Add office photos
Employer?
Claim Account for FREE

Experis IT

3.1
based on 555 Reviews
Filter interviews by

30+ Interview Questions and Answers

Updated 28 May 2024

Q1. User is not able to login, How can troubleshoot this

Ans.

To troubleshoot a user not able to login, check for account lockouts, password issues, network connectivity, and system errors.

  • Check if the user's account is locked or disabled

  • Verify if the user's password has expired or needs to be reset

  • Ensure network connectivity is working properly

  • Check for any system errors or issues that may prevent login

  • Review system logs for any relevant error messages

  • Confirm if the user is using the correct login credentials

Add your answer

Q2. Server is not able to login, how to troubleshoot this

Ans.

To troubleshoot a server not able to login, check network connectivity, verify credentials, and review system logs.

  • Check network connectivity to ensure the server is reachable

  • Verify the correctness of login credentials

  • Review system logs for any error messages or indications of login failures

  • Restart the server if necessary

  • Check for any recent system updates or changes that may have caused the login issue

Add your answer

Q3. You know about port , ssh, http, https, ftp, nfs, telnet , samba,

Ans.

These are common network protocols used for communication and file transfer.

  • SSH (Secure Shell) is a secure protocol used for remote login and secure file transfer.

  • HTTP (Hypertext Transfer Protocol) is used for transmitting web pages and other resources over the internet.

  • HTTPS (HTTP Secure) is the secure version of HTTP, encrypted with SSL/TLS.

  • FTP (File Transfer Protocol) is used for transferring files between a client and a server.

  • NFS (Network File System) allows remote file ...read more

Add your answer

Q4. Https is not working, how to troubleshoot this.

Ans.

To troubleshoot HTTPS not working, check certificate validity, firewall settings, and web server configuration.

  • Check if the SSL/TLS certificate is valid and properly installed

  • Verify if the web server is configured to listen on the correct HTTPS port (usually 443)

  • Ensure that the firewall allows incoming connections on the HTTPS port

  • Check if the SSL/TLS protocols and cipher suites are correctly configured

  • Inspect the web server logs for any error messages related to HTTPS

  • Test HT...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. You are not able to login through putty, troubleshooting

Ans.

Troubleshooting steps for not being able to login through putty

  • Check network connectivity

  • Verify correct IP address and port number

  • Ensure SSH service is running on the server

  • Check firewall settings

  • Verify correct username and password

  • Check if the server is reachable and not down

Add your answer

Q6. How to rollback Patches trough Yum

Ans.

To rollback patches through Yum, use the yum history command and the yum history undo command.

  • Use the 'yum history' command to view the history of installed packages and patches.

  • Identify the transaction ID of the patch you want to rollback.

  • Use the 'yum history undo ' command to rollback the patch.

  • Confirm the rollback by reviewing the output and checking the system's package status.

Add your answer
Are these interview questions helpful?

Q7. How to take backup via tar utility

Ans.

Tar utility is used to create backups by compressing files and directories.

  • To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.

  • Specify the files or directories to be included in the backup.

  • Use the '-cvf' options to create a new tar archive file.

  • Specify the name of the archive file to be created.

  • To compress the backup, use the '-z' option for gzip compression or '-j' option for bzip2 compression.

  • To extract files from a tar back...read more

Add your answer

Q8. You know scp what is use for linux.

Ans.

scp is a command-line tool used for securely transferring files between a local and remote Linux system.

  • scp stands for secure copy.

  • It uses SSH protocol for secure file transfer.

  • It can be used to copy files between local and remote systems, or between two remote systems.

  • Syntax: scp [options] [source] [destination]

  • Example: scp file.txt user@remote:/path/to/destination

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to dics scan, create LVM

Ans.

To disk scan, use tools like fsck or badblocks. To create LVM, use pvcreate, vgcreate, and lvcreate commands.

  • To disk scan, use fsck command to check and repair file system errors.

  • To scan for bad blocks on a disk, use badblocks command.

  • To create LVM, first initialize physical volumes (pvcreate), then create volume groups (vgcreate), and finally create logical volumes (lvcreate).

  • Example: fsck /dev/sda1

  • Example: badblocks /dev/sdb

  • Example: pvcreate /dev/sdc

  • Example: vgcreate myvg /...read more

Add your answer

Q10. How to create bonding in linux

Ans.

Bonding in Linux is a technique to combine multiple network interfaces into a single virtual interface for increased bandwidth and fault tolerance.

  • Install the bonding driver module

  • Configure the bonding interface in the network configuration file

  • Specify the bonding mode and options

  • Assign the physical interfaces to the bonding interface

  • Restart the network service to apply the changes

Add your answer

Q11. How to run Cronjob for Process

Ans.

To run a cronjob for a process, use the crontab command to create a cron job entry.

  • Use the crontab command to edit the cron table

  • Specify the schedule using the cron syntax

  • Specify the command or script to be executed

  • Save and exit the cron table to schedule the cron job

Add your answer

Q12. You know about scripting , bash or sh

Ans.

Yes, I am familiar with scripting in bash and sh.

  • I have experience writing scripts in bash and sh.

  • I am comfortable with using variables, loops, conditionals, and functions in bash and sh scripts.

  • I have used bash and sh scripts for automating tasks, managing system configurations, and troubleshooting.

  • I am familiar with common commands and utilities in bash and sh, such as grep, sed, awk, and find.

  • I have written scripts to automate system administration tasks like log rotation,...read more

Add your answer

Q13. What is the difference between the Agile and Waterfall model?

Ans.

Agile is iterative and flexible, while Waterfall is linear and rigid.

  • Agile focuses on delivering working software in short iterations

  • Waterfall follows a sequential approach with distinct phases

  • Agile welcomes changes in requirements throughout the project

  • Waterfall requires a detailed plan before starting the project

  • Agile emphasizes collaboration and communication

  • Waterfall emphasizes documentation and following the plan

  • Agile is better suited for complex and uncertain projects

  • Wa...read more

Add your answer

Q14. How does v11 and a360 migration works and issues you faced.

Ans.

V11 and A360 migration involves upgrading to newer versions and transferring data to cloud-based platform.

  • V11 migration involves upgrading from older versions of software to newer ones.

  • A360 migration involves transferring data to cloud-based platform for better accessibility and collaboration.

  • Issues faced during migration include data loss, compatibility issues, and downtime.

  • Proper planning and testing can help mitigate these issues.

Add your answer

Q15. Create swap for linux server

Ans.

To create swap for a Linux server, use the 'mkswap' command to create a swap file or partition and then activate it using the 'swapon' command.

  • Use 'dd' command to create a swap file with desired size: 'dd if=/dev/zero of=/path/to/swapfile bs=1G count=4'

  • Set the correct permissions for the swap file: 'chmod 600 /path/to/swapfile'

  • Create swap space on the file: 'mkswap /path/to/swapfile'

  • Activate the swap space: 'swapon /path/to/swapfile'

  • Make the swap space permanent by adding an ...read more

Add your answer

Q16. Difference between yum & rpm.

Ans.

yum is a package manager that resolves dependencies and installs packages from repositories, while rpm is a low-level package manager that directly installs packages.

  • yum is a high-level package manager that uses rpm as its underlying package management system.

  • yum can automatically resolve dependencies and install packages from repositories, while rpm requires manual dependency resolution.

  • yum can also update packages and manage repositories, while rpm only installs and removes...read more

Add your answer

Q17. Difference between udp & tcp

Ans.

UDP is a connectionless protocol that provides fast, but unreliable communication. TCP is a connection-oriented protocol that ensures reliable communication.

  • UDP stands for User Datagram Protocol, while TCP stands for Transmission Control Protocol.

  • UDP is faster than TCP because it does not establish a connection before sending data.

  • UDP does not guarantee delivery of packets, while TCP ensures reliable delivery.

  • TCP uses a three-way handshake to establish a connection between th...read more

Add your answer

Q18. Disc LVM partion for LVM

Ans.

Disc LVM partitioning allows for flexible management of storage space by creating logical volumes on physical disks.

  • LVM stands for Logical Volume Manager.

  • It allows for dynamic allocation and resizing of storage space.

  • LVM partitions are created by combining physical volumes (disks) into volume groups, and then creating logical volumes within those groups.

  • Logical volumes can be resized, moved, or even span multiple physical disks.

  • LVM provides features like snapshots, mirroring,...read more

Add your answer

Q19. Network layers for network

Ans.

The network layers for network are a hierarchical structure that defines the communication process between devices.

  • The network layers are a way to organize and standardize the communication process in a network.

  • There are several models that define the network layers, such as the OSI model and the TCP/IP model.

  • Each layer has a specific function and interacts with the layers above and below it.

  • The layers provide abstraction, allowing different technologies and protocols to work...read more

Add your answer

Q20. 1.What is java connection query. 2.how to show all tables in SQL. 3.basic query in linux

Ans.

Answers to questions related to Java connection query, showing all tables in SQL, and basic query in Linux.

  • Java connection query is used to establish a connection between Java application and database.

  • To show all tables in SQL, use the command 'SHOW TABLES;' or 'SELECT table_name FROM information_schema.tables WHERE table_schema = 'database_name';'

  • Basic query in Linux includes commands like 'ls' to list files, 'cd' to change directory, 'mkdir' to create a directory, 'rm' to r...read more

Add your answer

Q21. What are the different ceremonies conducted for a Scrum team?

Ans.

Different ceremonies conducted for a Scrum team include Sprint Planning, Daily Stand-up, Sprint Review, and Sprint Retrospective.

  • Sprint Planning - planning for the upcoming sprint

  • Daily Stand-up - daily check-in to discuss progress and plan for the day

  • Sprint Review - review of the completed sprint and demonstration of the work done

  • Sprint Retrospective - reflection on the previous sprint and identification of areas for improvement

Add your answer

Q22. What are the issues you faced while developing the code

Ans.

I faced several issues while developing the code for RPA development.

  • Compatibility issues with different systems and software

  • Handling exceptions and error handling

  • Managing large volumes of data

  • Optimizing performance and efficiency

  • Integration challenges with existing systems

  • Ensuring security and data privacy

  • Debugging and troubleshooting

  • Version control and code management

View 1 answer

Q23. What is meant by Java full stack developer???

Ans.

A Java full stack developer is a professional who can work on both front-end and back-end technologies of a web application.

  • A full stack developer is proficient in both client-side and server-side programming languages.

  • They can work on databases, servers, systems engineering, and APIs.

  • They are responsible for designing, developing, and maintaining web applications.

  • Examples of technologies a Java full stack developer may work with include Java, Spring, Hibernate, AngularJS, Re...read more

Add your answer

Q24. What is Agile? Can you explain briefly

Ans.

Agile is an iterative approach to software development that emphasizes flexibility, collaboration, and customer satisfaction.

  • Agile values individuals and interactions over processes and tools

  • It emphasizes working software over comprehensive documentation

  • It encourages customer collaboration and responding to change

  • It involves iterative development and continuous improvement

  • It promotes self-organizing and cross-functional teams

  • Examples of Agile methodologies include Scrum, Kanb...read more

Add your answer

Q25. What are the Skills used in Devops??

Ans.

DevOps skills include automation, collaboration, communication, infrastructure as code, and continuous integration/continuous delivery (CI/CD).

  • Automation: using tools to automate processes and tasks

  • Collaboration: working closely with developers, operations, and other stakeholders

  • Communication: effective communication skills to bridge gaps between teams

  • Infrastructure as code: managing infrastructure through code

  • Continuous integration/continuous delivery (CI/CD): automating the...read more

Add your answer

Q26. Excel Test Subtotal Sum If Pivot Table Conditional Formatting V-Lookup Index-Match

Ans.

The question is testing your knowledge of Excel functions and features commonly used in accounting.

  • Subtotal function is used to calculate subtotals in a list of data.

  • Sum If function adds up values based on a specified condition.

  • Pivot Table is a powerful tool for summarizing and analyzing data.

  • Conditional Formatting allows you to highlight cells based on certain criteria.

  • V-Lookup is used to search for a value in a table and return a corresponding value.

  • Index-Match is an altern...read more

Add your answer

Q27. what is c

Ans.

C is a general-purpose programming language known for its efficiency and low-level control.

  • C was developed by Dennis Ritchie at Bell Labs in the 1970s.

  • It is widely used for system programming, embedded systems, and developing operating systems.

  • C is known for its simplicity, allowing direct memory manipulation and efficient code execution.

  • It influenced the development of many other programming languages, such as C++, Java, and Python.

View 2 more answers

Q28. What is Agile?

Ans.

Agile is a project management methodology that emphasizes flexibility, collaboration, and customer satisfaction.

  • Agile values individuals and interactions over processes and tools

  • It emphasizes working software over comprehensive documentation

  • Agile encourages responding to change over following a plan

  • Scrum is a popular framework for implementing Agile

  • Daily stand-up meetings, sprint planning, and retrospectives are common practices in Agile

Add your answer

Q29. what is lamda

Ans.

Lambda is a function that allows you to write and use small, anonymous functions in programming languages.

  • Lambda functions are often used in functional programming languages.

  • They are anonymous, meaning they don't have a name.

  • Lambdas can be used as arguments to higher-order functions.

  • They are commonly used for tasks that require a short, one-time function.

  • Lambda functions can be written in various programming languages, such as Python, JavaScript, and Java.

View 1 answer

Q30. Explain the 7 layer of network

Ans.

The 7-layer network model is a framework for designing and managing computer networks.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with adjacent layers.

  • The model helps ensure interoperability between different network devices and software.

  • Example protocols include Ethernet (Data Link), IP (Network), TCP (Transport), and HTTP (Application).

Add your answer

Q31. What are scrum ceremonies

Ans.

Scrum ceremonies are a set of events that occur during a sprint to facilitate communication and collaboration within the team.

  • Sprint Planning

  • Daily Scrum

  • Sprint Review

  • Sprint Retrospective

Add your answer

Q32. what is java

Ans.

Java is a high-level programming language known for its platform independence and object-oriented approach.

  • Java is widely used for developing desktop, web, and mobile applications.

  • It is known for its write once, run anywhere (WORA) principle.

  • Java programs are compiled into bytecode and executed on a Java Virtual Machine (JVM).

  • It supports multithreading, exception handling, and automatic memory management.

  • Popular frameworks and libraries in Java include Spring, Hibernate, and ...read more

View 1 answer

Q33. What are your strenghths?

Ans.

My strengths include strong communication skills, adaptability, and attention to detail.

  • Strong communication skills: I am able to effectively communicate with individuals at all levels of an organization, which allows me to build strong relationships with candidates and hiring managers.

  • Adaptability: I am able to quickly adapt to changing situations and priorities, which is essential in the fast-paced world of recruiting.

  • Attention to detail: I am meticulous in my work and pay ...read more

Add your answer

Q34. Requirements i have worked

Ans.

I have worked with a variety of requirements in my previous roles as a Senior Recruiter.

  • Developed job descriptions and requirements for various positions

  • Conducted interviews to assess candidate qualifications and fit

  • Collaborated with hiring managers to understand their specific requirements

  • Utilized applicant tracking systems to manage candidate pipelines

  • Stayed up-to-date on industry trends and best practices in recruitment

Add your answer

Q35. Golden rules of account

Ans.

Golden rules of account are basic principles that guide the recording of financial transactions.

  • Golden rule of account is Debit the receiver, Credit the giver.

  • Real accounts are debited when receiving benefits and credited when giving benefits.

  • Nominal accounts are debited when expenses or losses are incurred and credited when incomes or gains are earned.

  • Personal accounts are debited when the receiver is the account holder and credited when the giver is the account holder.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 13 interviews in the last 1 year
Interview experience
3.3
Average
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 304 Interview Questions
4.3
 • 273 Interview Questions
3.7
 • 192 Interview Questions
3.7
 • 143 Interview Questions
3.8
 • 139 Interview Questions
View all
Top Experis IT Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter