Add office photos
Employer?
Claim Account for FREE

Karvy Innotech

2.9
based on 324 Reviews
Filter interviews by

30+ Kotak Mahindra Prime Interview Questions and Answers

Updated 24 Jan 2025
Popular Designations

Q1. What is latest windows version and which kind of prints & scanner can you install?, do you how to configuration lotus notes & outlook, how to configuration vpn, global protect, sonic wall, forti client and trou...

read more
Ans.

The latest Windows version is Windows 10. I can install various types of printers and scanners, configure Lotus Notes and Outlook, set up VPNs like Global Protect, Sonic Wall, and FortiClient, troubleshoot mail configurations on mobile devices, work on incident management tools, troubleshoot network port issues, maintain compliance and security software, upgrade systems, resolve hardware failures, and collaborate with vendor teams.

  • Latest Windows version is Windows 10

  • Can insta...read more

Add your answer

Q2. How to share network printer and installation

Ans.

To share a network printer, install the printer driver on the host computer and share it with other computers on the network.

  • Install the printer driver on the host computer

  • Connect the printer to the host computer and turn it on

  • Go to Control Panel > Devices and Printers > right-click on the printer > Printer properties > Sharing tab

  • Check the box 'Share this printer'

  • Give the printer a share name

  • Click OK

  • On the client computer, go to Control Panel > Devices and Printers > Add a p...read more

Add your answer

Q3. What's are the tools of back up?

Ans.

Tools for backup include software, hardware, and cloud-based solutions.

  • Backup software such as Acronis, Veeam, and Backup Exec

  • Hardware solutions like tape drives, external hard drives, and network-attached storage (NAS)

  • Cloud-based backup services like Amazon S3, Google Drive, and Microsoft OneDrive

  • Backup generators and uninterruptible power supplies (UPS) to ensure power continuity

  • Backup scripts and automation tools to schedule and manage backups

Add your answer

Q4. What do the MAC address and langth size

Ans.

MAC address is a unique identifier assigned to network interfaces for communications on the physical network.

  • MAC address stands for Media Access Control address.

  • It is a 48-bit address assigned to network interfaces for communication on the physical network.

  • It is used to uniquely identify devices on a network.

  • The length size of a MAC address is 48 bits or 6 bytes.

  • The first 24 bits of a MAC address represent the vendor or manufacturer of the device, while the last 24 bits repre...read more

Add your answer
Discover Kotak Mahindra Prime interview dos and don'ts from real experiences

Q5. How to find the reliability of a link on Cisco routers?

Ans.

To find the reliability of a link on Cisco routers, use the show interface command.

  • Log in to the Cisco router using the console or Telnet/SSH.

  • Enter the command 'show interface' to display the status of all interfaces on the router.

  • Look for the 'input errors' and 'output errors' fields to determine the reliability of the link.

  • If there are a high number of errors, the link may be unreliable and require troubleshooting.

  • Other fields to look for include 'CRC errors', 'late collisi...read more

Add your answer

Q6. What is blue screen errors?

Ans.

Blue screen errors, also known as the Blue Screen of Death (BSOD), is a critical system error that causes the computer to crash.

  • It is a critical system error that causes the computer to crash.

  • It is also known as the Blue Screen of Death (BSOD).

  • It is usually caused by hardware or software issues.

  • It displays a blue screen with an error message and a code.

  • The code can be used to identify the cause of the error.

  • Common causes include faulty hardware, outdated drivers, and malware....read more

Add your answer
Are these interview questions helpful?

Q7. How to test internet connectivity?

Ans.

To test internet connectivity, use ping command or visit a website.

  • Use ping command to check if there is a response from a website or IP address

  • Visit a website to check if it loads properly

  • Check network settings and cables

  • Use network diagnostic tools like traceroute or nslookup

Add your answer

Q8. How to access network computer using ip

Ans.

To access a network computer using IP, use the Windows Run command or Command Prompt.

  • Press Windows key + R and type the IP address in the Run dialog box

  • Open Command Prompt and type 'ping [IP address]' to check connectivity

  • Use Remote Desktop Connection to access the computer

  • Map a network drive to access shared folders on the computer

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to configure internet?

Ans.

To configure internet, you need to set up network settings and connect to a network.

  • Check if your computer has a network adapter and if it's enabled

  • Connect to a network by selecting it from the list of available networks

  • Enter the network password if required

  • Configure network settings such as IP address, subnet mask, and default gateway

  • Test the internet connection by opening a web browser and visiting a website

Add your answer

Q10. How to manage SLA and client requirement and how convince to user

Ans.

Manage SLA and client requirements by setting clear expectations, prioritizing tasks, and communicating effectively with users.

  • Establish clear SLAs with clients to define response times and resolution expectations.

  • Prioritize tasks based on urgency and impact on business operations.

  • Communicate regularly with users to provide updates on progress and manage expectations.

  • Provide training and resources to help users understand SLA requirements and how to best utilize support servi...read more

Add your answer

Q11. How much calls can handle on daily basis

Ans.

The number of calls a Desktop Support Engineer can handle on a daily basis depends on various factors such as complexity of issues, team size, and workload.

  • The number of calls can vary depending on the complexity of the issues being addressed.

  • Team size and workload distribution also play a role in determining how many calls can be handled.

  • Efficiency in troubleshooting and resolving issues can increase the number of calls that can be managed.

  • Prioritizing tasks and managing tim...read more

Add your answer

Q12. Described the ping commands?

Ans.

Ping command is used to test the connectivity between two devices on a network.

  • Ping sends an ICMP echo request to the target device and waits for a response.

  • It measures the round-trip time for the packet to reach the target and come back.

  • Ping can also be used to determine the IP address of a domain name.

  • Commonly used ping commands include ping -t (continuous ping) and ping -a (resolve IP address to hostname).

Add your answer

Q13. How DHCP works?

Ans.

DHCP assigns IP addresses to devices on a network automatically.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS servers automatically.

  • DHCP servers lease IP addresses to devices for a specific amount of time.

  • DHCP uses a four-step process: Discover, Offer, Request, and Acknowledge.

  • DHCP can also be used to assign other network configuration settings, such as WINS and NTP servers.

Add your answer

Q14. What is a VLAN, and how does it function?

Ans.

A VLAN is a virtual LAN that allows for the segmentation of network traffic to improve performance, security, and manageability.

  • VLANs divide a physical network into multiple logical networks, each with its own broadcast domain.

  • Devices within the same VLAN can communicate with each other as if they were connected to the same physical network.

  • VLANs can be configured to isolate sensitive data or specific types of traffic for security purposes.

  • VLANs can span multiple switches and...read more

Add your answer

Q15. How to check copper twisted pair?

Ans.

Copper twisted pair can be checked using a cable tester to ensure proper connectivity and identify any faults.

  • Use a cable tester to check for continuity and proper wiring

  • Check for any faults such as shorts, opens, or miswires

  • Verify that the cable meets the required specifications for the network

  • Perform a loopback test to ensure that data can be transmitted and received properly

Add your answer

Q16. How to identify leased line modem fault?

Ans.

Identifying leased line modem fault

  • Check if the modem is powered on and all cables are properly connected

  • Check the modem's status lights for any abnormalities

  • Perform loopback tests to check for connectivity issues

  • Check the modem's configuration settings

  • Replace the modem if all other troubleshooting steps fail

Add your answer

Q17. What is a HSRP, and how does it work ?

Ans.

HSRP stands for Hot Standby Router Protocol, used for providing high availability in a network by allowing two or more routers to work together in a group.

  • HSRP is a Cisco proprietary protocol used for redundancy in a network.

  • It allows multiple routers to work together in a group, with one router being the active router and the others as standby routers.

  • If the active router fails, one of the standby routers takes over as the active router.

  • HSRP uses a virtual IP address and a v...read more

Add your answer

Q18. Basic Port numbers of smtp dhcp

Ans.

SMTP uses port 25, DHCP uses port 67 and 68

  • SMTP uses port 25 for sending email messages

  • DHCP uses port 67 and 68 for dynamic IP address assignment

View 1 answer

Q19. How to manage VIP user on first response

Ans.

VIP users should receive priority support to ensure minimal downtime and maximum satisfaction.

  • Establish a dedicated support line or email for VIP users to contact for immediate assistance

  • Assign a specific team member or group to handle VIP user requests

  • Implement a service level agreement (SLA) with guaranteed response times for VIP users

  • Regularly communicate with VIP users to ensure their needs are being met and address any concerns promptly

Add your answer

Q20. How to provide good service to client

Ans.

Good service to clients can be provided by being responsive, knowledgeable, and proactive.

  • Respond promptly to client inquiries and issues

  • Demonstrate expertise and knowledge in resolving technical problems

  • Anticipate client needs and provide solutions before they are requested

Add your answer

Q21. Desktop troubleshooting steps

Ans.

Desktop troubleshooting involves identifying the problem, researching solutions, and implementing fixes.

  • Gather information about the issue from the user

  • Check for error messages or codes

  • Research possible solutions online or in documentation

  • Try basic troubleshooting steps such as restarting the computer or checking connections

  • Implement more advanced solutions if basic steps do not work

  • Test the solution to ensure the issue is resolved

  • Document the problem and solution for future ...read more

Add your answer

Q22. How does the BGP works?

Ans.

BGP is a routing protocol used to exchange routing information between different autonomous systems.

  • BGP uses TCP as its transport protocol.

  • It operates on a hop-by-hop basis, meaning that it only exchanges routing information with its directly connected neighbors.

  • BGP uses path attributes to determine the best path for a given destination.

  • BGP can be used for both IPv4 and IPv6 routing.

  • BGP is commonly used by Internet Service Providers (ISPs) to connect their networks to the Int...read more

Add your answer

Q23. What is the windows file dydte?

Ans.

dydte is not a known or recognized Windows file.

  • There is no such file as dydte in Windows operating system.

  • It is possible that the file name is misspelled or it is a malware file.

  • It is recommended to run a virus scan on the system to ensure its safety.

Add your answer

Q24. Difference between HDD and ssd

Ans.

HDD uses spinning disks to store data, while SSD uses flash memory for faster access speeds.

  • HDD has moving parts, while SSD is solid-state

  • SSD is faster and more reliable than HDD

  • HDD is cheaper per gigabyte compared to SSD

  • Examples: HDD - Seagate Barracuda, SSD - Samsung 970 EVO

Add your answer

Q25. How does OSPF works?

Ans.

OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to a destination network.

  • OSPF routers exchange link-state advertisements (LSAs) to build a complete topology of the network.

  • Each router calculates the shortest path to every network using Dijkstra's algorithm.

  • OSPF uses cost as its metric, which is based on the bandwidth of the link.

  • OSPF supports multiple areas, which reduces the size of the routing table and improves scalabilit...read more

Add your answer

Q26. What is different version of windows Server

Ans.

Windows Server has different versions such as 2003, 2008, 2012, 2016, and 2019.

  • Windows Server 2003 - introduced Active Directory and improved security features

  • Windows Server 2008 - introduced Server Core and PowerShell

  • Windows Server 2012 - introduced Storage Spaces and Hyper-V Replica

  • Windows Server 2016 - introduced Nano Server and Storage Spaces Direct

  • Windows Server 2019 - introduced improved security features and Windows Admin Center

Add your answer

Q27. What are the different layers of the OSI model?

Ans.

The OSI model consists of seven layers that define the different functions of a network communication system.

  • Physical layer: Deals with the physical connection between devices (e.g. cables, switches)

  • Data link layer: Manages data transfer between devices on the same network (e.g. Ethernet)

  • Network layer: Handles routing and forwarding of data packets (e.g. IP)

  • Transport layer: Ensures reliable data transfer between devices (e.g. TCP)

  • Session layer: Manages communication sessions ...read more

Add your answer

Q28. What sis AD IN SSRVER?

Ans.

AD IN SSRVER stands for Active Directory in Server.

  • AD IN SSRVER refers to the integration of Active Directory with a server.

  • Active Directory is a directory service developed by Microsoft for managing network resources.

  • It provides a centralized database for storing and managing user accounts, groups, computers, and other network objects.

  • By integrating Active Directory with a server, organizations can streamline user authentication, access control, and resource management.

  • For e...read more

View 1 answer

Q29. What is vmdk and vhd file

Ans.

vmdk and vhd are virtual hard disk file formats used by virtualization software.

  • vmdk is a file format used by VMware virtualization software.

  • vhd is a file format used by Microsoft virtualization software.

  • Both formats are used to store virtual hard disk images.

  • They can be used to create and run virtual machines on a host system.

  • Both formats support features like snapshots and cloning.

Add your answer

Q30. What is wdus?

Ans.

Sorry, I am not familiar with the term 'wdus'.

  • I am not aware of any meaning or context for 'wdus'.

  • Could you please provide more information or context about 'wdus'?

  • Without any context or information, it is impossible to answer the question about 'wdus'.

Add your answer

Q31. What is a MAC address?

Ans.

A MAC address is a unique identifier assigned to network interfaces for communications on a network.

  • MAC stands for Media Access Control

  • It is a 12-digit hexadecimal number separated by colons or dashes

  • Used to identify devices on a network at the data link layer of the OSI model

Add your answer

Q32. What is hypervisor

Ans.

A hypervisor is a software that creates and manages virtual machines on a physical server.

  • Hypervisor allows multiple operating systems to run on a single physical machine

  • It provides isolation and security between virtual machines

  • There are two types of hypervisors: Type 1 (bare-metal) and Type 2 (hosted)

  • Examples of hypervisors include VMware ESXi, Microsoft Hyper-V, and KVM

Add your answer

Q33. What is I cloud

Ans.

iCloud is a cloud storage and computing service provided by Apple Inc.

  • iCloud allows users to store and sync data across multiple devices.

  • It can be used to backup photos, documents, and other files.

  • iCloud also includes features like Find My iPhone and iCloud Keychain.

  • Users can access their iCloud account through a web browser or through Apple's apps.

  • iCloud offers different storage plans ranging from 5GB to 2TB.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Kotak Mahindra Prime

based on 16 interviews
Interview experience
3.4
Average
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 330 Interview Questions
3.8
 • 328 Interview Questions
4.0
 • 194 Interview Questions
3.9
 • 152 Interview Questions
3.7
 • 151 Interview Questions
4.2
 • 146 Interview Questions
View all
Top Karvy Innotech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter