers in a network.
The cable has the same pin configuration on both ends, allowing for direct device-to-device connections.
The color coding of the cable follows the T568A or T568B standard, which ensures proper connectivity.
If th...read more
Q19. What is switch & Ip Address.
A switch is a networking device that connects devices together in a network. An IP address is a unique identifier assigned to each device on a network.
A switch is used to connect multiple devices in a network and allows them to communicate with each other.
It operates at the data link layer of the OSI model.
An IP address is a numerical label assigned to each device on a network that uses the Internet Protocol for communication.
It consists of four sets of numbers separated by d...read more
Q20. 1. What is RAM device?
RAM stands for Random Access Memory, a type of computer memory that allows data to be accessed in any order.
RAM is volatile memory, meaning it loses its data when power is turned off
It is used to temporarily store data that the CPU needs to access quickly
Examples of RAM devices include DIMMs, SODIMMs, and DDR memory modules
Q21. What is trouble shooting and IP address?
Troubleshooting is the process of identifying and resolving problems or issues within a system. An IP address is a unique numerical identifier assigned to each device connected to a network.
Troubleshooting involves identifying the root cause of a problem and finding a solution.
IP address is a 32-bit number that identifies a device on a network.
IP addresses can be either static or dynamic.
Troubleshooting network issues often involves checking IP addresses and network configura...read more
Q22. 2. What is Blue Screen issue ? What are error codes of Blue screen?
Blue Screen issue is a critical error that causes the computer to shut down or restart unexpectedly.
It is also known as the Blue Screen of Death (BSOD).
It is caused by a system crash or a hardware failure.
The error codes on a Blue Screen can vary depending on the cause of the issue.
Some common error codes include: 0x0000001A, 0x0000007B, and 0x00000050.
Troubleshooting steps include checking for hardware issues, updating drivers, and running system diagnostics.
Q23. What is ping command
Ping command is a network utility tool used to test the connectivity between two devices on a network.
Ping sends a small packet of data to a specific IP address or hostname and waits for a response.
It measures the time taken for the packet to travel from the source to the destination and back.
Ping is commonly used to troubleshoot network connectivity issues.
Ping can also be used to determine the IP address of a website or server.
Ping can be executed from the command prompt on...read more
Q24. How to start spms shorting
SPMS shorting can be started by following a few simple steps.
Ensure that all devices are turned off and unplugged.
Connect the SPMS cables to the appropriate ports on the devices.
Turn on the devices and check for proper connectivity.
If there are any issues, troubleshoot and recheck connections.
Once everything is working properly, the SPMS shorting has been successfully started.
Q25. 3. What is office365 & their features ( Licenses : E1 , E3,E5)
Office365 is a cloud-based subscription service that provides access to various Microsoft applications and services.
Office365 includes popular applications like Word, Excel, PowerPoint, and Outlook
It also includes cloud-based services like OneDrive, SharePoint, and Teams
E1 license includes email, calendar, and online meetings
E3 license includes all E1 features plus desktop versions of Office applications and advanced security features
E5 license includes all E3 features plus a...read more
Q26. What are the latest windows os?
The latest Windows OS are Windows 10 and Windows 11.
Windows 10 was released in 2015 and is still widely used.
Windows 11 was released in 2021 and has new features like Snap Layouts and Snap Groups.
Both OS have regular updates and support from Microsoft.
Q27. What is proxy server?
A proxy server acts as an intermediary between clients and servers, forwarding requests and responses.
Proxy server acts as a middleman between clients and servers
It forwards client requests to the appropriate server
It caches data to improve performance
It can be used for filtering and blocking certain content
Examples: Squid, Nginx, Apache HTTP Server
Q28. What is server and Back-up device?
A server is a computer program or device that provides functionality for other programs or devices. A backup device is used to store copies of important data.
A server is a computer program or device that provides services or resources to other devices or programs on a network.
Servers can be used for various purposes such as hosting websites, storing data, or running applications.
A backup device is used to create copies of important data to protect against data loss in case of...read more
Q29. If you want to become part of CMS IT service to support end user
I am interested in becoming part of CMS IT service to support end users.
I have experience in troubleshooting technical issues
I am familiar with various operating systems and software applications
I have excellent communication skills to provide effective support to end users
I am willing to learn and adapt to new technologies and processes
I am a team player and can work collaboratively with other IT professionals
Q30. What is BSOD, & Hardware
BSOD stands for Blue Screen of Death. Hardware refers to the physical components of a computer system.
BSOD is a critical error that causes a blue screen to appear on a computer screen.
It usually indicates a hardware or software issue that has caused the system to crash.
Hardware refers to the physical components of a computer system, such as the motherboard, CPU, RAM, and hard drive.
Issues with hardware can cause a variety of problems, including slow performance, crashes, and ...read more
Q31. What is RAM?, What is Router, What is Switch
RAM is a type of computer memory. Router and switch are networking devices used to connect devices in a network.
RAM stands for Random Access Memory and is used to temporarily store data that the computer is currently using.
Router is a networking device that connects multiple networks and routes data packets between them. It operates at the network layer of the OSI model.
Switch is a networking device that connects devices in a network and forwards data packets between them. It...read more
Q32. How to assemble new system
To assemble a new system, start by preparing the components and tools, then install the CPU, RAM, and storage, followed by the motherboard and power supply.
Prepare components and tools
Install CPU, RAM, and storage
Install motherboard and power supply
Connect cables and peripherals
Install operating system and drivers
Q33. 2.What is the ost and pst in Ms office
OST and PST are file formats used by Microsoft Outlook to store email data.
OST stands for Offline Storage Table and is used for offline access to email data.
PST stands for Personal Storage Table and is used for archiving email data.
OST files are created when Outlook is used in Cached Exchange Mode.
PST files can be imported or exported to transfer email data between computers or accounts.
Q34. What is vpn? Which port use for DNS service?
VPN stands for Virtual Private Network. It provides a secure and encrypted connection over a public network.
VPN allows users to access a private network remotely.
It creates a secure tunnel between the user's device and the network.
VPN masks the user's IP address and encrypts the data transmitted.
It is commonly used for remote work, accessing geo-restricted content, and enhancing online privacy.
Examples of VPN protocols include OpenVPN, IPSec, and L2TP.
Q35. How to configure DHCP
DHCP can be configured by accessing the DHCP server settings and defining IP address ranges, lease durations, and other network parameters.
Access the DHCP server settings
Define IP address ranges
Set lease durations
Configure other network parameters
Q36. 1. What is BIOS ? What options under Advance Boot?
BIOS is a firmware that initializes hardware during booting. Advanced Boot options include Safe Mode, Last Known Good Configuration, etc.
BIOS stands for Basic Input/Output System
It is a firmware that initializes hardware during booting
Advanced Boot options include Safe Mode, Last Known Good Configuration, etc.
BIOS can be accessed by pressing a specific key during booting (usually F2 or Del)
BIOS settings can be used to configure hardware components such as CPU, RAM, hard drive...read more
Q37. How to come Blue screen error
Blue screen errors can occur due to hardware or software issues, causing the system to crash and display a blue screen with an error message.
Blue screen errors can be caused by hardware failures such as faulty RAM or hard drive issues.
Software conflicts or driver issues can also lead to blue screen errors.
Overheating or power supply problems can trigger blue screen errors.
Examples: DRIVER_IRQL_NOT_LESS_OR_EQUAL, PAGE_FAULT_IN_NONPAGED_AREA, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Q38. What is ROM device?
ROM stands for Read-Only Memory. It is a type of computer memory that stores data permanently and cannot be modified.
ROM is non-volatile memory, meaning it retains data even when the power is turned off.
It is used to store firmware, which is software that is permanently programmed into a hardware device.
ROM is commonly found in devices like game consoles, smartphones, and computers.
Examples of ROM include CD-ROM, DVD-ROM, and ROM chips on computer motherboards.
Q39. 1. You know office365 and how to configure
Yes, I am familiar with Office365 and can configure it.
I have experience with setting up and managing Office365 accounts
I am proficient in configuring Exchange Online, SharePoint Online, and OneDrive for Business
I am familiar with PowerShell commands for Office365 administration
I can troubleshoot and resolve issues related to Office365 services
Q40. What is hard drive?
A hard drive is a storage device used to store and retrieve digital information on a computer.
It is a non-volatile storage device.
It consists of one or more rotating disks called platters.
Data is stored magnetically on the platters using read/write heads.
Hard drives have a higher storage capacity compared to other storage devices like solid-state drives (SSDs).
Examples of hard drive interfaces include SATA, SCSI, and IDE.
Q41. What is different hasmap and has table
HashMap and HashTable are both data structures in Java used to store key-value pairs, but HashMap is not synchronized and allows null keys/values, while HashTable is synchronized and does not allow null keys/values.
HashMap is not synchronized, while HashTable is synchronized
HashMap allows null keys and values, while HashTable does not
HashMap is faster than HashTable
HashMap is part of Java Collections framework, while HashTable is a legacy class
Q42. What is difference between TNS and LISTENER?
TNS is a network protocol used to connect to Oracle databases, while LISTENER is a process that listens for incoming connection requests.
TNS (Transparent Network Substrate) is a protocol used to establish connections between clients and Oracle databases.
LISTENER is a process that runs on the database server and listens for incoming connection requests.
TNS resolves the service name to the database's network address, allowing clients to connect.
LISTENER receives connection requ...read more
Q43. What is AD, DHCP, DNS, Outlook configuration.
AD, DHCP, DNS, and Outlook configuration are all essential components of a network infrastructure.
AD (Active Directory) is a Microsoft service that manages users, computers, and other resources on a network.
DHCP (Dynamic Host Configuration Protocol) is a network protocol that assigns IP addresses to devices on a network.
DNS (Domain Name System) is a service that translates domain names into IP addresses.
Outlook configuration involves setting up email accounts, calendars, and ...read more
Q44. How to join domain
To join a domain, go to System Properties, click on the Computer Name tab, click on the Change button, enter the domain name, and provide credentials.
Go to System Properties
Click on the Computer Name tab
Click on the Change button
Enter the domain name
Provide credentials
Q45. How to synchronise routing from ospf to bgp?
To synchronize routing from OSPF to BGP, redistribute OSPF routes into BGP and adjust metrics accordingly.
Redistribute OSPF routes into BGP using route redistribution commands
Adjust metrics to ensure BGP routes are preferred over OSPF routes
Use route maps to filter and manipulate routes during redistribution
Q46. How to Asset manage ?
Asset management involves tracking and maintaining an organization's physical and digital assets.
Create an inventory of all assets, including hardware, software, and licenses.
Assign unique identifiers to each asset for easy tracking.
Implement a centralized database or system to store asset information.
Regularly update asset records to reflect changes, such as additions, removals, or transfers.
Perform audits to ensure accuracy and identify any discrepancies.
Utilize asset manag...read more
Q47. What have you done in presales?
I have worked extensively in presales, including conducting product demos, creating proposals, and collaborating with sales teams.
Conducted product demos for potential clients
Created proposals and presentations tailored to client needs
Collaborated with sales teams to develop strategies for closing deals
Provided technical expertise and support to sales teams
Managed relationships with key clients and stakeholders
Q48. What is LAN and WAN?
LAN stands for Local Area Network and WAN stands for Wide Area Network.
LAN is a network that connects devices within a limited area such as a home, office, or building.
WAN is a network that connects devices over a large geographical area such as a city, country, or even the world.
LAN typically uses Ethernet cables or Wi-Fi for connectivity while WAN uses technologies such as leased lines, satellite links, or VPNs.
Examples of LAN include a home network, a school network, or an...read more
Q49. Difference between hp1020 printer or hp laserjet 125,126
HP LaserJet 1020 is a basic printer while HP LaserJet 125 and 126 are multifunction printers.
HP LaserJet 1020 is a monochrome printer while HP LaserJet 125 and 126 are color printers.
HP LaserJet 125 and 126 have additional features like scanning, copying, and faxing.
HP LaserJet 125 and 126 have higher print speeds and larger paper capacity compared to HP LaserJet 1020.
Q50. What is DNS full name
DNS stands for Domain Name System. It is a hierarchical decentralized naming system for computers, services, or any resource connected to the internet.
DNS is used to translate domain names into IP addresses.
It allows users to access websites and other internet resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a distributed database system, with multiple DNS servers worldwide.
It helps in the efficient and reliable functioning ...read more
Q51. What is the definition of computer
A computer is an electronic device that processes data and performs tasks according to instructions given by the user.
An electronic device that can store, retrieve, and process data
Can perform various tasks based on user input
Consists of hardware components such as CPU, memory, and storage devices
Runs on an operating system to manage software applications
Examples include desktops, laptops, tablets, and smartphones
Q52. Write the type of appointment latter.
The type of appointment letter is a formal business letter that confirms the details of a job offer.
Include the job title, start date, salary, and any other relevant details.
Express enthusiasm for the candidate's acceptance of the offer.
Provide contact information for the candidate to ask any questions or accept the offer.
Use professional language and formatting.
Examples: job offer letter, employment offer letter, appointment confirmation letter.
Q53. What use of wait attributes in BGP?
Wait attributes in BGP are used to influence the route selection process by delaying the installation of a route into the IP routing table.
Wait attributes are used to delay the installation of a route into the IP routing table until the wait timer expires.
This can be useful in scenarios where a route should not be immediately installed, allowing time for other routes to be considered first.
Wait attributes can help prevent route flapping by giving time for the network to stabi...read more
Q54. What is difference between OSPF and BGP?
OSPF is an interior gateway protocol used within a single autonomous system, while BGP is an exterior gateway protocol used between different autonomous systems.
OSPF is a link-state routing protocol, while BGP is a path vector routing protocol.
OSPF uses a shortest path first algorithm to determine the best path, while BGP uses policies and attributes to make routing decisions.
OSPF is typically used within a single organization's network, while BGP is used to connect different...read more
Q55. How to start RFS and MRP Service.
To start RFS and MRP Service in Oracle Database, you can use the ALTER SYSTEM command.
Connect to the Oracle Database as a user with SYSDBA or SYSOPER privilege.
To start RFS (Remote File Server) Service, execute the following command: ALTER SYSTEM SET REMOTE_LISTENER='listener_name' SCOPE=SPFILE;
To start MRP (Managed Recovery Process) Service, execute the following command: ALTER DATABASE RECOVER MANAGED STANDBY DATABASE DISCONNECT FROM SESSION;
Q56. What is string buffer
String buffer is a data structure that stores and manipulates a sequence of characters.
String buffer is mutable, meaning it can be modified after creation.
It is often used for efficient string manipulation, such as concatenation or appending.
Examples include StringBuffer class in Java and StringBuilder class in C#.
Q57. What is the exception
An exception is an event that disrupts the normal flow of a program's execution.
Exceptions are used to handle errors and other exceptional events in software.
They can be caught and handled using try-catch blocks.
Examples of exceptions include NullPointerException, ArrayIndexOutOfBoundsException, and IOException.
Q58. What id oops and its advantages
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
Advantages of OOPs include code reusability, modularity, flexibility, and easier maintenance.
Encapsulation allows data hiding and protection, reducing complexity and increasing security.
Inheritance enables code reuse and promotes the creation of hierarchical relationships between classes.
Polymorphism allows objects to be treated as instances of their parent class, providi...read more
Q59. What is the Straight cable color coding
Straight cable color coding is used to connect different devices in a network.
Straight cable color coding follows the T568A or T568B standard.
In T568A, the color coding is white-green, green, white-orange, blue, white-blue, orange, white-brown, brown.
In T568B, the color coding is white-orange, orange, white-green, blue, white-blue, green, white-brown, brown.
Q60. What is active directory
Active Directory is a directory service developed by Microsoft that provides centralized management of network resources.
Active Directory is used to store information about network resources such as users, computers, and printers.
It allows administrators to manage and control access to resources in a network environment.
Active Directory uses a hierarchical structure with domains, trees, and forests to organize and manage network resources.
It supports authentication and author...read more
Q61. Explain BSOD, What is DNS?
BSOD stands for Blue Screen of Death. DNS stands for Domain Name System.
BSOD is a critical system error in Windows OS that causes the computer to crash and display a blue screen with error codes.
DNS is a system that translates domain names into IP addresses to locate resources on the internet.
DNS servers store information about domain names and their corresponding IP addresses.
DNS is essential for browsing the internet and accessing websites.
DNS can be configured manually or ...read more
Q62. How to reset user I’d in ADMP
To reset user ID in ADMP, follow these steps:
Open Active Directory Users and Computers
Find the user account and right-click on it
Select 'Reset Password'
Enter a new password and confirm it
Click 'OK'
The user ID will be reset
Q63. How many experience in network?
I have over 10 years of experience in network design, implementation, and troubleshooting.
Over 10 years of experience in network design
Skilled in network implementation
Proficient in network troubleshooting
Q64. Boot process /var how to increase
To increase the size of /var during the boot process, you can resize the partition or create a new partition and mount it as /var.
Resize the partition using tools like GParted or fdisk
Create a new partition using fdisk or parted
Format the new partition with a filesystem like ext4
Mount the new partition as /var in the /etc/fstab file
Reboot the system to apply the changes
Q65. How to select DR/BDR in ospf?
DR/BDR in OSPF are selected based on their priority and router ID.
DR/BDR election occurs on multi-access networks like Ethernet
Priority value is used to determine the DR/BDR, default is 1-255
Router with highest priority becomes DR, second highest becomes BDR
If priorities are equal, router with highest router ID wins
Priority can be manually configured to influence DR/BDR selection
Q66. What is difference HDD or SSD
HDD is a traditional spinning hard drive, while SSD is a newer type of storage that is faster and more reliable.
HDD uses spinning disks to read/write data, while SSD uses flash memory
SSD is faster and more reliable than HDD
SSD is more expensive than HDD
HDD is still commonly used for storing large amounts of data, while SSD is used for faster access to frequently used data
Q67. what is itil and lifecycle f incident
ITIL stands for Information Technology Infrastructure Library. It is a set of best practices for IT service management. Incident lifecycle refers to the stages an incident goes through from detection to resolution.
ITIL is a framework that provides guidelines for IT service management
It helps organizations align their IT services with business needs
The incident lifecycle includes stages like detection, logging, categorization, prioritization, investigation, diagnosis, resoluti...read more
Q68. What is php and its advantages
PHP is a server-side scripting language used for web development.
PHP stands for Hypertext Preprocessor.
It is open source and widely used for creating dynamic web pages.
Advantages include easy integration with HTML, support for various databases, and compatibility with different operating systems.
PHP code can be embedded within HTML code, making it easy to work with web content.
Popular websites like Facebook and WordPress are built using PHP.
Q69. What is Dataguard and standby?
Dataguard is a feature of Oracle Database that provides high availability, data protection, and disaster recovery.
Dataguard is used to create and maintain one or more standby databases that can be used for failover or disaster recovery purposes.
It works by continuously applying changes from the primary database to the standby database(s) to keep them synchronized.
In case of a failure or disaster, the standby database can be activated to take over the role of the primary datab...read more
Q70. What are ur long term goals?
My long term goal is to become a technical lead and contribute to the development of innovative software solutions.
I plan to continuously improve my technical skills and knowledge through training and self-learning.
I aim to gain experience in leading and managing software development projects.
I aspire to work on cutting-edge technologies and contribute to the development of innovative software solutions.
I hope to build a strong network of industry professionals and collaborat...read more
Q71. How to handle tuff client
Handling tough clients requires patience, empathy, and effective communication.
Listen actively to understand their concerns and frustrations
Remain calm and composed, avoiding getting defensive or confrontational
Empathize with their situation and show that you are willing to work towards a resolution
Set clear boundaries and expectations for the relationship
Communicate openly and honestly, keeping them informed of progress and any challenges
Seek feedback and address any issues ...read more
Q72. What is domain
A domain is a unique name that identifies a website or a network of computers on the internet.
A domain is composed of two parts: the top-level domain (TLD) and the second-level domain (SLD). For example, in the domain name 'example.com', 'com' is the TLD and 'example' is the SLD.
Domains are used to make it easier for users to access websites or resources on the internet by providing a memorable and recognizable name instead of a series of numbers (IP address).
Domain names are...read more
Q73. What is AD manager plus
AD Manager Plus is a web-based Active Directory management and reporting tool.
Allows IT administrators to manage and report on Active Directory objects
Offers features like user provisioning, group management, and password management
Provides pre-built reports and customizable templates for generating reports
Offers automation and delegation capabilities to streamline AD management tasks
Q74. What is jquery and JavaScript
jQuery is a JavaScript library that simplifies HTML document traversal and manipulation, event handling, and animation.
jQuery is a fast, small, and feature-rich JavaScript library.
It makes things like HTML document traversal and manipulation, event handling, and animation much simpler with an easy-to-use API.
jQuery simplifies common tasks like AJAX calls and DOM manipulation.
JavaScript is a programming language that enables interactive web pages and dynamic content.
It is comm...read more
Q75. what is sla and its types
SLA stands for Service Level Agreement, a contract between a service provider and a customer outlining the level of service expected.
SLA is a contract between a service provider and a customer outlining the level of service expected.
There are different types of SLAs such as Customer-based SLA, Service-based SLA, and Multi-level SLA.
Customer-based SLA is tailored to the needs of a specific customer or group of customers.
Service-based SLA defines the level of service for a part...read more
Q76. What is SGA and PGA?
SGA (System Global Area) is a shared memory region that stores data and control information for an Oracle database. PGA (Program Global Area) is a memory region that stores data and control information for a single Oracle session or process.
SGA is shared by all users and processes connected to the database
SGA includes the database buffer cache, shared pool, and redo log buffer
PGA is private to each individual session or process
PGA includes the stack space, sort area, and sess...read more
Q77. What is electronic s?
Electronics is the branch of physics and technology that deals with the flow of electrons and their behavior in devices.
Electronics involves the study of electronic components such as diodes, transistors, and integrated circuits.
It focuses on the design and development of electronic circuits for various applications.
Examples of electronic devices include smartphones, computers, televisions, and radios.
Q78. What is a Switch?
A switch is a networking device that connects devices on a computer network by using packet switching to forward data to the appropriate destination.
Switches operate at the data link layer (Layer 2) of the OSI model.
They use MAC addresses to forward data to the correct destination.
Switches can create multiple collision domains and improve network efficiency.
Examples of switches include Cisco Catalyst series, Netgear ProSAFE series, etc.
Q79. What is campany join
Company join is not a commonly used term in the IT industry. It may refer to the process of joining a company as an employee or partner.
Company join may refer to the process of joining a company as an employee or partner.
It may involve signing a contract or agreement with the company.
The process may include orientation, training, and onboarding activities.
Examples of company join include joining a startup as a co-founder, joining a corporation as an executive, or joining a co...read more
Q80. What is routing?
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
Routing protocols like OSPF and BGP are used to exchange routing information between routers.
Dynamic routing allows routers to adapt to network changes by updating their ro...read more
Q81. How to work ospf?
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in a network.
OSPF uses a link-state routing algorithm to determine the best path for data packets.
Routers in an OSPF network exchange link-state advertisements (LSAs) to build a topology map of the network.
OSPF calculates the shortest path to each network by using Dijkstra's algorithm.
OSPF supports multiple areas to scale large networks and reduce routing table size.
OSPF uses cos...read more
Q82. What area 0 in ospf?
Area 0 in OSPF is the backbone area where all other areas connect.
Area 0 is also known as the backbone area in OSPF.
All other OSPF areas must connect to Area 0.
Area 0 is required for OSPF to function properly.
Area 0 is used to route traffic between different OSPF areas.
Q83. What's is operating system
An operating system is a software that manages computer hardware and provides services for computer programs.
Manages computer hardware resources
Provides services for computer programs
Examples: Windows, macOS, Linux
Q84. What's is O365 and cloud
O365 is a subscription-based service by Microsoft that includes access to various productivity tools, while cloud refers to storing and accessing data and programs over the internet.
O365 stands for Office 365, a suite of productivity applications like Word, Excel, and Outlook provided by Microsoft on a subscription basis
Cloud computing involves storing and accessing data and programs over the internet instead of on a local hard drive
Cloud services can include storage (like Dr...read more
Q85. what is storage
Storage refers to the process of storing and preserving data or information for future use.
Storage can be physical or digital
Physical storage includes hard drives, flash drives, and CDs
Digital storage includes cloud storage and databases
Storage capacity is measured in bytes, kilobytes, megabytes, gigabytes, terabytes, and petabytes
Q86. Tools used or familiar with?
I am familiar with various tools such as Salesforce, HubSpot, and Pipedrive.
Salesforce for managing customer data and tracking sales activities
HubSpot for lead generation and marketing automation
Pipedrive for sales pipeline management and deal tracking
Q87. What is v lan?
VLAN stands for Virtual Local Area Network, a method of segmenting a physical network into multiple virtual networks.
VLANs help improve network performance, security, and manageability by isolating traffic within specific groups.
Each VLAN operates as if it is its own separate network, even though devices may physically be connected to the same network switch.
VLANs are commonly used in large organizations to separate departments or types of traffic, such as voice, data, and vi...read more
Q88. Allowed vlan in trunk port
Allowed VLANs in trunk ports determine which VLANs can pass through the port.
Trunk ports allow multiple VLANs to pass through them
Allowed VLANs are configured on the trunk port to specify which VLANs can pass through
By default, all VLANs are allowed on a trunk port unless specifically restricted
Q89. 10 yrs .in IT infrastructure
I have 10 years of experience in IT infrastructure, including project management.
Managed various IT infrastructure projects from planning to execution
Led teams in implementing network upgrades and server migrations
Ensured projects were completed on time and within budget
Implemented best practices for IT infrastructure management
Worked with stakeholders to define project requirements and deliverables
Q90. Display issue in system
The display issue in the system refers to any problem related to the visual output on the screen.
Check the physical connections between the computer and the monitor.
Ensure that the monitor is powered on and properly configured.
Update or reinstall the graphics driver.
Adjust the display settings in the operating system.
Test the monitor on another computer to rule out hardware issues.
Q91. Hardware problem issue
Hardware problems can range from simple issues like loose connections to complex ones like component failure.
Identify the specific hardware component causing the issue
Check for loose connections or damaged cables
Run diagnostic tests to pinpoint the problem
Replace or repair the faulty hardware component
Ensure proper installation and configuration of the hardware
Q92. Network problem issue
When encountering a network problem issue, it is important to troubleshoot and identify the root cause.
Check network connectivity
Verify IP addresses and DNS settings
Ensure firewall and antivirus settings are not blocking network traffic
Check for any hardware failures or malfunctions
Review network logs for any errors or anomalies
More about working at CMS IT Services
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month