InKnowTech
10+ Marsh Interview Questions and Answers
Q1. What is OSI Model?
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred from one computer to another over a network.
Each layer in the OSI Model has specific functions and communicates with adjacent layers.
Examples of layers include Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Laye...read more
Q2. What is Networking?
Networking is the practice of connecting computers and other devices to share resources and communicate with each other.
Networking involves the use of hardware such as routers, switches, and cables to create a network.
It also involves the use of protocols such as TCP/IP to facilitate communication between devices.
Networking allows devices to share resources such as files, printers, and internet connections.
Examples of networking technologies include Ethernet, Wi-Fi, and VPNs.
Q3. What is sscm and what is configuration manager.
SSCM stands for System Center Configuration Manager, a software management suite. Configuration Manager is a tool for managing devices and applications in an organization.
SSCM is an abbreviation for System Center Configuration Manager.
It is a software management suite developed by Microsoft.
Configuration Manager is used for managing devices, applications, and updates in an organization.
It allows IT administrators to automate software deployment, security updates, and system c...read more
Q4. What is gpupdate and what is the use of it.
gpupdate is a command-line tool used in Windows operating systems to force a group policy update on a local or remote computer.
gpupdate is used to apply any changes made to group policies on a Windows computer without having to wait for the regular update interval.
It can be run from the command prompt or PowerShell.
For example, 'gpupdate /force' can be used to immediately update group policies on a computer.
Q5. What are the rolles and responsibilities
Technical Support Engineers provide technical assistance and support to customers and businesses.
Troubleshoot technical issues reported by customers
Provide timely and accurate solutions to problems
Document and track customer issues and resolutions
Collaborate with other teams to resolve complex issues
Train customers on product usage and troubleshooting techniques
Q6. What is a incident , service request and SLA timings for respective tickets
An incident is an unplanned interruption to an IT service, a service request is a formal request for something to be provided, and SLA timings are agreed upon response and resolution times for tickets.
An incident is a disruption to normal service that needs to be resolved quickly to minimize impact on users, such as a server outage or software crash.
A service request is a formal request from a user for something to be provided, such as a new software installation or access to...read more
Q7. What is active directory
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication and authorization of users
Enables administrators to assign policies, deploy software, and apply updates
Example: Used in corporate environments to manage user accounts and permissions
Q8. What is compliance
Compliance refers to following rules, regulations, standards, or laws set by an organization or governing body.
Compliance ensures that individuals or organizations adhere to specific guidelines or requirements.
It can involve meeting industry standards, legal regulations, or internal policies.
Non-compliance can result in penalties, fines, or legal action.
Examples include GDPR compliance for data protection, HIPAA compliance for healthcare privacy, and PCI DSS compliance for pa...read more
Q9. What is firewall and nat
Firewall is a network security system that monitors and controls incoming and outgoing network traffic. NAT (Network Address Translation) is a process used to modify network address information in packet headers while in transit.
Firewall acts as a barrier between a trusted internal network and untrusted external network
Firewall can be hardware-based or software-based
NAT allows multiple devices on a local network to share a single public IP address
NAT can be used to hide the i...read more
Q10. What is expected CTC
The expected CTC for the Senior Network Security Engineer position is based on experience, skills, and industry standards.
CTC expectations vary based on the company, location, and level of experience
Candidates can research industry standards and average salaries for similar roles
Negotiation skills can play a role in determining the final CTC offer
Q11. What is dc aci
DC ACI stands for Data Center Application Centric Infrastructure, a software-defined networking solution for data centers.
DC ACI is a technology developed by Cisco to automate network provisioning, management, and troubleshooting in data center environments.
It uses a policy-driven approach to simplify network operations and improve agility.
DC ACI allows for centralized control and visibility of network traffic, making it easier to implement security policies and ensure compli...read more
Q12. What is bg fix
BigFix is a systems management software used for managing large groups of computers.
BigFix is used for patch management, software distribution, security configuration, and asset inventory.
It helps organizations ensure their systems are up-to-date and secure.
BigFix can automate tasks such as software updates and vulnerability remediation.
Example: BigFix can be used to deploy patches to thousands of computers in a network.
Example: BigFix can monitor and enforce security policie...read more
Q13. What is relay
A relay is a device that acts as a switch to control the flow of electricity in a circuit.
Relays are used to control high voltage circuits with low voltage signals.
They consist of a coil and a set of contacts that open or close when the coil is energized.
Relays are commonly used in automation systems, automotive applications, and industrial machinery.
Examples include using a relay to control the operation of a motor or turning on/off lights remotely.
Top HR Questions asked in Marsh
Interview Process at Marsh
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month