Premium Employer

Kyndryl

4.0
based on 2.6k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

100+ Barefoot Organics Interview Questions and Answers

Updated 6 Jan 2025
Popular Designations

Q1. Print rows where a certain criterion is met (ex - in a dataset of employees select the ones whose salary is greater than 100000 - in SQL)

Ans.

Use SQL SELECT statement with WHERE clause to filter rows based on a specific criterion.

  • Use SELECT statement with WHERE clause to specify the criterion (ex: salary > 100000)

  • Example: SELECT * FROM employees WHERE salary > 100000;

  • Ensure proper syntax and column names are used in the query

Add your answer

Q2. Extract only India Players from dictionary (using list comprehension) CSK = {"Dhoni" : "India", "Du Plessis" : "South Africa", "RituRaj": "India", "Peterson" : "England", "Lara" : "West Indies"}

Ans.

Extract India players from a dictionary using list comprehension

  • Use list comprehension to filter out players with nationality as 'India'

  • Create a new list with only the India players

  • Example: [player for player, nationality in CSK.items() if nationality == 'India']

View 2 more answers

Q3. What are the types of regression models, name them and explain them

Ans.

Types of regression models include linear regression, logistic regression, polynomial regression, ridge regression, and lasso regression.

  • Linear regression: used to model the relationship between a dependent variable and one or more independent variables.

  • Logistic regression: used for binary classification problems, where the output is a probability value between 0 and 1.

  • Polynomial regression: fits a curve to the data by adding polynomial terms to the linear regression model.

  • Ri...read more

Add your answer

Q4. What is ETL and what are the types or examples of ETL tools

Ans.

ETL stands for Extract, Transform, Load. It is a process of extracting data from various sources, transforming it into a usable format, and loading it into a target database.

  • ETL tools include Informatica PowerCenter, Talend, Apache Nifi, Microsoft SQL Server Integration Services (SSIS), and IBM InfoSphere DataStage.

  • Extract: Data is extracted from various sources such as databases, files, APIs, etc.

  • Transform: Data is cleaned, validated, and transformed into a format suitable f...read more

Add your answer
Discover Barefoot Organics interview dos and don'ts from real experiences

Q5. How do you print the 3, 5 and 7th row in a database (Python - use Pandas)

Ans.

Printing specific rows from a database using Pandas in Python

  • Use Pandas library to read the database into a DataFrame

  • Use iloc method to select specific rows by index

  • Print the selected rows

Add your answer

Q6. Find Common Elements in three lists using sets arr1 = [1,5,10,20,40,80,100] arr2 = [6,7,20,80,100] arr3 = [3,4,15,20,30,70,80,120]

Ans.

Use sets to find common elements in three lists.

  • Convert the lists to sets for efficient comparison.

  • Use the intersection method to find common elements.

  • Return the common elements as a set or list.

View 1 answer
Are these interview questions helpful?

Q7. Print rows with the same set of values in column (these are not duplicates row - just the duplicates values in a column)

Ans.

Print rows with the same set of values in a column

  • Identify unique sets of values in the column

  • Group rows based on these unique sets of values

  • Print out the rows for each unique set of values

Add your answer

Q8. How to create and configure Queue Manager and Objects?

Ans.

To create and configure a Queue Manager and Objects, follow these steps:

  • Install and configure IBM MQ software

  • Create a Queue Manager using the MQSC command

  • Define Queues, Channels, and Listeners using MQSC commands or the IBM MQ Explorer

  • Configure Queue Manager properties such as security, logging, and performance settings

  • Test the Queue Manager and Objects to ensure they are functioning properly

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Print Unique values in the dataset and delete the duplicate rows (SQL)

Ans.

Use DISTINCT keyword to print unique values and DELETE with a subquery to remove duplicate rows.

  • Use SELECT DISTINCT column_name FROM table_name to print unique values.

  • Use DELETE FROM table_name WHERE row_id NOT IN (SELECT MAX(row_id) FROM table_name GROUP BY column_name) to delete duplicate rows.

Add your answer

Q10. Print rows with the second highest criterion value without using offset function in SQL

Ans.

Use subquery to find rows with second highest criterion value in SQL without using offset function.

  • Use a subquery to find the maximum criterion value

  • Then use another subquery to find the maximum value that is less than the maximum value found in the first subquery

  • Finally, select rows with the second highest criterion value

Add your answer

Q11. Split Dataset in train, test and validation (import library and split dataset)

Ans.

Use scikit-learn library to split dataset into train, test, and validation sets

  • Import train_test_split from sklearn.model_selection

  • Specify test_size and validation_size when splitting the dataset

  • Example: X_train, X_test, y_train, y_test = train_test_split(X, y, test_size=0.2, random_state=42)

Add your answer

Q12. What is the poweshell command to know Where / in which DC User Account got locked out?

Ans.

The PowerShell command to find the DC where a user account got locked out.

  • Use the Get-EventLog cmdlet to retrieve the security event logs from all domain controllers.

  • Filter the logs to show only event ID 4740, which indicates an account lockout event.

  • Use the Where-Object cmdlet to filter the results to show only events related to the specified user account.

  • Use the Select-Object cmdlet to display only the DC name where the lockout occurred.

Add your answer

Q13. What is the FSMO role and with brief description about role. What is the memroy dump file type. What is the BSOD. What is the Active directory. What is the Ntds file. What is the global catalog. What is the gro...

read more
Ans.

A series of technical questions related to systems administration.

  • FSMO role is a set of operations that can only be performed by one domain controller at a time.

  • Memory dump file type is a file that contains the contents of the system's memory at the time of a crash.

  • BSOD stands for Blue Screen of Death, which is an error screen displayed on Windows systems when a fatal system error occurs.

  • Active Directory is a directory service that stores information about objects on a networ...read more

Add your answer

Q14. What do you think is the most impactful technology today?

Ans.

Artificial Intelligence is the most impactful technology today.

  • AI is transforming industries like healthcare, finance, and transportation.

  • It is being used to develop autonomous vehicles, personalized medicine, and fraud detection systems.

  • AI is also helping to solve complex problems like climate change and poverty.

  • It has the potential to revolutionize the way we live and work.

  • However, there are also concerns about its impact on jobs and privacy.

Add your answer

Q15. How to implement circular and linear logging in WMQ?

Ans.

Circular and linear logging can be implemented in WMQ by configuring the queue manager.

  • For circular logging, set the LogPrimaryFiles and LogSecondaryFiles parameters to a non-zero value.

  • For linear logging, set the LogType parameter to 'linear' and specify the LogPath parameter.

  • Circular logging is recommended for most scenarios, as it allows for automatic log file recycling.

  • Linear logging is useful for scenarios where the log files need to be kept for a longer period of time.

  • B...read more

Add your answer

Q16. what is abstraction and how can we achieve it?

Ans.

Abstraction is the concept of hiding complex implementation details and showing only the necessary features to the outside world.

  • Abstraction allows us to focus on what an object does rather than how it does it

  • Achieved through abstract classes and interfaces in object-oriented programming

  • Example: A car dashboard abstracts the internal workings of the car and provides only essential information to the driver

Add your answer

Q17. What are the current vesrion of Microsoft windows Server? What is Hyper-V? What is Active Directory? What is Dns? What is Dhcp? What is wsus? What is current versuon Client windows Operating system released by ...

read more
Ans.

The current version of Microsoft Windows Server is Windows Server 2019. Hyper-V is a virtualization platform. Active Directory is a directory service. DNS is a system that translates domain names to IP addresses. DHCP is a network protocol that assigns IP addresses to devices. WSUS is Windows Server Update Services. The current version of client Windows operating system is Windows 10.

  • Windows Server 2019 is the latest version of Microsoft Windows Server

  • Hyper-V is a virtualizat...read more

Add your answer

Q18. write a query to get 3rd highest salary from the employee table

Ans.

Query to retrieve the 3rd highest salary from the employee table

  • Use the ORDER BY clause to sort salaries in descending order

  • Use the LIMIT clause to retrieve the 3rd highest salary

Add your answer

Q19. write a code to get 2nd last node and its value from the singly linked list.

Ans.

Traverse the linked list to find the 2nd last node and return its value.

  • Traverse the linked list while keeping track of the current and previous nodes.

  • Once at the end of the list, return the value of the previous node.

Add your answer

Q20. you have an array of integer and retrieve the 2 smallest number from it without sorting the array.

Ans.

Use two variables to keep track of the smallest and second smallest numbers in the array.

  • Iterate through the array and update the variables accordingly.

  • Initialize the variables with the maximum possible integer value to start with.

  • Example: array = [5, 2, 8, 1, 3], smallest = 1, secondSmallest = 2.

Add your answer

Q21. If VM locked ? Explain the Trouble Shooting steps to bring it up.

Ans.

To troubleshoot a locked VM, follow these steps:

  • Check if the VM is responding to pings

  • Check if the VM is running out of resources

  • Check if there are any network connectivity issues

  • Restart the VM or the host machine if necessary

Add your answer

Q22. How we can migrate infrastructure from on-prem to cloud.

Ans.

Migrating infrastructure from on-prem to cloud involves planning, assessment, and execution.

  • Assess the current infrastructure and identify what needs to be migrated

  • Choose the right cloud provider and services based on the requirements

  • Plan the migration process and create a roadmap

  • Test the migration process in a non-production environment

  • Execute the migration process and monitor the progress

  • Optimize the cloud infrastructure for better performance and cost-effectiveness

Add your answer

Q23. Difference in Linear and Logistic Regression

Ans.

Linear regression is used for continuous variables, while logistic regression is used for binary outcomes.

  • Linear regression predicts continuous outcomes, while logistic regression predicts binary outcomes.

  • Linear regression uses a linear equation to model the relationship between the independent and dependent variables.

  • Logistic regression uses the logistic function to model the probability of a binary outcome.

  • Linear regression is used for tasks like predicting house prices, wh...read more

Add your answer

Q24. Difference in Random Forest and Decision Tree

Ans.

Random Forest is an ensemble method using multiple decision trees, while Decision Tree is a single tree-based model.

  • Random Forest is a collection of decision trees that are trained on random subsets of the data.

  • Decision Tree is a single tree structure that makes decisions by splitting the data based on features.

  • Random Forest reduces overfitting by averaging the predictions of multiple trees.

  • Decision Tree can be prone to overfitting due to its high complexity.

  • Random Forest is ...read more

Add your answer

Q25. Different architecture methods and if comfortable with night shifts and weekend support.

Ans.

Familiar with various architecture methods and comfortable with night shifts and weekend support.

  • I am familiar with various architecture methods such as client-server, peer-to-peer, and service-oriented architecture.

  • I have experience working night shifts and providing weekend support when necessary.

  • I understand the importance of maintaining system availability and am willing to work outside of regular business hours to ensure that systems are running smoothly.

  • I am comfortable...read more

Add your answer

Q26. What are SR-IOV and DPDK, and how do they compare in terms of performance?

Ans.

SR-IOV and DPDK are technologies used to improve network performance in virtualized environments.

  • SR-IOV (Single Root I/O Virtualization) allows a single physical network interface card (NIC) to appear as multiple virtual NICs, improving network performance by reducing overhead.

  • DPDK (Data Plane Development Kit) is a set of libraries and drivers for fast packet processing, bypassing the kernel network stack for improved performance.

  • SR-IOV is hardware-based virtualization, while...read more

Add your answer

Q27. What security measures did you take before rolling out an application in the production environment?

Ans.

Before rolling out an application in the production environment, security measures taken include thorough testing, access control, encryption, and monitoring.

  • Conducting thorough security testing to identify and address vulnerabilities

  • Implementing access control measures to restrict unauthorized access to the application

  • Utilizing encryption to protect sensitive data in transit and at rest

  • Setting up monitoring tools to detect and respond to security incidents in real-time

Add your answer

Q28. Difference between Power BI and Tableau

Ans.

Power BI is a Microsoft product focused on business intelligence and data visualization, while Tableau is a standalone data visualization tool.

  • Power BI is more user-friendly and integrates well with other Microsoft products.

  • Tableau is known for its powerful data visualization capabilities and flexibility in creating complex visualizations.

  • Power BI is often preferred by organizations already using Microsoft products, while Tableau is popular among data analysts and visualizati...read more

Add your answer

Q29. Limitations of Power BI and Tableau

Ans.

Power BI and Tableau have limitations in terms of data connectivity, customization, and pricing.

  • Limited data connectivity options compared to other tools

  • Limited customization capabilities for advanced analytics

  • High pricing for enterprise-level features

  • Tableau has better visualization capabilities but can be more complex to use

  • Power BI is more user-friendly but may lack certain advanced features

Add your answer

Q30. What is Fsmo riles in Active Directoryand what are those?

Ans.

FSMO stands for Flexible Single Master Operations. They are specialized roles in Active Directory that handle specific tasks.

  • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • Each FSMO role is responsible for a specific aspect of the Active Directory environment.

  • For example, the PDC Emulator role handles password changes and time synchronization within a domain.

Add your answer

Q31. how get() works insterally in hashmap

Ans.

The get() method in HashMap retrieves the value associated with a specified key.

  • get() method takes a key as input and returns the value associated with that key in the HashMap.

  • Internally, get() uses the hash code of the key to find the corresponding bucket in the HashMap.

  • If multiple keys have the same hash code, get() uses the equals() method to find the correct key-value pair.

Add your answer

Q32. How to ensure data Center management and cost simulation

Ans.

To ensure data center management and cost simulation, a comprehensive approach is needed.

  • Regular monitoring and analysis of data center performance and costs

  • Implementing cost-saving measures such as virtualization and energy-efficient hardware

  • Using simulation tools to model different scenarios and optimize resource allocation

  • Collaborating with stakeholders to align data center strategy with business goals

  • Regularly reviewing and updating data center policies and procedures

  • Inve...read more

Add your answer

Q33. What is vmware vsphere? What is Drs in Vmware? What is High availability in ware? What is Fault Tolerance in Vmware?

Ans.

VMware vSphere is a virtualization platform that provides virtualization, management, resource optimization, and more.

  • DRS (Distributed Resource Scheduler) in VMware is a feature that automatically balances computing workloads across a cluster of ESXi hosts.

  • High availability in VMware ensures that virtual machines are restarted on another host in case of a host failure.

  • Fault Tolerance in VMware provides continuous availability for virtual machines by creating a secondary VM th...read more

Add your answer

Q34. Why the paging File size is 2 GB each...

Ans.

Paging file size of 2 GB is recommended for optimal performance.

  • Paging file is used as a virtual memory when RAM is full.

  • 2 GB is a recommended size for optimal performance.

  • Size can vary based on system usage and RAM size.

  • Too small a size can cause system crashes and too large can slow down the system.

  • Windows OS automatically manages the paging file size.

Add your answer

Q35. What are the detailed steps for manually deploying OpenStack?

Ans.

Manually deploying OpenStack involves several steps including setting up the environment, installing the necessary components, configuring networking, and launching instances.

  • Set up the environment by installing a base operating system such as Ubuntu or CentOS.

  • Install the necessary components like Keystone, Glance, Nova, Neutron, and Cinder.

  • Configure networking by setting up bridges, VLANs, and IP addresses.

  • Launch instances to test the deployment and ensure everything is func...read more

Add your answer

Q36. What networks are required to build an OpenStack environment?

Ans.

Various networks like management network, data network, external network, and storage network are required for an OpenStack environment.

  • Management network for communication between OpenStack services and components

  • Data network for transferring data between instances

  • External network for connecting to the outside world

  • Storage network for storage operations like block storage or object storage

Add your answer

Q37. what is the KPIs of major incident

Ans.

Key Performance Indicators (KPIs) of major incidents measure the effectiveness and efficiency of incident management.

  • Response time: Measure the time taken to respond to a major incident.

  • Resolution time: Measure the time taken to resolve a major incident.

  • Customer satisfaction: Measure the satisfaction level of customers affected by major incidents.

  • Incident recurrence rate: Measure the frequency of major incidents recurring.

  • Mean time between failures (MTBF): Measure the average...read more

View 1 answer

Q38. How do you start trouble-shooting any production environment?

Ans.

To troubleshoot a production environment, start by identifying the issue, gathering relevant information, analyzing logs and configurations, testing potential solutions, and implementing fixes.

  • Identify the issue by gathering information from users, monitoring tools, and system alerts.

  • Analyze logs and configurations to pinpoint the root cause of the problem.

  • Test potential solutions in a controlled environment before implementing them in production.

  • Implement fixes carefully, ke...read more

Add your answer

Q39. What are the banking standards do you follow currently?

Ans.

We follow banking standards such as PCI DSS, ISO 27001, and NIST.

  • PCI DSS (Payment Card Industry Data Security Standard) for handling credit card information securely

  • ISO 27001 for information security management

  • NIST (National Institute of Standards and Technology) for cybersecurity guidelines

Add your answer

Q40. What is the difference between Incident and Problem?

Ans.

Incident is an unplanned event that disrupts or degrades a service, while Problem is the underlying cause of one or more incidents.

  • Incident is a specific event that causes an interruption or reduction in the quality of a service.

  • Problem is the root cause of one or more incidents and is identified through the analysis of incidents.

  • Incidents are typically resolved quickly to restore service, while problems require investigation and resolution to prevent future incidents.

  • Example...read more

Add your answer

Q41. Have you done Cloud migrations, OS migrations or OS upgrades?

Add your answer

Q42. What is bitlocker? Windows Defender O365

Ans.

BitLocker is a full disk encryption feature included in Windows operating systems.

  • It encrypts entire hard drives to protect data from unauthorized access

  • It requires a password or smart card to unlock the drive

  • It is available in Windows 10 Pro and Enterprise editions

  • It can be managed through Group Policy or Microsoft Endpoint Configuration Manager

  • It is often used in enterprise environments to protect sensitive data on company devices

Add your answer

Q43. how do you migrate a SUSE enterprise server eg., SLES 12 SP2 to SLES15 SP2

Ans.

To migrate a SUSE enterprise server from SLES 12 SP2 to SLES 15 SP2, you can use the online migration method.

  • Ensure that the server meets the minimum requirements for SLES 15 SP2

  • Backup all important data before starting the migration process

  • Use the 'zypper' package manager to perform the online migration

  • Follow the official SUSE documentation for detailed steps and best practices

Add your answer

Q44. What do you know about AWS cloud computing?

Ans.

AWS cloud computing is a platform that offers a wide range of cloud services, including computing power, storage, and databases, delivered over the internet.

  • AWS offers a variety of services such as EC2 (Elastic Compute Cloud), S3 (Simple Storage Service), RDS (Relational Database Service), and more.

  • Users can access these services on a pay-as-you-go basis, allowing for scalability and flexibility.

  • AWS provides a global infrastructure with data centers located in multiple region...read more

Add your answer

Q45. What steps would you take to troubleshoot a user's system that cannot connect to the internet

Ans.

To troubleshoot a user's system that cannot connect to the internet, I would follow these steps

  • Check if the internet connection is working on other devices

  • Restart the router and modem

  • Check network settings on the user's system

  • Run network diagnostics or troubleshoot network connection

  • Update network drivers or reset network settings

Add your answer

Q46. Can you explain the difference between TCP and UDP , and in which scenarios you would use each

Ans.

TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.

  • TCP is reliable and ensures data delivery by establishing a connection before sending data.

  • UDP is faster but less reliable as it does not establish a connection before sending data.

  • TCP is commonly used for applications that require reliable data transmission, such as web browsing, email, and file transfer.

  • UDP is used for real-time application...read more

Add your answer

Q47. How security or authentication is implemented in your project.

Ans.

Security and authentication are implemented using JWT tokens and role-based access control.

  • JWT tokens are generated upon successful login and sent in the Authorization header of each request

  • Role-based access control is used to restrict access to certain endpoints based on user roles

  • Sensitive data is encrypted before storing in the database

  • Two-factor authentication is implemented for additional security

Add your answer

Q48. What is DHCP Dynamic host configuration protocol It is used for automatically assigning IP address to the multiple pcs

Ans.

DHCP is a protocol used to automatically assign IP addresses to devices on a network.

  • DHCP eliminates the need for manual IP address configuration on each device

  • It helps in efficient management of IP addresses in a network

  • DHCP servers lease IP addresses to devices for a specific period of time

  • Example: When a new device connects to a network, DHCP assigns it an available IP address

Add your answer

Q49. How many layers in OSI and troubleshootings

Ans.

OSI model has 7 layers. Troubleshooting involves identifying and resolving issues at each layer.

  • OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Troubleshooting involves identifying and resolving issues at each layer.

  • For example, if there is a connectivity issue, it could be at the Physical layer (cable issue), Network layer (routing issue), or Transport layer (firewall blocking traffic).

  • Understanding the OSI model helps ...read more

Add your answer

Q50. How would you resolve the issue when it was severity?

Ans.

To resolve the issue, I would follow the severity level and prioritize accordingly.

  • Assess the severity level of the issue

  • Determine the impact on the user or system

  • Prioritize the issue based on severity

  • Allocate appropriate resources to resolve the issue

  • Communicate the progress and resolution to the user

Add your answer

Q51. Distributed Cluster Setup.

Ans.

Distributed cluster setup involves configuring multiple servers to work together as a single system for improved performance and reliability.

  • Distributed cluster setup improves scalability and fault tolerance.

  • It involves dividing the workload across multiple servers.

  • Servers communicate and coordinate with each other to ensure data consistency.

  • Examples include Apache Hadoop for distributed data processing and Apache Kafka for distributed messaging.

View 1 answer

Q52. What is the process flow for instance creation?

Ans.

The process flow for instance creation involves selecting the instance type, configuring the instance settings, launching the instance, and monitoring its status.

  • Select the instance type based on requirements (e.g. CPU, memory, storage)

  • Configure the instance settings such as network, security, and storage options

  • Launch the instance using the chosen settings

  • Monitor the instance status to ensure it is running properly

Add your answer

Q53. What is the function of a nova conductor?

Ans.

Nova conductor is responsible for offloading certain tasks from the Nova compute service to improve performance and scalability.

  • Manages scheduling and resource allocation for instances

  • Handles live migrations of instances between compute nodes

  • Improves performance and scalability by offloading tasks from Nova compute service

Add your answer

Q54. What is the reason for PSOD? Not BSOD.

Ans.

PSOD occurs in VMware ESXi when the hypervisor kernel detects a fatal error.

  • PSOD stands for Purple Screen of Death.

  • It is caused by a fatal error in the hypervisor kernel.

  • PSOD is specific to VMware ESXi and is similar to the BSOD in Windows.

  • It can be caused by hardware issues, driver problems, or software bugs.

  • PSOD can be analyzed using the vm-support command to gather diagnostic information.

Add your answer

Q55. what is normalization?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization helps in minimizing data redundancy by dividing the database into multiple tables and defining relationships between them.

  • It ensures data integrity by avoiding update anomalies and inconsistencies.

  • There are different normal forms such as 1NF, 2NF, 3NF, BCNF, and 4NF, each with specific rules to follow.

  • For example, in 1NF, each column should contain atomi...read more

Add your answer

Q56. what are constraints?

Ans.

Constraints are limitations or restrictions placed on a system or process.

  • Constraints define the boundaries within which a system must operate.

  • They can include limitations on resources, time, or functionality.

  • Examples of constraints in software engineering include memory limitations, processing speed, and input/output requirements.

Add your answer

Q57. SSL VPN vs STS VPN? explain phase 1 and phase 2

Ans.

SSL VPN and STS VPN are two types of VPNs. Phase 1 involves authentication and key exchange, while phase 2 establishes the actual VPN connection.

  • SSL VPN uses SSL/TLS protocol for encryption, while STS VPN uses IPSec protocol.

  • Phase 1 of both VPNs involves authentication and key exchange.

  • In SSL VPN, phase 1 uses SSL/TLS handshake to authenticate and establish a secure channel.

  • In STS VPN, phase 1 uses IKE (Internet Key Exchange) protocol to authenticate and establish a secure ch...read more

Add your answer

Q58. How to add a system to BRMS network?

Add your answer

Q59. Brief discussion about O365 and on-Prem exchange in hybrid environment.

Ans.

Hybrid environment allows for integration of O365 and on-Prem Exchange.

  • Hybrid environment allows for seamless integration of on-Prem Exchange and O365.

  • Users can access their emails and other data from both on-Prem Exchange and O365.

  • Exchange hybrid deployment is required to set up the integration.

  • Exchange hybrid deployment includes configuring Azure AD Connect, Exchange hybrid configuration wizard, and more.

  • Hybrid environment provides benefits such as flexibility, scalability,...read more

Add your answer

Q60. Versions and model of systems currently used : IBM I , HMC, VIOS, TR level

Add your answer

Q61. How will you fix Server Discovery Issue?

Ans.

Server discovery issue can be fixed by checking network settings and ensuring proper configuration.

  • Check network settings to ensure proper configuration

  • Verify that the server is properly configured

  • Ensure that the server is discoverable on the network

  • Check for any firewall or security settings that may be blocking discovery

  • Use network diagnostic tools to troubleshoot the issue

Add your answer

Q62. What is retention Policy?

Add your answer

Q63. What is DNS Dns is a domain name system And is it work name to IP conversion

Ans.

DNS is a domain name system that translates domain names to IP addresses.

  • DNS stands for Domain Name System

  • It translates human-readable domain names (like www.example.com) to IP addresses (like 192.168.1.1)

  • DNS helps in locating websites and other resources on the internet

  • DNS operates through a distributed database system that stores domain names and their corresponding IP addresses

Add your answer

Q64. What is the future with AI in the lead?

Ans.

AI is expected to play a significant role in various industries, revolutionizing processes and decision-making.

  • AI will continue to enhance automation and efficiency in various industries such as healthcare, finance, and manufacturing.

  • AI will enable personalized customer experiences through data analysis and predictive modeling.

  • AI will drive innovation in areas like autonomous vehicles, robotics, and natural language processing.

  • AI ethics and regulations will become increasingl...read more

Add your answer

Q65. how to link load balance on Palo Alto?

Ans.

To link load balance on Palo Alto, configure a virtual router and create a load balancing profile.

  • Configure a virtual router with multiple interfaces

  • Create a load balancing profile with the desired algorithm (round-robin, least connections, etc.)

  • Apply the load balancing profile to the virtual router's interfaces

  • Configure the servers' default gateway to be the virtual router's IP address

Add your answer

Q66. difference between hashtable and hashmap

Ans.

Hashtable is synchronized, while hashmap is not. Hashtable does not allow null keys or values, while hashmap does.

  • Hashtable is synchronized, while hashmap is not

  • Hashtable does not allow null keys or values, while hashmap does

  • Hashtable is a legacy class, while hashmap is a newer class

Add your answer

Q67. How does email deletion work?

Add your answer

Q68. Why cloud is important on your data privacy?

Ans.

Cloud is important for data privacy as it provides secure storage, encryption, and access controls.

  • Cloud providers offer advanced security measures to protect data from unauthorized access.

  • Data stored in the cloud is encrypted, making it difficult for hackers to decipher.

  • Cloud platforms allow for granular access controls, ensuring only authorized users can view or modify data.

  • Regular security updates and patches are applied by cloud providers to protect against new threats.

  • Cl...read more

Add your answer

Q69. Is there any drawbacks you can say about cloud?

Ans.

One drawback of cloud is potential security risks and data privacy concerns.

  • Security risks: Cloud services are vulnerable to cyber attacks and data breaches.

  • Data privacy concerns: Users may have limited control over their data stored in the cloud.

  • Dependency on internet connection: Cloud services require a stable internet connection for access and functionality.

  • Cost: Cloud services can become expensive, especially for large-scale usage.

  • Compliance issues: Some industries have s...read more

Add your answer

Q70. What do you know about Service Delivery?

Ans.

Service Delivery involves providing services to customers in a timely and efficient manner.

  • Service Delivery focuses on meeting customer needs and expectations

  • It involves ensuring services are delivered on time and within budget

  • Service Delivery often includes managing relationships with customers and stakeholders

  • Examples of Service Delivery include IT support, logistics, and customer service

Add your answer

Q71. What is Java and static method and why use java

Ans.

Java is a programming language used for developing applications. Static methods in Java are methods that belong to the class rather than an instance of the class.

  • Java is a popular programming language used for developing various types of applications.

  • Static methods in Java are methods that can be called without creating an instance of the class.

  • Static methods are commonly used for utility functions or methods that do not require access to instance variables.

Add your answer

Q72. How to manage P&L of accounts

Ans.

Managing P&L of accounts involves tracking revenue, expenses, and profit margins to ensure financial success.

  • Create a budget and regularly review financial statements

  • Identify areas for cost-cutting and revenue growth

  • Monitor cash flow and adjust spending accordingly

  • Communicate financial performance to stakeholders

  • Make data-driven decisions to optimize profitability

Add your answer

Q73. How STP works and its timer?

Ans.

STP (Spanning Tree Protocol) prevents network loops by blocking redundant paths and selecting the shortest path.

  • STP is a protocol used to prevent network loops in a switched network.

  • It works by blocking redundant paths and selecting the shortest path.

  • STP uses a timer called Hello Time to send messages between switches to detect changes in the network topology.

  • If a switch detects a change, it sends a BPDU (Bridge Protocol Data Unit) to all other switches to update the network ...read more

Add your answer

Q74. Explain in Brief Hyperion Architecture.

Ans.

Hyperion is an enterprise performance management software suite.

  • Hyperion includes modules for financial management, planning, budgeting, and forecasting.

  • It uses a three-tier architecture with a client, application server, and database server.

  • The client can be a web browser or a desktop application.

  • Hyperion supports multiple databases including Oracle, SQL Server, and DB2.

  • It can integrate with other enterprise systems such as SAP and PeopleSoft.

Add your answer

Q75. What is VLAN and how it works?

Ans.

VLAN stands for Virtual Local Area Network, a method of segmenting a physical network into multiple virtual networks.

  • VLANs allow for better network security by isolating traffic between different groups of devices.

  • They can improve network performance by reducing broadcast traffic.

  • VLANs can be configured based on port, protocol, or MAC address.

  • Example: VLAN 10 for finance department, VLAN 20 for marketing department.

Add your answer

Q76. Tell me about OAuth authenticaion.

Ans.

OAuth authentication is a protocol that allows secure authorization of third-party applications to access user data without sharing credentials.

  • OAuth stands for Open Authorization

  • It allows users to grant access to their resources stored on one site to another site without sharing their credentials

  • OAuth uses tokens instead of passwords for secure access

  • OAuth 2.0 is the current version and is widely used for authentication and authorization

  • Examples of OAuth providers include Go...read more

Add your answer

Q77. Tell me about working of cloud?

Ans.

Cloud computing involves the delivery of computing services over the internet, including storage, databases, networking, software, and more.

  • Cloud computing allows users to access resources on-demand without the need for physical infrastructure.

  • It offers scalability, flexibility, and cost-efficiency compared to traditional on-premises solutions.

  • Common cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)...read more

Add your answer

Q78. what are cfs

Ans.

CFS stands for Call For Service.

  • CFS is a term commonly used in emergency services and law enforcement.

  • It refers to a request or notification for assistance or response to a specific incident.

  • CFS can include various types of incidents such as crimes, accidents, or medical emergencies.

  • Dispatchers or operators receive CFS and assign appropriate resources to handle the situation.

  • Examples of CFS include a 911 call reporting a burglary, a traffic accident, or a person in need of me...read more

View 1 answer

Q79. How long have you been using Cisco ACI

Ans.

I have been using Cisco ACI for 2 years.

  • I have experience in configuring and troubleshooting Cisco ACI fabric.

  • I have worked with ACI policies, tenants, application profiles, and endpoint groups.

  • I have also worked with ACI integration with other Cisco products like Nexus switches and UCS servers.

Add your answer

Q80. What is Microsoft Azure Cloud?

Ans.

Microsoft Azure Cloud is a cloud computing service provided by Microsoft, offering a variety of services and resources for building, deploying, and managing applications.

  • Provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) offerings

  • Offers services such as virtual machines, databases, AI and machine learning tools, and more

  • Allows for scalability, flexibility, and cost-effectiveness for businesses

  • Examples: Azure Virtual Mac...read more

Add your answer

Q81. How to integrate terraform with aws

Ans.

Integrating Terraform with AWS involves configuring AWS credentials, creating Terraform configuration files, and running Terraform commands.

  • Configure AWS credentials in Terraform using AWS Access Key ID and Secret Access Key

  • Create Terraform configuration files (.tf) defining AWS resources and their configurations

  • Run 'terraform init' to initialize the working directory

  • Run 'terraform plan' to create an execution plan

  • Run 'terraform apply' to apply the changes to AWS

  • Verify the re...read more

Add your answer

Q82. Talk About a few commands in Linux

Ans.

Some common Linux commands include ls, cd, mkdir, rm, and grep.

  • ls - list directory contents

  • cd - change directory

  • mkdir - make a new directory

  • rm - remove files or directories

  • grep - search for patterns in files

Add your answer

Q83. How the agile methodology work

Ans.

Agile methodology is an iterative approach to software development that emphasizes flexibility and collaboration.

  • Agile involves breaking down a project into smaller, manageable chunks called sprints

  • Each sprint involves planning, designing, coding, testing, and reviewing

  • The team works closely together and adapts to changes as they arise

  • Agile values individuals and interactions over processes and tools

  • Examples of agile methodologies include Scrum, Kanban, and Extreme Programmin...read more

Add your answer

Q84. what is the monitoring tool used

Ans.

The monitoring tool used is Datadog.

  • Datadog is a popular monitoring tool used for infrastructure and application monitoring.

  • It provides real-time insights into the performance of servers, databases, applications, and more.

  • Datadog offers features like customizable dashboards, alerts, and integrations with various services.

  • Example: Datadog can be used to monitor server CPU usage, application response times, and database query performance.

Add your answer

Q85. What are DLP policies?

Ans.

DLP policies are rules and procedures that prevent sensitive data from being accessed, used, or shared inappropriately.

  • DLP policies can be used to prevent data breaches and protect sensitive information.

  • They can include rules for identifying and classifying sensitive data, as well as procedures for monitoring and controlling access to that data.

  • Examples of DLP policies include restricting access to certain files or folders, monitoring network traffic for suspicious activity, ...read more

Add your answer

Q86. What is BGP Protocol?

Ans.

BGP (Border Gateway Protocol) is a standardized exterior gateway protocol used to exchange routing information between different networks on the internet.

  • BGP is used to make routing decisions based on network policies, rules, and paths.

  • It is commonly used by Internet Service Providers (ISPs) to connect their networks.

  • BGP operates on TCP port 179.

  • BGP uses path vector routing algorithm to make routing decisions.

  • BGP is classified as a path vector protocol.

Add your answer

Q87. What is incident management?

Ans.

Incident management is the process of identifying, analyzing, and resolving incidents to minimize their impact on business operations.

  • Incident management involves documenting incidents, categorizing them based on severity and impact, and prioritizing them for resolution.

  • It also includes investigating the root cause of incidents to prevent future occurrences.

  • Examples of incidents in a Websphere environment could include server crashes, application errors, or performance issues...read more

Add your answer

Q88. Default jobs in Control M subsystem

Add your answer

Q89. Explain the the labour optimisation

Ans.

Labour optimisation refers to the process of maximizing productivity and efficiency in the workforce.

  • Labour optimisation involves analyzing and improving the allocation of resources, including personnel, equipment, and time.

  • This can be achieved through the use of technology, such as automation and data analytics.

  • Labour optimisation can lead to cost savings, improved quality, and increased output.

  • For example, a manufacturing company may use labour optimisation to streamline th...read more

Add your answer

Q90. What is SIP, cluster IP Phones

Ans.

SIP is a protocol used for initiating, modifying, and terminating multimedia sessions over IP networks. Cluster IP Phones are a group of IP phones connected to a single IP address.

  • SIP stands for Session Initiation Protocol

  • It is used for establishing and managing communication sessions

  • SIP is commonly used in Voice over IP (VoIP) systems

  • Cluster IP Phones are a group of IP phones that share a single IP address

  • They are typically used in large organizations to simplify management ...read more

Add your answer

Q91. What is Raid,Stg Pool,Full backup

Ans.

Raid is a data storage technology that combines multiple disks into a single unit for performance and redundancy. Stg Pool is a collection of storage devices grouped together for easier management. Full backup is a complete copy of all data.

  • Raid combines multiple disks for performance and redundancy (e.g. Raid 0, Raid 1, Raid 5)

  • Storage Pool is a collection of storage devices grouped together for easier management (e.g. creating a pool of hard drives for a server)

  • Full backup i...read more

Add your answer

Q92. How BGP routing protocol work?

Ans.

BGP is a routing protocol used to exchange routing information between different autonomous systems on the internet.

  • BGP uses TCP port 179 for communication.

  • BGP routers exchange routing information through BGP update messages.

  • BGP routers establish neighbor relationships to exchange routing information.

  • BGP uses path attributes to determine the best route to a destination.

  • BGP can be configured to influence routing decisions based on policies.

Add your answer

Q93. 2. Explain defect life cycle

Ans.

Defect life cycle is the process of identifying, reporting, fixing, and verifying defects in software.

  • Defect is identified by testers during testing

  • Defect is reported to development team

  • Development team fixes the defect

  • Fixed defect is verified by testers

  • If defect is not fixed, it goes back to development team

  • If defect is fixed, it is closed

Add your answer

Q94. Golden gate issues and solutions

Ans.

Golden Gate is a replication software for Oracle databases. Common issues include lag, conflicts, and connectivity problems.

  • Lag can be caused by network latency or insufficient resources on the target database.

  • Conflicts can occur when the same data is updated on both the source and target databases.

  • Connectivity issues can be caused by firewall settings or incorrect configuration.

  • Solutions include optimizing network performance, resolving conflicts manually or using conflict d...read more

Add your answer

Q95. Write a program to print prime number

Ans.

Program to print prime numbers

  • Iterate through numbers and check if each number is prime

  • Use a nested loop to check divisibility by numbers less than the current number

  • Print the number if it is prime

Add your answer

Q96. What is ISO 27001 ?

Ans.

ISO 27001 is a globally recognized standard for information security management.

  • ISO 27001 provides a framework for managing and protecting sensitive information.

  • It outlines a risk management process to identify, assess, and treat information security risks.

  • ISO 27001 requires organizations to implement and maintain a set of policies, procedures, and controls to ensure the confidentiality, integrity, and availability of information.

  • Certification to ISO 27001 demonstrates an org...read more

Add your answer

Q97. What is VMware?

Ans.

VMware is a virtualization and cloud computing software provider.

  • VMware provides virtualization software that allows multiple operating systems to run on a single physical server.

  • It also offers cloud computing solutions for businesses to manage their IT infrastructure more efficiently.

  • Popular VMware products include vSphere, ESXi, and vCenter Server.

View 1 answer

Q98. what is gole ?

Ans.

Gole is a misspelling of the word 'goal'.

  • Gole is not a recognized word in the English language.

  • The correct spelling is 'goal', which refers to an objective or target to be achieved.

  • For example, in a professional setting, a gole could be to increase sales by 10% within a quarter.

Add your answer

Q99. End to end Project life cycle

Ans.

The end to end project life cycle refers to the complete process of a project from initiation to closure.

  • Initiation: Defining the project objectives, scope, and stakeholders.

  • Planning: Creating a detailed project plan, including tasks, resources, and timelines.

  • Execution: Implementing the project plan, managing resources, and monitoring progress.

  • Monitoring and Control: Tracking project performance, identifying and resolving issues.

  • Closure: Formalizing project completion, conduc...read more

Add your answer

Q100. share the UI Policies knowledge

Ans.

UI Policies are used in ServiceNow to dynamically change the behavior of forms and fields based on conditions.

  • UI Policies are used to set mandatory fields, read-only fields, and visibility conditions on forms.

  • They are created using conditions and actions in the ServiceNow platform.

  • For example, a UI Policy can be used to make a field mandatory when a certain condition is met.

Add your answer
1
2

More about working at Kyndryl

Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Barefoot Organics

based on 71 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 465 Interview Questions
4.1
 • 202 Interview Questions
3.4
 • 171 Interview Questions
4.2
 • 158 Interview Questions
4.3
 • 156 Interview Questions
3.7
 • 133 Interview Questions
View all
Top Kyndryl Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter