Inspirisys Solution
20+ Interview Questions and Answers
Q1. Internet is not working, what are the troubleshooting option we have?
Troubleshooting options for internet connectivity issues.
Check if other devices are able to connect to the internet
Restart the router/modem
Check if the Ethernet cable is properly connected
Check if the Wi-Fi password is correct
Check if the DNS settings are correct
Run network troubleshooter
Disable and re-enable network adapter
Check for any software or firewall blocking internet access
Q2. what is subnet mask, outlook file types
Subnet mask is a 32-bit number used to divide an IP address into network and host addresses. Outlook file types include PST, OST, MSG, and more.
Subnet mask is used to determine the network portion of an IP address
It is represented in decimal format, such as 255.255.255.0
Outlook file types include PST (Personal Storage Table), OST (Offline Storage Table), MSG (Message), and more
Q3. What is LAN, what are router
LAN is a local area network that connects devices within a limited area. A router is a networking device that forwards data packets between computer networks.
LAN stands for Local Area Network and is used to connect devices within a limited area such as a home, office, or school.
A router is a networking device that forwards data packets between computer networks. It connects multiple devices to the internet and allows them to communicate with each other.
Routers can be wired or...read more
Q4. What are different type of priorities in SLA?
SLA priorities include critical, high, medium, and low.
Critical priority is for issues that require immediate attention and resolution.
High priority is for issues that are important but not as urgent as critical issues.
Medium priority is for issues that are important but can wait for a little while.
Low priority is for issues that are not urgent and can be resolved at a later time.
SLA priorities are usually defined in terms of response time and resolution time.
For example, a c...read more
Q5. How many tickets you resolve on an average?
On an average, I resolve around 20-25 tickets per day.
I prioritize tickets based on their urgency and impact on business operations.
I ensure timely resolution of tickets while maintaining quality.
I also focus on identifying the root cause of the issue to prevent future occurrences.
Examples: Resolving issues related to software installation, network connectivity, printer configuration, etc.
Q6. What is fsmo role at windows server.what is diff between public private and hybrid cloud. How to allocate resources.how to create VMware VMS.How to check utilisation of vms .what is vsan.what is hybrid and all ...
read moreFSMO role in Windows Server, cloud types, resource allocation, VM creation, utilization check, VSAN, hybrid and all-flash explained.
FSMO (Flexible Single Master Operations) role is a set of 5 operations master roles in Windows Server
Public cloud is owned by a third-party provider, private cloud is owned by the organization, hybrid cloud is a mix of both
Resource allocation can be done through vSphere Client or vSphere Web Client
VMware VMs can be created through vSphere Client ...read more
Q7. What is the role of proxy server?
A proxy server acts as an intermediary between clients and servers, providing security, anonymity, and caching benefits.
Proxy servers can be used to filter web content, blocking access to certain websites or types of content.
They can also improve network performance by caching frequently accessed resources, reducing the need for clients to request them from the server.
Proxy servers can provide anonymity by masking the IP address of the client, making it more difficult to trac...read more
Q8. Difference between service & Incident Ticket?
Service tickets are requests for a change or new service, while incident tickets are requests for help with an existing service.
Service tickets are proactive and planned, while incident tickets are reactive and unplanned.
Service tickets are often initiated by the IT department, while incident tickets are initiated by end-users.
Examples of service tickets include requests for new software or hardware, while examples of incident tickets include requests for password resets or s...read more
Q9. List of storages worked so far
I have worked with various storage systems in my career as a Senior Engineer.
Distributed file systems like Hadoop Distributed File System (HDFS)
Object storage systems like Amazon S3
Network Attached Storage (NAS) systems
Block storage systems like Amazon Elastic Block Store (EBS)
Database storage systems like MySQL and PostgreSQL
In-memory storage systems like Redis
Cloud storage systems like Google Cloud Storage
Content Delivery Networks (CDNs) like Cloudflare
Q10. Different types topology of leyer
Different types of network topologies include bus, star, ring, mesh, and hybrid.
Bus topology connects all devices in a linear sequence.
Star topology connects all devices to a central hub.
Ring topology connects all devices in a circular sequence.
Mesh topology connects all devices to each other.
Hybrid topology is a combination of two or more topologies.
Q11. what is unix and linux
Unix and Linux are operating systems that are widely used in the tech industry.
Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix.
Linux is a Unix-like operating system that is open-source and freely available for distribution and modification.
Both Unix and Linux are known for their stability, security, and flexibility.
Unix and Linux are commonly used in servers, supercomputers, and embedded systems.
Examples of Unix-b...read more
Q12. Different between Mac and windows
Mac and Windows are two different operating systems used in computers.
Mac is developed by Apple while Windows is developed by Microsoft.
Mac is known for its user-friendly interface and design while Windows is known for its compatibility with a wide range of software.
Mac is generally considered to be more secure than Windows.
Mac computers are typically more expensive than Windows computers.
Mac computers use a different file system than Windows computers.
Mac computers come with...read more
Q13. What is your favorite topic in cs?
My favorite topic in CS is artificial intelligence.
Artificial intelligence is a fascinating field that focuses on creating intelligent machines capable of performing tasks that typically require human intelligence.
I am particularly interested in machine learning algorithms and neural networks, which enable computers to learn from data and make predictions or decisions.
Natural language processing and computer vision are also areas of AI that I find intriguing.
Some examples of ...read more
Q14. If a Computer audio is not working what would you check first
Check the volume settings and audio output device.
Check if the volume is muted or turned down
Ensure the correct audio output device is selected
Check if the audio drivers are up to date
Restart the computer and check again
Try using headphones or external speakers to isolate the issue
Q15. Sql Union command and what is sp,joints
SQL Union command is used to combine the result sets of two or more SELECT statements. SP stands for Stored Procedure and Joints is not a valid term in SQL.
UNION command is used to combine the result sets of two or more SELECT statements into a single result set.
SP or Stored Procedure is a precompiled collection of SQL statements that can be executed with a single call.
Joints is not a valid term in SQL, it might be a typo for Joins which is used to combine rows from two or mo...read more
Q16. Write a code to display fibonaci series of n numbers.
Code to display Fibonacci series of n numbers.
Initialize an array to store Fibonacci numbers
Use a loop to calculate Fibonacci numbers based on previous two numbers
Display the Fibonacci series
Q17. how many charectors in a letter in Java.
A letter in Java is represented as a single character data type, which can hold one character.
In Java, a letter is represented using the char data type.
The char data type is a 16-bit unsigned integer that represents Unicode characters.
For example, 'A' is a letter in Java represented as the char value 'A'.
Q18. Write a code to search the number in an array .
Code to search a number in an array of strings
Convert the array of strings to an array of integers before searching
Use a loop to iterate through the array and compare each element with the target number
Return the index of the number if found, otherwise return -1
Q19. What is Recursion? Give Example.
Recursion is a programming technique where a function calls itself in order to solve a problem.
Recursion involves breaking down a problem into smaller subproblems and solving them recursively.
Each recursive call works on a smaller input until a base case is reached.
Example: Factorial calculation, Fibonacci sequence, tree traversal.
Q20. Explain different features of OOPs concept.
OOPs concept features include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Ability to create a new class from an existing class, inheriting its attributes and methods.
Polymorphism: Ability to use a single interface for different data types or objects.
Abstraction: Hiding the complex implementation details and showing only the necessary features to the outside ...read more
Q21. Backup tools worked
Backup tools worked
Describe the backup tools you have used
Explain how the backup tools were implemented
Discuss any challenges faced and how they were resolved
Provide examples of successful backup and restore operations
Q22. MDM tools and it's characteristics?
MDM tools are used to manage and secure mobile devices in an organization.
MDM stands for Mobile Device Management.
These tools allow organizations to remotely manage and control mobile devices.
Characteristics of MDM tools include device enrollment, policy enforcement, app management, and remote wipe.
Examples of MDM tools include Microsoft Intune, VMware AirWatch, and MobileIron.
Q23. What is HA,DRS,ft,snapshot templates cloning
HA, DRS, FT, snapshot templates cloning are features in VMware vSphere for high availability, resource management, fault tolerance, and virtual machine cloning.
HA (High Availability) ensures VMs are restarted on another host in case of host failure
DRS (Distributed Resource Scheduler) balances VM workloads across hosts for optimal performance
FT (Fault Tolerance) provides continuous availability by running a duplicate VM on another host
Snapshot templates cloning allows for quic...read more
Q24. What is OSPF? explain
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology database
It supports multiple areas for scalability
OSPF uses cost as a metric to determine the best path
Q25. Add even numbers in array
Iterate through array, check if number is even, and add to sum
Iterate through each element in the array
Check if the element is a number and if it is even
If the number is even, add it to a running sum
Q26. What is BGP protocol
BGP (Border Gateway Protocol) is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet.
BGP is used to make routing decisions based on network policies, rules, and attributes.
It operates on TCP port 179.
BGP routers exchange routing information through update messages.
BGP is classified as a path vector protocol.
BGP is crucial for the functioning of the internet as it helps in determining the best path ...read more
Q27. What type of Printer issues.
Q28. What is troubleshooting
Q29. Types of windows
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month