HCLTech
30+ Escorts Kubota Limited Interview Questions and Answers
Q1. What is Active Directory? Difference between MDM and MAM. What do you know about Microsoft Intune? How does Azure Active directory work? What is Exchange Active Sync
Active Directory is a Microsoft service that manages user accounts and permissions. MDM and MAM are mobile device management and mobile application management. Microsoft Intune is a cloud-based MDM/MAM solution. Azure Active Directory is a cloud-based identity and access management service. Exchange Active Sync is a protocol used to synchronize email, contacts, and calendar data between servers and mobile devices.
Active Directory manages user accounts and permissions
MDM manag...read more
Q2. How to manipulate outbound traffic in bgp
Outbound traffic in BGP can be manipulated using various techniques such as AS path prepending, community strings, and route maps.
AS path prepending involves adding additional AS numbers to the path attribute of a BGP route advertisement to make it less attractive to other BGP routers.
Community strings can be used to tag routes and apply policies to them based on the tags.
Route maps can be used to match specific routes and apply policies to them such as setting local preferen...read more
Q3. How to troubleshoot netbackup 13 backup failure.
To troubleshoot netbackup 13 backup failure, check logs, verify connectivity, and ensure proper configuration.
Check the logs for any error messages or warnings
Verify connectivity between the backup server and the client
Ensure that the backup policy is properly configured
Check for any conflicts with other backup jobs or processes
Verify that the backup media is available and properly configured
Consider running a test backup to isolate the issue
Q4. What is swift and on what swift stands for and all the swift msg details
SWIFT is a global financial messaging network used for secure and reliable communication between banks.
SWIFT stands for Society for Worldwide Interbank Financial Telecommunication
It is used for international money transfers and communication between banks
SWIFT messages contain information such as sender and receiver details, transaction amount, and currency
There are different types of SWIFT messages such as MT103, MT202, and MT700
SWIFT messages are encrypted and authenticated...read more
Q5. What is active directory and how it work in domain.
Active Directory is a directory service that stores information about objects on a network and makes this information available to users and network administrators.
Active Directory is used to manage users, computers, and other objects in a network.
It provides a centralized location for authentication and authorization.
Active Directory uses a hierarchical structure of domains, trees, and forests to organize objects.
It uses domain controllers to manage and replicate directory i...read more
Q6. How many type of windows operating system?
There are several versions of Windows operating system.
There are currently 7 major versions of Windows OS: Windows 95, 98, ME, 2000, XP, Vista, 7, 8, and 10.
Each version has different features and improvements over the previous one.
Windows 10 is the latest version of Windows OS, released in 2015.
Windows Server is a separate operating system designed for servers and data centers.
Q7. What you will do if websites are not opening inside Google Chrome?
Check internet connection, clear cache and cookies, update Chrome, disable extensions, try incognito mode.
Check internet connection to ensure it is working properly.
Clear cache and cookies in Chrome to resolve any browsing issues.
Update Google Chrome to the latest version to fix any bugs or compatibility issues.
Disable any extensions that may be causing conflicts with website loading.
Try opening the websites in incognito mode to see if the issue is related to browser settings...read more
Q8. How to elected DR and BDR in ospf ?
DR and BDR are elected in OSPF based on priority and router ID.
The router with the highest priority becomes the DR, and the second highest becomes the BDR.
If there is a tie in priority, the router with the highest router ID is elected.
DR and BDR are elected only on multi-access networks like Ethernet.
DR and BDR are responsible for exchanging LSAs with other routers and reducing network traffic.
To change the DR or BDR, the priority of the router can be modified.
Q9. What is difference between switch and route?
Switch is used to connect devices within a network while route is used to connect different networks.
Switch operates at layer 2 of OSI model while route operates at layer 3.
Switch forwards data based on MAC address while route forwards data based on IP address.
Switch is used to create a LAN while route is used to connect different LANs or WANs.
Switch is faster than route as it does not require any processing.
Example of switch: Ethernet switch. Example of route: Router.
Q10. What is GARP ? How it works
GARP stands for Global Association of Risk Professionals. It is a non-profit organization that provides education and certification in risk management.
GARP offers various certifications such as FRM (Financial Risk Manager) and ERP (Energy Risk Professional).
The organization also conducts research and publishes articles on risk management.
GARP has a global network of members and partners in the financial industry.
The organization aims to promote best practices in risk manageme...read more
Q11. How you perform daily task while closing?
I prioritize tasks, communicate with team members, and ensure all deadlines are met during the closing process.
Prioritize tasks based on urgency and importance
Communicate with team members to coordinate efforts and share updates
Ensure all deadlines are met by staying organized and focused
Review and double-check work to avoid errors
Utilize time management techniques to maximize productivity
Q12. What is tap library??
A tap library is a collection of pre-built code snippets that can be easily integrated into software applications.
Tap libraries can save developers time and effort by providing pre-built code for common functions.
Examples of tap libraries include Google's Tap Target Library for Android and the Tapku Library for iOS.
Tap libraries can be open source or proprietary, and may be free or require a license fee.
Using a tap library can help ensure consistency and quality across differ...read more
Q13. How to check the VPN is connected or not?
To check if a VPN is connected, you can look for the VPN icon in the system tray, check network settings, or use command line tools.
Look for the VPN icon in the system tray on your computer
Check network settings to see if the VPN connection is active
Use command line tools like 'ipconfig' or 'ifconfig' to check the status of the VPN connection
Q14. What is difference between ost and pst?
OST and PST are file formats used by Microsoft Outlook to store data. OST is an offline file, while PST is an archive file.
OST stands for Offline Storage Table and is used to store data when Outlook is in offline mode.
PST stands for Personal Storage Table and is used to store archived data.
OST files are synchronized with the Exchange server when Outlook is online.
PST files can be imported or exported to transfer data between different Outlook installations.
OST files are typic...read more
Q15. What do you know about black line?
Black line is a term commonly used in finance and accounting to refer to a line item on a financial statement that represents a negative value or loss.
Black line is often used to indicate a decrease in value or a loss on a financial statement.
It is the opposite of a black line, which represents a positive value or profit.
Black line can also refer to a software company that provides financial close, consolidation, and reporting solutions.
Q16. Description of Oracle architecture background processes.
Oracle architecture background processes are essential components that manage various tasks in the database system.
Background processes handle tasks such as memory management, I/O operations, and process monitoring.
Examples of background processes include PMON (Process Monitor), SMON (System Monitor), and DBWn (Database Writer).
Q17. What is SQL database
SQL database is a software used to manage and store data in a structured manner.
SQL stands for Structured Query Language
It is used to create, modify, and query relational databases
Examples of SQL databases include MySQL, Oracle, and Microsoft SQL Server
Q18. How to delete vlan dat file
To delete vlan dat file, use the delete flash:vlan.dat command in privileged EXEC mode.
Access privileged EXEC mode on the switch
Use the delete flash:vlan.dat command
Confirm deletion when prompted
Save the configuration to prevent the file from being recreated on reboot
Q19. What is VPN ? and how its work
VPN stands for Virtual Private Network. It is a secure connection between two or more devices over the internet.
VPN encrypts the data transmitted between devices to ensure privacy and security.
It allows users to access resources on a private network remotely.
VPN can be used to bypass geographical restrictions and access content that is not available in a particular region.
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost.
VPN can be set up on various devices...read more
Q20. Explain DHCP ? Dora process
DHCP is a network protocol that assigns IP addresses to devices on a network. DORA process is used for IP address allocation.
DHCP stands for Dynamic Host Configuration Protocol
DHCP server assigns IP addresses to devices on a network
DORA process includes Discovery, Offer, Request, and Acknowledgment
Discovery: Client broadcasts a request for an IP address
Offer: DHCP server offers an IP address to the client
Request: Client requests the offered IP address
Acknowledgment: DHCP serv...read more
Q21. What dou you know about VMware vSphare.
VMware vSphere is a virtualization platform that enables organizations to run multiple virtual machines on a single physical server.
vSphere provides a centralized management interface for virtualized infrastructure.
It allows for the creation, management, and migration of virtual machines.
vSphere includes features such as high availability, fault tolerance, and distributed resource scheduling.
It also supports a variety of storage and networking options.
Examples of vSphere edit...read more
Q22. What is OTC process ?
OTC process refers to over-the-counter process, where products are sold directly to consumers without the need for a prescription.
OTC products are typically medications or healthcare products that can be purchased without a prescription from a healthcare professional.
These products are often available in pharmacies, supermarkets, or online.
Consumers can self-diagnose their condition and choose the appropriate OTC product for treatment.
Examples of OTC products include pain rel...read more
Q23. What is Troubleshooting?
Troubleshooting is the process of identifying and resolving problems or issues in a system or device.
It involves identifying the problem or issue
Gathering information about the system or device
Analyzing the information to determine the cause of the problem
Developing and implementing a solution to resolve the problem
Testing the solution to ensure it has resolved the problem
Examples include fixing a malfunctioning computer, resolving network connectivity issues, or repairing a ...read more
Q24. What are the 5 FSMO roles
The 5 FSMO roles are Domain Naming Master, Schema Master, RID Master, PDC Emulator, and Infrastructure Master.
Domain Naming Master: responsible for adding or removing domains in a forest.
Schema Master: responsible for making changes to the Active Directory schema.
RID Master: responsible for allocating RIDs (Relative Identifiers) to domain controllers.
PDC Emulator: responsible for backward compatibility with older versions of Windows and time synchronization.
Infrastructure Mas...read more
Q25. What is complex circuit?
A complex circuit is a circuit that contains multiple components and pathways, making it difficult to analyze and design.
Complex circuits can include multiple resistors, capacitors, and/or inductors.
They may also include transistors, diodes, and other active components.
Complex circuits can have multiple pathways for current to flow, making analysis and design more challenging.
Examples of complex circuits include amplifiers, filters, and oscillators.
Designing complex circuits ...read more
Q26. What is Ticketing Tools
Ticketing tools are software applications used to manage and track customer support requests or issues.
Ticketing tools help organizations streamline their customer support processes
They allow customers to submit support requests through various channels such as email, phone, or web forms
Tickets are then assigned to support agents who can track the progress of the request and communicate with the customer
Examples of ticketing tools include Zendesk, Freshdesk, and Jira Service ...read more
Q27. What is Cyber Security
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access to data and information.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, antivirus software, encryption, and multi-factor authentication.
Q28. What is accrual concept ?
Accrual concept is a method of accounting where revenues and expenses are recognized when earned or incurred, regardless of when payment is received or made.
Accrual accounting recognizes revenue when it is earned, not when payment is received
Expenses are recognized when they are incurred, not when payment is made
This method provides a more accurate picture of a company's financial health
Example: A company provides services in December but doesn't receive payment until January...read more
Q29. What is net assets ?
Net assets refer to the total value of an organization's assets minus its liabilities.
Net assets are calculated by subtracting liabilities from total assets.
They represent the residual value of an organization's assets after all liabilities have been paid off.
Net assets can be positive or negative, depending on whether an organization's liabilities exceed its assets or vice versa.
They are an important measure of an organization's financial health and stability.
Examples of net...read more
Q30. ITIL definition
ITIL is a framework for IT service management that provides guidelines for efficient and effective IT operations.
ITIL stands for Information Technology Infrastructure Library
It provides a set of best practices for IT service management
It covers areas such as service strategy, design, transition, operation, and continual improvement
ITIL is widely adopted by organizations worldwide
ITIL certification is available for individuals to demonstrate their knowledge and expertise
Q31. what is SLA Process
SLA Process is a Service Level Agreement process that defines the level of service expected between a service provider and a customer.
SLA Process outlines the agreed upon services, responsibilities, and performance metrics between the two parties.
It includes details such as response times, resolution times, availability, and penalties for not meeting the agreed upon service levels.
SLA Process helps in setting clear expectations, measuring performance, and ensuring accountabil...read more
Q32. Design patterns in Java
Design patterns in Java are reusable solutions to common problems in software design.
Design patterns help in creating flexible, reusable, and maintainable code.
Some common design patterns in Java include Singleton, Factory, Observer, and Strategy.
Each design pattern has its own purpose and can be applied to different scenarios.
Design patterns promote best practices and improve code readability and scalability.
Q33. Networking methods
Networking methods refer to the various ways in which devices communicate and share information with each other.
Networking methods include wired (Ethernet, fiber optic) and wireless (Wi-Fi, Bluetooth) connections.
Devices can communicate through protocols such as TCP/IP, HTTP, and FTP.
Networking devices like routers, switches, and access points help facilitate communication between devices.
Virtual private networks (VPNs) provide secure connections over public networks.
Cloud ne...read more
Top HR Questions asked in Escorts Kubota Limited
Interview Process at Escorts Kubota Limited
Top Senior Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month