Hitachi Systems Micro Clinic
20+ Niit Foundation Interview Questions and Answers
Q1. 1- why do you want to join interworking and desktop support?
I am interested in joining interworking and desktop support because of my passion for troubleshooting and helping others with their technical issues.
I enjoy problem-solving and finding solutions to technical issues
I have experience in desktop support and enjoy working with end-users
I am interested in learning more about interworking and network administration
I believe my skills and experience would be a good fit for this role
Q2. What is the deffrence between win 9 and win 10???
Windows 10 is the newer version of Windows operating system compared to Windows 9 which does not exist.
Windows 9 does not exist, it was skipped by Microsoft
Windows 10 has a different user interface compared to Windows 8 and 8.1
Windows 10 has more advanced security features compared to Windows 7
Windows 10 has a virtual assistant called Cortana
Windows 10 has a feature called Continuum that allows seamless transition between desktop and tablet mode
Q3. How to configure outlook in exchange server??
To configure Outlook in Exchange Server, follow these steps:
Open Outlook and click on File
Click on Add Account
Enter your email address and click on Connect
Enter your password and click on OK
Outlook will automatically configure the settings for Exchange Server
Q4. How to repair pst file in outlook???
To repair a PST file in Outlook, use the Inbox Repair Tool (scanpst.exe).
Close Outlook before running the tool
Locate the scanpst.exe tool on your computer
Select the PST file you want to repair
Click on the 'Start' button to begin the repair process
Once the repair is complete, open Outlook and check if the issue is resolved
Q5. What is os, ad,how to backup, how to configure network printer.
OS is the operating system, AD is Active Directory. Backup can be done using various methods. Network printer can be configured using IP address or hostname.
OS is the software that manages computer hardware and software resources.
AD is a directory service that stores information about objects on a network.
Backup can be done using tools like Windows Backup, third-party backup software, or cloud backup services.
Network printer can be configured using its IP address or hostname,...read more
Q6. How to configure network in computer ??
Configuring network in a computer involves setting up IP address, subnet mask, default gateway, and DNS server.
Open Network and Sharing Center
Click on Change adapter settings
Right-click on the network adapter and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and click Properties
Enter IP address, subnet mask, default gateway, and DNS server
Click OK to save changes
Q7. what is the difference between LAN AND WAN
LAN is a local network while WAN is a wide area network.
LAN is limited to a small geographical area such as a home, office, or building
WAN covers a larger geographical area such as a city, country, or even the world
LAN typically has higher data transfer rates and lower latency compared to WAN
Examples of LAN include home networks, office networks, and school networks
Examples of WAN include the internet, cellular networks, and satellite networks
Q8. How to change domain???
To change a domain, you need to purchase a new domain and update the DNS records.
Purchase a new domain from a domain registrar
Update the DNS records to point to the new domain
Redirect the old domain to the new domain
Update any links or references to the old domain
Q9. Difference between the edr and antivirus
EDR focuses on detecting and responding to advanced threats, while antivirus focuses on preventing known threats.
EDR (Endpoint Detection and Response) is designed to detect and respond to advanced threats in real-time.
Antivirus software is focused on preventing known threats by scanning files and monitoring system activity.
EDR provides more advanced threat detection capabilities, such as behavior analysis and threat hunting.
Antivirus software relies on signature-based detecti...read more
Q10. What is domain?
A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.
A domain is a logical grouping of network resources such as computers, printers, and servers.
It allows for centralized management of user accounts, security policies, and network resources.
Domains are commonly used in business and enterprise environments.
Examples of domain names include microsoft.com, google.com, and apple.com.
Q11. What is DHCP?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.
DHCP is used to simplify network administration by automatically assigning IP addresses to devices.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also assign other network configuration settings, such as subnet masks and default gateways.
DHCP leases are temporary and must be renewed periodi...read more
Q12. What is dhcp,dns,host name, port no,
DHCP assigns IP addresses, DNS resolves domain names to IP addresses, hostname is a unique name for a device, port number identifies a specific process on a device.
DHCP - Dynamic Host Configuration Protocol assigns IP addresses to devices on a network
DNS - Domain Name System resolves domain names to IP addresses
Hostname - A unique name given to a device on a network
Port number - Identifies a specific process on a device
Q13. What is DNS?
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is like a phonebook for the internet
It helps to locate websites by translating domain names into IP addresses
DNS servers store information about domain names and their corresponding IP addresses
DNS can also be used for email routing and other network services
Q14. What is email security
Email security refers to the measures taken to secure the transmission and content of emails to protect against unauthorized access, data breaches, and malware.
Email encryption to protect the content of emails from being read by unauthorized parties
Implementing strong authentication methods to prevent unauthorized access to email accounts
Using anti-malware software to scan and detect malicious attachments or links in emails
Training employees on how to recognize phishing attem...read more
Q15. How to configure of ms outlook
Configuring MS Outlook involves setting up email accounts, server settings, and personal preferences.
Open Outlook and click on File
Click on Add Account and enter your email address
Enter your password and follow the prompts to complete setup
To configure server settings, click on File > Account Settings > Account Settings
Select your email account and click on Change
Enter the incoming and outgoing server settings provided by your email provider
To customize personal preferences, ...read more
Q16. What is SOC and antivirus
SOC stands for Security Operations Center, which is a centralized unit that deals with security issues on an organizational level. Antivirus software is a program designed to detect and remove malicious software from a computer system.
SOC is a centralized unit within an organization responsible for monitoring and responding to security incidents.
Antivirus software is designed to detect and remove malicious software, such as viruses, worms, and trojans.
SOC analysts use various...read more
Q17. What virus and malware
Viruses and malware are malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
Viruses are self-replicating programs that attach themselves to clean files and spread throughout a computer system.
Malware is a broader term that includes viruses, worms, trojans, ransomware, spyware, and adware.
Examples of malware include WannaCry ransomware, Zeus trojan, and Mirai botnet.
Q18. /var is full how to troubleshoot?
To troubleshoot a full /var directory, check for large files, unused log files, and temporary files.
Check for large files taking up space in /var directory
Look for unused log files that can be archived or deleted
Remove temporary files that are no longer needed
Consider moving some files to a different location if possible
Q19. What is Google workspace
Google Workspace is a cloud-based productivity suite that includes Gmail, Drive, Docs, Sheets, Slides, Meet, and more.
Formerly known as G Suite
Includes communication and collaboration tools
Allows for real-time collaboration on documents
Offers various pricing plans for businesses and individuals
Q20. What is IP?
IP stands for Internet Protocol, a set of rules governing the format of data sent over the internet or other networks.
IP is responsible for routing data packets between devices on a network.
It assigns unique addresses to each device on the network, known as IP addresses.
There are two versions of IP in use today: IPv4 and IPv6.
IPv4 addresses are 32-bit numbers, while IPv6 addresses are 128-bit numbers.
IP is a layer 3 protocol in the OSI model.
Examples of IP-based protocols inc...read more
Q21. Types of viruses
Viruses are malicious software programs that can replicate themselves and infect computer systems.
File infectors: attach themselves to executable files and spread when the infected file is executed (e.g. CIH, Sasser)
Boot sector viruses: infect the master boot record of a storage device and spread when the system is booted (e.g. Stoned, Michelangelo)
Macro viruses: infect documents and spreadsheets that support macros (e.g. Melissa, Love Bug)
Worms: self-replicating malware that...read more
Q22. What is SLA,SR,Tat ,
SLA stands for Service Level Agreement, SR stands for Service Request, and TAT stands for Turnaround Time.
SLA is a contract between a service provider and a customer that outlines the level of service expected.
SR is a request made by a customer for a specific service or support.
TAT is the time it takes to complete a service request or resolve an issue.
SLA, SR, and TAT are important metrics in measuring the quality of service provided by a support team.
Q23. Installation of printer
To install a printer, connect it to the computer and follow the on-screen instructions.
Connect the printer to the computer using a USB cable or through Wi-Fi
Turn on the printer and make sure it is in a ready state
Go to the 'Devices and Printers' section in the Control Panel
Click on 'Add a printer' and select the printer you want to install
Follow the on-screen instructions to complete the installation process
Q24. Tool analysis for logs
Tool analysis for logs involves evaluating different tools for monitoring and analyzing log data.
Consider the features and capabilities of each tool
Evaluate the ease of use and user interface
Look at the scalability and performance of the tool
Check for integration with other systems and compatibility with different log formats
Q25. Series of servers
A series of servers refers to multiple servers connected in a chain or sequence to handle different tasks or processes.
Servers are connected in a chain or sequence to distribute workload
Each server may have a specific function or role in the series
Examples include web servers, database servers, and application servers
Top HR Questions asked in Niit Foundation
Interview Process at Niit Foundation
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month