Designway
10+ Sangkaj Logisys Interview Questions and Answers
Q1. A user complains that the start is not working and files are not working how will you check the issue?
I would start by checking the user's computer for any potential issues with the operating system or files.
Check if the computer is properly connected to the network
Verify if the user has the necessary permissions to access the files
Check for any recent software updates or changes that may have caused the issue
Run diagnostic tools to identify any hardware or software issues
Test accessing the files from a different device to see if the issue is isolated to the user's computer
Q2. Do you know about asset management? How do you do it?
Asset management involves tracking and managing an organization's physical assets to optimize usage and reduce costs.
Maintain an inventory of all assets including hardware, software, and equipment
Track asset location, status, and usage to prevent loss or theft
Implement a system for asset tagging and labeling for easy identification
Regularly update asset records and conduct audits to ensure accuracy
Utilize asset management software to streamline the process and improve efficie...read more
Q3. How to add a system to a domain? Give steps to add to the domain, configure everything, and check everything before handing it over to the user.
To add a system to a domain, follow these steps and ensure proper configuration before handing it over to the user.
Join the system to the domain by accessing System Properties > Computer Name > Change > Domain
Enter the domain name and provide domain credentials when prompted
Restart the system to apply the changes and ensure successful domain join
Configure domain-specific settings such as group policies, network shares, and permissions
Check network connectivity, access to doma...read more
Q4. Any commands you know to scan the files to see if they are corrupted?
Yes, you can use commands like md5sum, sha1sum, and sha256sum to scan files for corruption.
Use md5sum command to calculate and check the MD5 checksum of a file
Use sha1sum command to calculate and check the SHA-1 checksum of a file
Use sha256sum command to calculate and check the SHA-256 checksum of a file
Q5. what is the difference between Shared and Distributed mailbox
Shared mailbox is accessed by multiple users with a single login, while distributed mailbox is spread across multiple servers for load balancing.
Shared mailbox allows multiple users to access the same mailbox with a single login credential
Distributed mailbox is spread across multiple servers for load balancing and redundancy
Shared mailbox is typically used for team collaboration and sharing information
Distributed mailbox helps in distributing the load of incoming emails acros...read more
Q6. Do you have experience working on the active directory? Running Scripts?
Yes, I have experience working on active directory and running scripts.
I have experience managing user accounts, groups, and permissions in Active Directory.
I have written and executed PowerShell scripts to automate tasks in Active Directory.
I have experience troubleshooting issues related to Active Directory replication and DNS.
I have worked on integrating third-party applications with Active Directory for single sign-on.
I have experience with Group Policy management and imp...read more
Q7. How good are you at the network troubleshooting? Are any commands known? ipconfig /release renew
I am highly skilled in network troubleshooting and familiar with commands like ipconfig /release and /renew.
I have extensive experience in troubleshooting network issues, including identifying and resolving connectivity problems.
I am proficient in using commands like ipconfig /release and /renew to troubleshoot network configurations.
I have successfully resolved issues related to IP address conflicts, DNS resolution, and network connectivity using these commands.
Q8. How to give file access to shared folder?
To give file access to a shared folder, you can set permissions for specific users or groups.
Use the file system's security settings to grant read, write, or execute permissions to users or groups.
Consider creating a new user group specifically for accessing the shared folder.
Regularly review and update permissions to ensure security and access control.
Example: Use the 'chmod' command in Linux to change file permissions for a shared folder.
Q9. Have you worked on the Ticketing tool?
Yes, I have experience working with ticketing tools such as ServiceNow and Jira.
Experience with ServiceNow and Jira ticketing tools
Created, updated, and resolved tickets for various IT issues
Assigned tickets to appropriate team members for resolution
Monitored ticket queues and ensured timely responses
Generated reports on ticketing metrics and trends
Q10. Have you worked on exchange servers?
Yes, I have worked on exchange servers in previous roles.
Managed and maintained exchange servers for email communication
Configured email accounts, distribution lists, and mail flow rules
Troubleshooted and resolved issues related to exchange servers
Implemented security measures to protect exchange server data
Q11. Are comfortable working in shifts
Yes, I am comfortable working in shifts.
I have previous experience working in shifts at my previous job.
I am flexible with my schedule and can easily adapt to different shift timings.
I understand the importance of round-the-clock support in a Systems & Network Engineer role.
Q12. Softphones worked on
Softphones are applications that allow users to make phone calls over the internet using a computer or mobile device.
Softphones can work on various operating systems such as Windows, macOS, and Linux.
They require an internet connection to function properly.
Softphones can be used with different VoIP services like Skype, Zoom, and Cisco Webex.
They often have features like call recording, video calling, and instant messaging.
Softphones can be used with headsets, microphones, and...read more
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month