Kyndryl
100+ Barefoot Organics Interview Questions and Answers
Q1. Print rows where a certain criterion is met (ex - in a dataset of employees select the ones whose salary is greater than 100000 - in SQL)
Use SQL SELECT statement with WHERE clause to filter rows based on a specific criterion.
Use SELECT statement with WHERE clause to specify the criterion (ex: salary > 100000)
Example: SELECT * FROM employees WHERE salary > 100000;
Ensure proper syntax and column names are used in the query
Q2. Extract only India Players from dictionary (using list comprehension) CSK = {"Dhoni" : "India", "Du Plessis" : "South Africa", "RituRaj": "India", "Peterson" : "England", "Lara" : "West Indies"}
Extract India players from a dictionary using list comprehension
Use list comprehension to filter out players with nationality as 'India'
Create a new list with only the India players
Example: [player for player, nationality in CSK.items() if nationality == 'India']
Q3. What are the types of regression models, name them and explain them
Types of regression models include linear regression, logistic regression, polynomial regression, ridge regression, and lasso regression.
Linear regression: used to model the relationship between a dependent variable and one or more independent variables.
Logistic regression: used for binary classification problems, where the output is a probability value between 0 and 1.
Polynomial regression: fits a curve to the data by adding polynomial terms to the linear regression model.
Ri...read more
Q4. What is ETL and what are the types or examples of ETL tools
ETL stands for Extract, Transform, Load. It is a process of extracting data from various sources, transforming it into a usable format, and loading it into a target database.
ETL tools include Informatica PowerCenter, Talend, Apache Nifi, Microsoft SQL Server Integration Services (SSIS), and IBM InfoSphere DataStage.
Extract: Data is extracted from various sources such as databases, files, APIs, etc.
Transform: Data is cleaned, validated, and transformed into a format suitable f...read more
Q5. How do you print the 3, 5 and 7th row in a database (Python - use Pandas)
Printing specific rows from a database using Pandas in Python
Use Pandas library to read the database into a DataFrame
Use iloc method to select specific rows by index
Print the selected rows
Q6. Find Common Elements in three lists using sets arr1 = [1,5,10,20,40,80,100] arr2 = [6,7,20,80,100] arr3 = [3,4,15,20,30,70,80,120]
Use sets to find common elements in three lists.
Convert the lists to sets for efficient comparison.
Use the intersection method to find common elements.
Return the common elements as a set or list.
Q7. Print rows with the same set of values in column (these are not duplicates row - just the duplicates values in a column)
Print rows with the same set of values in a column
Identify unique sets of values in the column
Group rows based on these unique sets of values
Print out the rows for each unique set of values
Q8. How to create and configure Queue Manager and Objects?
To create and configure a Queue Manager and Objects, follow these steps:
Install and configure IBM MQ software
Create a Queue Manager using the MQSC command
Define Queues, Channels, and Listeners using MQSC commands or the IBM MQ Explorer
Configure Queue Manager properties such as security, logging, and performance settings
Test the Queue Manager and Objects to ensure they are functioning properly
Q9. Print Unique values in the dataset and delete the duplicate rows (SQL)
Use DISTINCT keyword to print unique values and DELETE with a subquery to remove duplicate rows.
Use SELECT DISTINCT column_name FROM table_name to print unique values.
Use DELETE FROM table_name WHERE row_id NOT IN (SELECT MAX(row_id) FROM table_name GROUP BY column_name) to delete duplicate rows.
Q10. Print rows with the second highest criterion value without using offset function in SQL
Use subquery to find rows with second highest criterion value in SQL without using offset function.
Use a subquery to find the maximum criterion value
Then use another subquery to find the maximum value that is less than the maximum value found in the first subquery
Finally, select rows with the second highest criterion value
Q11. Split Dataset in train, test and validation (import library and split dataset)
Use scikit-learn library to split dataset into train, test, and validation sets
Import train_test_split from sklearn.model_selection
Specify test_size and validation_size when splitting the dataset
Example: X_train, X_test, y_train, y_test = train_test_split(X, y, test_size=0.2, random_state=42)
Q12. What is the poweshell command to know Where / in which DC User Account got locked out?
The PowerShell command to find the DC where a user account got locked out.
Use the Get-EventLog cmdlet to retrieve the security event logs from all domain controllers.
Filter the logs to show only event ID 4740, which indicates an account lockout event.
Use the Where-Object cmdlet to filter the results to show only events related to the specified user account.
Use the Select-Object cmdlet to display only the DC name where the lockout occurred.
Q13. What is the FSMO role and with brief description about role. What is the memroy dump file type. What is the BSOD. What is the Active directory. What is the Ntds file. What is the global catalog. What is the gro...
read moreA series of technical questions related to systems administration.
FSMO role is a set of operations that can only be performed by one domain controller at a time.
Memory dump file type is a file that contains the contents of the system's memory at the time of a crash.
BSOD stands for Blue Screen of Death, which is an error screen displayed on Windows systems when a fatal system error occurs.
Active Directory is a directory service that stores information about objects on a networ...read more
Q14. What do you think is the most impactful technology today?
Artificial Intelligence is the most impactful technology today.
AI is transforming industries like healthcare, finance, and transportation.
It is being used to develop autonomous vehicles, personalized medicine, and fraud detection systems.
AI is also helping to solve complex problems like climate change and poverty.
It has the potential to revolutionize the way we live and work.
However, there are also concerns about its impact on jobs and privacy.
Q15. How to implement circular and linear logging in WMQ?
Circular and linear logging can be implemented in WMQ by configuring the queue manager.
For circular logging, set the LogPrimaryFiles and LogSecondaryFiles parameters to a non-zero value.
For linear logging, set the LogType parameter to 'linear' and specify the LogPath parameter.
Circular logging is recommended for most scenarios, as it allows for automatic log file recycling.
Linear logging is useful for scenarios where the log files need to be kept for a longer period of time.
B...read more
Q16. what is abstraction and how can we achieve it?
Abstraction is the concept of hiding complex implementation details and showing only the necessary features to the outside world.
Abstraction allows us to focus on what an object does rather than how it does it
Achieved through abstract classes and interfaces in object-oriented programming
Example: A car dashboard abstracts the internal workings of the car and provides only essential information to the driver
Q17. What are the current vesrion of Microsoft windows Server? What is Hyper-V? What is Active Directory? What is Dns? What is Dhcp? What is wsus? What is current versuon Client windows Operating system released by ...
read moreThe current version of Microsoft Windows Server is Windows Server 2019. Hyper-V is a virtualization platform. Active Directory is a directory service. DNS is a system that translates domain names to IP addresses. DHCP is a network protocol that assigns IP addresses to devices. WSUS is Windows Server Update Services. The current version of client Windows operating system is Windows 10.
Windows Server 2019 is the latest version of Microsoft Windows Server
Hyper-V is a virtualizat...read more
Q18. write a query to get 3rd highest salary from the employee table
Query to retrieve the 3rd highest salary from the employee table
Use the ORDER BY clause to sort salaries in descending order
Use the LIMIT clause to retrieve the 3rd highest salary
Q19. write a code to get 2nd last node and its value from the singly linked list.
Traverse the linked list to find the 2nd last node and return its value.
Traverse the linked list while keeping track of the current and previous nodes.
Once at the end of the list, return the value of the previous node.
Q20. you have an array of integer and retrieve the 2 smallest number from it without sorting the array.
Use two variables to keep track of the smallest and second smallest numbers in the array.
Iterate through the array and update the variables accordingly.
Initialize the variables with the maximum possible integer value to start with.
Example: array = [5, 2, 8, 1, 3], smallest = 1, secondSmallest = 2.
Q21. If VM locked ? Explain the Trouble Shooting steps to bring it up.
To troubleshoot a locked VM, follow these steps:
Check if the VM is responding to pings
Check if the VM is running out of resources
Check if there are any network connectivity issues
Restart the VM or the host machine if necessary
Q22. How we can migrate infrastructure from on-prem to cloud.
Migrating infrastructure from on-prem to cloud involves planning, assessment, and execution.
Assess the current infrastructure and identify what needs to be migrated
Choose the right cloud provider and services based on the requirements
Plan the migration process and create a roadmap
Test the migration process in a non-production environment
Execute the migration process and monitor the progress
Optimize the cloud infrastructure for better performance and cost-effectiveness
Q23. Difference in Linear and Logistic Regression
Linear regression is used for continuous variables, while logistic regression is used for binary outcomes.
Linear regression predicts continuous outcomes, while logistic regression predicts binary outcomes.
Linear regression uses a linear equation to model the relationship between the independent and dependent variables.
Logistic regression uses the logistic function to model the probability of a binary outcome.
Linear regression is used for tasks like predicting house prices, wh...read more
Q24. Difference in Random Forest and Decision Tree
Random Forest is an ensemble method using multiple decision trees, while Decision Tree is a single tree-based model.
Random Forest is a collection of decision trees that are trained on random subsets of the data.
Decision Tree is a single tree structure that makes decisions by splitting the data based on features.
Random Forest reduces overfitting by averaging the predictions of multiple trees.
Decision Tree can be prone to overfitting due to its high complexity.
Random Forest is ...read more
Q25. Different architecture methods and if comfortable with night shifts and weekend support.
Familiar with various architecture methods and comfortable with night shifts and weekend support.
I am familiar with various architecture methods such as client-server, peer-to-peer, and service-oriented architecture.
I have experience working night shifts and providing weekend support when necessary.
I understand the importance of maintaining system availability and am willing to work outside of regular business hours to ensure that systems are running smoothly.
I am comfortable...read more
Q26. What are SR-IOV and DPDK, and how do they compare in terms of performance?
SR-IOV and DPDK are technologies used to improve network performance in virtualized environments.
SR-IOV (Single Root I/O Virtualization) allows a single physical network interface card (NIC) to appear as multiple virtual NICs, improving network performance by reducing overhead.
DPDK (Data Plane Development Kit) is a set of libraries and drivers for fast packet processing, bypassing the kernel network stack for improved performance.
SR-IOV is hardware-based virtualization, while...read more
Q27. What security measures did you take before rolling out an application in the production environment?
Before rolling out an application in the production environment, security measures taken include thorough testing, access control, encryption, and monitoring.
Conducting thorough security testing to identify and address vulnerabilities
Implementing access control measures to restrict unauthorized access to the application
Utilizing encryption to protect sensitive data in transit and at rest
Setting up monitoring tools to detect and respond to security incidents in real-time
Q28. Difference between Power BI and Tableau
Power BI is a Microsoft product focused on business intelligence and data visualization, while Tableau is a standalone data visualization tool.
Power BI is more user-friendly and integrates well with other Microsoft products.
Tableau is known for its powerful data visualization capabilities and flexibility in creating complex visualizations.
Power BI is often preferred by organizations already using Microsoft products, while Tableau is popular among data analysts and visualizati...read more
Q29. Limitations of Power BI and Tableau
Power BI and Tableau have limitations in terms of data connectivity, customization, and pricing.
Limited data connectivity options compared to other tools
Limited customization capabilities for advanced analytics
High pricing for enterprise-level features
Tableau has better visualization capabilities but can be more complex to use
Power BI is more user-friendly but may lack certain advanced features
Q30. What is Fsmo riles in Active Directoryand what are those?
FSMO stands for Flexible Single Master Operations. They are specialized roles in Active Directory that handle specific tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Each FSMO role is responsible for a specific aspect of the Active Directory environment.
For example, the PDC Emulator role handles password changes and time synchronization within a domain.
Q31. how get() works insterally in hashmap
The get() method in HashMap retrieves the value associated with a specified key.
get() method takes a key as input and returns the value associated with that key in the HashMap.
Internally, get() uses the hash code of the key to find the corresponding bucket in the HashMap.
If multiple keys have the same hash code, get() uses the equals() method to find the correct key-value pair.
Q32. How to ensure data Center management and cost simulation
To ensure data center management and cost simulation, a comprehensive approach is needed.
Regular monitoring and analysis of data center performance and costs
Implementing cost-saving measures such as virtualization and energy-efficient hardware
Using simulation tools to model different scenarios and optimize resource allocation
Collaborating with stakeholders to align data center strategy with business goals
Regularly reviewing and updating data center policies and procedures
Inve...read more
Q33. What is vmware vsphere? What is Drs in Vmware? What is High availability in ware? What is Fault Tolerance in Vmware?
VMware vSphere is a virtualization platform that provides virtualization, management, resource optimization, and more.
DRS (Distributed Resource Scheduler) in VMware is a feature that automatically balances computing workloads across a cluster of ESXi hosts.
High availability in VMware ensures that virtual machines are restarted on another host in case of a host failure.
Fault Tolerance in VMware provides continuous availability for virtual machines by creating a secondary VM th...read more
Q34. Why the paging File size is 2 GB each...
Paging file size of 2 GB is recommended for optimal performance.
Paging file is used as a virtual memory when RAM is full.
2 GB is a recommended size for optimal performance.
Size can vary based on system usage and RAM size.
Too small a size can cause system crashes and too large can slow down the system.
Windows OS automatically manages the paging file size.
Q35. What are the detailed steps for manually deploying OpenStack?
Manually deploying OpenStack involves several steps including setting up the environment, installing the necessary components, configuring networking, and launching instances.
Set up the environment by installing a base operating system such as Ubuntu or CentOS.
Install the necessary components like Keystone, Glance, Nova, Neutron, and Cinder.
Configure networking by setting up bridges, VLANs, and IP addresses.
Launch instances to test the deployment and ensure everything is func...read more
Q36. What networks are required to build an OpenStack environment?
Various networks like management network, data network, external network, and storage network are required for an OpenStack environment.
Management network for communication between OpenStack services and components
Data network for transferring data between instances
External network for connecting to the outside world
Storage network for storage operations like block storage or object storage
Q37. what is the KPIs of major incident
Key Performance Indicators (KPIs) of major incidents measure the effectiveness and efficiency of incident management.
Response time: Measure the time taken to respond to a major incident.
Resolution time: Measure the time taken to resolve a major incident.
Customer satisfaction: Measure the satisfaction level of customers affected by major incidents.
Incident recurrence rate: Measure the frequency of major incidents recurring.
Mean time between failures (MTBF): Measure the average...read more
Q38. How do you start trouble-shooting any production environment?
To troubleshoot a production environment, start by identifying the issue, gathering relevant information, analyzing logs and configurations, testing potential solutions, and implementing fixes.
Identify the issue by gathering information from users, monitoring tools, and system alerts.
Analyze logs and configurations to pinpoint the root cause of the problem.
Test potential solutions in a controlled environment before implementing them in production.
Implement fixes carefully, ke...read more
Q39. What are the banking standards do you follow currently?
We follow banking standards such as PCI DSS, ISO 27001, and NIST.
PCI DSS (Payment Card Industry Data Security Standard) for handling credit card information securely
ISO 27001 for information security management
NIST (National Institute of Standards and Technology) for cybersecurity guidelines
Q40. What is the difference between Incident and Problem?
Incident is an unplanned event that disrupts or degrades a service, while Problem is the underlying cause of one or more incidents.
Incident is a specific event that causes an interruption or reduction in the quality of a service.
Problem is the root cause of one or more incidents and is identified through the analysis of incidents.
Incidents are typically resolved quickly to restore service, while problems require investigation and resolution to prevent future incidents.
Example...read more
Q41. Have you done Cloud migrations, OS migrations or OS upgrades?
Q42. What is bitlocker? Windows Defender O365
BitLocker is a full disk encryption feature included in Windows operating systems.
It encrypts entire hard drives to protect data from unauthorized access
It requires a password or smart card to unlock the drive
It is available in Windows 10 Pro and Enterprise editions
It can be managed through Group Policy or Microsoft Endpoint Configuration Manager
It is often used in enterprise environments to protect sensitive data on company devices
Q43. how do you migrate a SUSE enterprise server eg., SLES 12 SP2 to SLES15 SP2
To migrate a SUSE enterprise server from SLES 12 SP2 to SLES 15 SP2, you can use the online migration method.
Ensure that the server meets the minimum requirements for SLES 15 SP2
Backup all important data before starting the migration process
Use the 'zypper' package manager to perform the online migration
Follow the official SUSE documentation for detailed steps and best practices
Q44. What do you know about AWS cloud computing?
AWS cloud computing is a platform that offers a wide range of cloud services, including computing power, storage, and databases, delivered over the internet.
AWS offers a variety of services such as EC2 (Elastic Compute Cloud), S3 (Simple Storage Service), RDS (Relational Database Service), and more.
Users can access these services on a pay-as-you-go basis, allowing for scalability and flexibility.
AWS provides a global infrastructure with data centers located in multiple region...read more
Q45. What steps would you take to troubleshoot a user's system that cannot connect to the internet
To troubleshoot a user's system that cannot connect to the internet, I would follow these steps
Check if the internet connection is working on other devices
Restart the router and modem
Check network settings on the user's system
Run network diagnostics or troubleshoot network connection
Update network drivers or reset network settings
Q46. Can you explain the difference between TCP and UDP , and in which scenarios you would use each
TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection before sending data.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is commonly used for applications that require reliable data transmission, such as web browsing, email, and file transfer.
UDP is used for real-time application...read more
Q47. How security or authentication is implemented in your project.
Security and authentication are implemented using JWT tokens and role-based access control.
JWT tokens are generated upon successful login and sent in the Authorization header of each request
Role-based access control is used to restrict access to certain endpoints based on user roles
Sensitive data is encrypted before storing in the database
Two-factor authentication is implemented for additional security
Q48. What is DHCP Dynamic host configuration protocol It is used for automatically assigning IP address to the multiple pcs
DHCP is a protocol used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It helps in efficient management of IP addresses in a network
DHCP servers lease IP addresses to devices for a specific period of time
Example: When a new device connects to a network, DHCP assigns it an available IP address
Q49. How many layers in OSI and troubleshootings
OSI model has 7 layers. Troubleshooting involves identifying and resolving issues at each layer.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Troubleshooting involves identifying and resolving issues at each layer.
For example, if there is a connectivity issue, it could be at the Physical layer (cable issue), Network layer (routing issue), or Transport layer (firewall blocking traffic).
Understanding the OSI model helps ...read more
Q50. How would you resolve the issue when it was severity?
To resolve the issue, I would follow the severity level and prioritize accordingly.
Assess the severity level of the issue
Determine the impact on the user or system
Prioritize the issue based on severity
Allocate appropriate resources to resolve the issue
Communicate the progress and resolution to the user
Q51. Distributed Cluster Setup.
Distributed cluster setup involves configuring multiple servers to work together as a single system for improved performance and reliability.
Distributed cluster setup improves scalability and fault tolerance.
It involves dividing the workload across multiple servers.
Servers communicate and coordinate with each other to ensure data consistency.
Examples include Apache Hadoop for distributed data processing and Apache Kafka for distributed messaging.
Q52. What is the process flow for instance creation?
The process flow for instance creation involves selecting the instance type, configuring the instance settings, launching the instance, and monitoring its status.
Select the instance type based on requirements (e.g. CPU, memory, storage)
Configure the instance settings such as network, security, and storage options
Launch the instance using the chosen settings
Monitor the instance status to ensure it is running properly
Q53. What is the function of a nova conductor?
Nova conductor is responsible for offloading certain tasks from the Nova compute service to improve performance and scalability.
Manages scheduling and resource allocation for instances
Handles live migrations of instances between compute nodes
Improves performance and scalability by offloading tasks from Nova compute service
Q54. What is the reason for PSOD? Not BSOD.
PSOD occurs in VMware ESXi when the hypervisor kernel detects a fatal error.
PSOD stands for Purple Screen of Death.
It is caused by a fatal error in the hypervisor kernel.
PSOD is specific to VMware ESXi and is similar to the BSOD in Windows.
It can be caused by hardware issues, driver problems, or software bugs.
PSOD can be analyzed using the vm-support command to gather diagnostic information.
Q55. what is normalization?
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization helps in minimizing data redundancy by dividing the database into multiple tables and defining relationships between them.
It ensures data integrity by avoiding update anomalies and inconsistencies.
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, and 4NF, each with specific rules to follow.
For example, in 1NF, each column should contain atomi...read more
Q56. what are constraints?
Constraints are limitations or restrictions placed on a system or process.
Constraints define the boundaries within which a system must operate.
They can include limitations on resources, time, or functionality.
Examples of constraints in software engineering include memory limitations, processing speed, and input/output requirements.
Q57. SSL VPN vs STS VPN? explain phase 1 and phase 2
SSL VPN and STS VPN are two types of VPNs. Phase 1 involves authentication and key exchange, while phase 2 establishes the actual VPN connection.
SSL VPN uses SSL/TLS protocol for encryption, while STS VPN uses IPSec protocol.
Phase 1 of both VPNs involves authentication and key exchange.
In SSL VPN, phase 1 uses SSL/TLS handshake to authenticate and establish a secure channel.
In STS VPN, phase 1 uses IKE (Internet Key Exchange) protocol to authenticate and establish a secure ch...read more
Q58. How to add a system to BRMS network?
Q59. Brief discussion about O365 and on-Prem exchange in hybrid environment.
Hybrid environment allows for integration of O365 and on-Prem Exchange.
Hybrid environment allows for seamless integration of on-Prem Exchange and O365.
Users can access their emails and other data from both on-Prem Exchange and O365.
Exchange hybrid deployment is required to set up the integration.
Exchange hybrid deployment includes configuring Azure AD Connect, Exchange hybrid configuration wizard, and more.
Hybrid environment provides benefits such as flexibility, scalability,...read more
Q60. Versions and model of systems currently used : IBM I , HMC, VIOS, TR level
Q61. How will you fix Server Discovery Issue?
Server discovery issue can be fixed by checking network settings and ensuring proper configuration.
Check network settings to ensure proper configuration
Verify that the server is properly configured
Ensure that the server is discoverable on the network
Check for any firewall or security settings that may be blocking discovery
Use network diagnostic tools to troubleshoot the issue
Q62. What is retention Policy?
Q63. What is DNS Dns is a domain name system And is it work name to IP conversion
DNS is a domain name system that translates domain names to IP addresses.
DNS stands for Domain Name System
It translates human-readable domain names (like www.example.com) to IP addresses (like 192.168.1.1)
DNS helps in locating websites and other resources on the internet
DNS operates through a distributed database system that stores domain names and their corresponding IP addresses
Q64. What is the future with AI in the lead?
AI is expected to play a significant role in various industries, revolutionizing processes and decision-making.
AI will continue to enhance automation and efficiency in various industries such as healthcare, finance, and manufacturing.
AI will enable personalized customer experiences through data analysis and predictive modeling.
AI will drive innovation in areas like autonomous vehicles, robotics, and natural language processing.
AI ethics and regulations will become increasingl...read more
Q65. how to link load balance on Palo Alto?
To link load balance on Palo Alto, configure a virtual router and create a load balancing profile.
Configure a virtual router with multiple interfaces
Create a load balancing profile with the desired algorithm (round-robin, least connections, etc.)
Apply the load balancing profile to the virtual router's interfaces
Configure the servers' default gateway to be the virtual router's IP address
Q66. difference between hashtable and hashmap
Hashtable is synchronized, while hashmap is not. Hashtable does not allow null keys or values, while hashmap does.
Hashtable is synchronized, while hashmap is not
Hashtable does not allow null keys or values, while hashmap does
Hashtable is a legacy class, while hashmap is a newer class
Q67. How does email deletion work?
Q68. Why cloud is important on your data privacy?
Cloud is important for data privacy as it provides secure storage, encryption, and access controls.
Cloud providers offer advanced security measures to protect data from unauthorized access.
Data stored in the cloud is encrypted, making it difficult for hackers to decipher.
Cloud platforms allow for granular access controls, ensuring only authorized users can view or modify data.
Regular security updates and patches are applied by cloud providers to protect against new threats.
Cl...read more
Q69. Is there any drawbacks you can say about cloud?
One drawback of cloud is potential security risks and data privacy concerns.
Security risks: Cloud services are vulnerable to cyber attacks and data breaches.
Data privacy concerns: Users may have limited control over their data stored in the cloud.
Dependency on internet connection: Cloud services require a stable internet connection for access and functionality.
Cost: Cloud services can become expensive, especially for large-scale usage.
Compliance issues: Some industries have s...read more
Q70. What do you know about Service Delivery?
Service Delivery involves providing services to customers in a timely and efficient manner.
Service Delivery focuses on meeting customer needs and expectations
It involves ensuring services are delivered on time and within budget
Service Delivery often includes managing relationships with customers and stakeholders
Examples of Service Delivery include IT support, logistics, and customer service
Q71. What is Java and static method and why use java
Java is a programming language used for developing applications. Static methods in Java are methods that belong to the class rather than an instance of the class.
Java is a popular programming language used for developing various types of applications.
Static methods in Java are methods that can be called without creating an instance of the class.
Static methods are commonly used for utility functions or methods that do not require access to instance variables.
Q72. How to manage P&L of accounts
Managing P&L of accounts involves tracking revenue, expenses, and profit margins to ensure financial success.
Create a budget and regularly review financial statements
Identify areas for cost-cutting and revenue growth
Monitor cash flow and adjust spending accordingly
Communicate financial performance to stakeholders
Make data-driven decisions to optimize profitability
Q73. How STP works and its timer?
STP (Spanning Tree Protocol) prevents network loops by blocking redundant paths and selecting the shortest path.
STP is a protocol used to prevent network loops in a switched network.
It works by blocking redundant paths and selecting the shortest path.
STP uses a timer called Hello Time to send messages between switches to detect changes in the network topology.
If a switch detects a change, it sends a BPDU (Bridge Protocol Data Unit) to all other switches to update the network ...read more
Q74. Explain in Brief Hyperion Architecture.
Hyperion is an enterprise performance management software suite.
Hyperion includes modules for financial management, planning, budgeting, and forecasting.
It uses a three-tier architecture with a client, application server, and database server.
The client can be a web browser or a desktop application.
Hyperion supports multiple databases including Oracle, SQL Server, and DB2.
It can integrate with other enterprise systems such as SAP and PeopleSoft.
Q75. What is VLAN and how it works?
VLAN stands for Virtual Local Area Network, a method of segmenting a physical network into multiple virtual networks.
VLANs allow for better network security by isolating traffic between different groups of devices.
They can improve network performance by reducing broadcast traffic.
VLANs can be configured based on port, protocol, or MAC address.
Example: VLAN 10 for finance department, VLAN 20 for marketing department.
Q76. Tell me about OAuth authenticaion.
OAuth authentication is a protocol that allows secure authorization of third-party applications to access user data without sharing credentials.
OAuth stands for Open Authorization
It allows users to grant access to their resources stored on one site to another site without sharing their credentials
OAuth uses tokens instead of passwords for secure access
OAuth 2.0 is the current version and is widely used for authentication and authorization
Examples of OAuth providers include Go...read more
Q77. Tell me about working of cloud?
Cloud computing involves the delivery of computing services over the internet, including storage, databases, networking, software, and more.
Cloud computing allows users to access resources on-demand without the need for physical infrastructure.
It offers scalability, flexibility, and cost-efficiency compared to traditional on-premises solutions.
Common cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)...read more
Q78. what are cfs
CFS stands for Call For Service.
CFS is a term commonly used in emergency services and law enforcement.
It refers to a request or notification for assistance or response to a specific incident.
CFS can include various types of incidents such as crimes, accidents, or medical emergencies.
Dispatchers or operators receive CFS and assign appropriate resources to handle the situation.
Examples of CFS include a 911 call reporting a burglary, a traffic accident, or a person in need of me...read more
Q79. How long have you been using Cisco ACI
I have been using Cisco ACI for 2 years.
I have experience in configuring and troubleshooting Cisco ACI fabric.
I have worked with ACI policies, tenants, application profiles, and endpoint groups.
I have also worked with ACI integration with other Cisco products like Nexus switches and UCS servers.
Q80. What is Microsoft Azure Cloud?
Microsoft Azure Cloud is a cloud computing service provided by Microsoft, offering a variety of services and resources for building, deploying, and managing applications.
Provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) offerings
Offers services such as virtual machines, databases, AI and machine learning tools, and more
Allows for scalability, flexibility, and cost-effectiveness for businesses
Examples: Azure Virtual Mac...read more
Q81. How to integrate terraform with aws
Integrating Terraform with AWS involves configuring AWS credentials, creating Terraform configuration files, and running Terraform commands.
Configure AWS credentials in Terraform using AWS Access Key ID and Secret Access Key
Create Terraform configuration files (.tf) defining AWS resources and their configurations
Run 'terraform init' to initialize the working directory
Run 'terraform plan' to create an execution plan
Run 'terraform apply' to apply the changes to AWS
Verify the re...read more
Q82. Talk About a few commands in Linux
Some common Linux commands include ls, cd, mkdir, rm, and grep.
ls - list directory contents
cd - change directory
mkdir - make a new directory
rm - remove files or directories
grep - search for patterns in files
Q83. How the agile methodology work
Agile methodology is an iterative approach to software development that emphasizes flexibility and collaboration.
Agile involves breaking down a project into smaller, manageable chunks called sprints
Each sprint involves planning, designing, coding, testing, and reviewing
The team works closely together and adapts to changes as they arise
Agile values individuals and interactions over processes and tools
Examples of agile methodologies include Scrum, Kanban, and Extreme Programmin...read more
Q84. what is the monitoring tool used
The monitoring tool used is Datadog.
Datadog is a popular monitoring tool used for infrastructure and application monitoring.
It provides real-time insights into the performance of servers, databases, applications, and more.
Datadog offers features like customizable dashboards, alerts, and integrations with various services.
Example: Datadog can be used to monitor server CPU usage, application response times, and database query performance.
Q85. What are DLP policies?
DLP policies are rules and procedures that prevent sensitive data from being accessed, used, or shared inappropriately.
DLP policies can be used to prevent data breaches and protect sensitive information.
They can include rules for identifying and classifying sensitive data, as well as procedures for monitoring and controlling access to that data.
Examples of DLP policies include restricting access to certain files or folders, monitoring network traffic for suspicious activity, ...read more
Q86. What is BGP Protocol?
BGP (Border Gateway Protocol) is a standardized exterior gateway protocol used to exchange routing information between different networks on the internet.
BGP is used to make routing decisions based on network policies, rules, and paths.
It is commonly used by Internet Service Providers (ISPs) to connect their networks.
BGP operates on TCP port 179.
BGP uses path vector routing algorithm to make routing decisions.
BGP is classified as a path vector protocol.
Q87. What is incident management?
Incident management is the process of identifying, analyzing, and resolving incidents to minimize their impact on business operations.
Incident management involves documenting incidents, categorizing them based on severity and impact, and prioritizing them for resolution.
It also includes investigating the root cause of incidents to prevent future occurrences.
Examples of incidents in a Websphere environment could include server crashes, application errors, or performance issues...read more
Q88. Default jobs in Control M subsystem
Q89. Explain the the labour optimisation
Labour optimisation refers to the process of maximizing productivity and efficiency in the workforce.
Labour optimisation involves analyzing and improving the allocation of resources, including personnel, equipment, and time.
This can be achieved through the use of technology, such as automation and data analytics.
Labour optimisation can lead to cost savings, improved quality, and increased output.
For example, a manufacturing company may use labour optimisation to streamline th...read more
Q90. What is SIP, cluster IP Phones
SIP is a protocol used for initiating, modifying, and terminating multimedia sessions over IP networks. Cluster IP Phones are a group of IP phones connected to a single IP address.
SIP stands for Session Initiation Protocol
It is used for establishing and managing communication sessions
SIP is commonly used in Voice over IP (VoIP) systems
Cluster IP Phones are a group of IP phones that share a single IP address
They are typically used in large organizations to simplify management ...read more
Q91. What is Raid,Stg Pool,Full backup
Raid is a data storage technology that combines multiple disks into a single unit for performance and redundancy. Stg Pool is a collection of storage devices grouped together for easier management. Full backup is a complete copy of all data.
Raid combines multiple disks for performance and redundancy (e.g. Raid 0, Raid 1, Raid 5)
Storage Pool is a collection of storage devices grouped together for easier management (e.g. creating a pool of hard drives for a server)
Full backup i...read more
Q92. How BGP routing protocol work?
BGP is a routing protocol used to exchange routing information between different autonomous systems on the internet.
BGP uses TCP port 179 for communication.
BGP routers exchange routing information through BGP update messages.
BGP routers establish neighbor relationships to exchange routing information.
BGP uses path attributes to determine the best route to a destination.
BGP can be configured to influence routing decisions based on policies.
Q93. 2. Explain defect life cycle
Defect life cycle is the process of identifying, reporting, fixing, and verifying defects in software.
Defect is identified by testers during testing
Defect is reported to development team
Development team fixes the defect
Fixed defect is verified by testers
If defect is not fixed, it goes back to development team
If defect is fixed, it is closed
Q94. Golden gate issues and solutions
Golden Gate is a replication software for Oracle databases. Common issues include lag, conflicts, and connectivity problems.
Lag can be caused by network latency or insufficient resources on the target database.
Conflicts can occur when the same data is updated on both the source and target databases.
Connectivity issues can be caused by firewall settings or incorrect configuration.
Solutions include optimizing network performance, resolving conflicts manually or using conflict d...read more
Q95. Write a program to print prime number
Program to print prime numbers
Iterate through numbers and check if each number is prime
Use a nested loop to check divisibility by numbers less than the current number
Print the number if it is prime
Q96. What is ISO 27001 ?
ISO 27001 is a globally recognized standard for information security management.
ISO 27001 provides a framework for managing and protecting sensitive information.
It outlines a risk management process to identify, assess, and treat information security risks.
ISO 27001 requires organizations to implement and maintain a set of policies, procedures, and controls to ensure the confidentiality, integrity, and availability of information.
Certification to ISO 27001 demonstrates an org...read more
Q97. What is VMware?
VMware is a virtualization and cloud computing software provider.
VMware provides virtualization software that allows multiple operating systems to run on a single physical server.
It also offers cloud computing solutions for businesses to manage their IT infrastructure more efficiently.
Popular VMware products include vSphere, ESXi, and vCenter Server.
Q98. what is gole ?
Gole is a misspelling of the word 'goal'.
Gole is not a recognized word in the English language.
The correct spelling is 'goal', which refers to an objective or target to be achieved.
For example, in a professional setting, a gole could be to increase sales by 10% within a quarter.
Q99. End to end Project life cycle
The end to end project life cycle refers to the complete process of a project from initiation to closure.
Initiation: Defining the project objectives, scope, and stakeholders.
Planning: Creating a detailed project plan, including tasks, resources, and timelines.
Execution: Implementing the project plan, managing resources, and monitoring progress.
Monitoring and Control: Tracking project performance, identifying and resolving issues.
Closure: Formalizing project completion, conduc...read more
Q100. share the UI Policies knowledge
UI Policies are used in ServiceNow to dynamically change the behavior of forms and fields based on conditions.
UI Policies are used to set mandatory fields, read-only fields, and visibility conditions on forms.
They are created using conditions and actions in the ServiceNow platform.
For example, a UI Policy can be used to make a field mandatory when a certain condition is met.
More about working at Kyndryl
Top HR Questions asked in Barefoot Organics
Interview Process at Barefoot Organics
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month