i
Kyndryl
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Manually deploying OpenStack involves several steps including setting up the environment, installing the necessary components, configuring networking, and launching instances.
Set up the environment by installing a base operating system such as Ubuntu or CentOS.
Install the necessary components like Keystone, Glance, Nova, Neutron, and Cinder.
Configure networking by setting up bridges, VLANs, and IP addresses.
Launch inst...
Various networks like management network, data network, external network, and storage network are required for an OpenStack environment.
Management network for communication between OpenStack services and components
Data network for transferring data between instances
External network for connecting to the outside world
Storage network for storage operations like block storage or object storage
SR-IOV and DPDK are technologies used to improve network performance in virtualized environments.
SR-IOV (Single Root I/O Virtualization) allows a single physical network interface card (NIC) to appear as multiple virtual NICs, improving network performance by reducing overhead.
DPDK (Data Plane Development Kit) is a set of libraries and drivers for fast packet processing, bypassing the kernel network stack for improved ...
The process flow for instance creation involves selecting the instance type, configuring the instance settings, launching the instance, and monitoring its status.
Select the instance type based on requirements (e.g. CPU, memory, storage)
Configure the instance settings such as network, security, and storage options
Launch the instance using the chosen settings
Monitor the instance status to ensure it is running properly
Nova conductor is responsible for offloading certain tasks from the Nova compute service to improve performance and scalability.
Manages scheduling and resource allocation for instances
Handles live migrations of instances between compute nodes
Improves performance and scalability by offloading tasks from Nova compute service
I appeared for an interview in Feb 2025.
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves measures to safeguard information technology assets.
Includes practices like encryption, firewalls, and intrusion detection systems.
Examples of threats include malware, phishing, and ransomware attacks.
Cybersecurity is crucial for protecting sensitive data in sectors like finance and healthcare.
The current version of Microsoft Windows Server is Windows Server 2019. Hyper-V is a virtualization platform. Active Directory is a directory service. DNS is a system that translates domain names to IP addresses. DHCP is a network protocol that assigns IP addresses to devices. WSUS is Windows Server Update Services. The current version of client Windows operating system is Windows 10.
Windows Server 2019 is the latest v...
VMware vSphere is a virtualization platform that provides virtualization, management, resource optimization, and more.
DRS (Distributed Resource Scheduler) in VMware is a feature that automatically balances computing workloads across a cluster of ESXi hosts.
High availability in VMware ensures that virtual machines are restarted on another host in case of a host failure.
Fault Tolerance in VMware provides continuous avail...
Microsoft Azure Cloud is a cloud computing service provided by Microsoft, offering a variety of services and resources for building, deploying, and managing applications.
Provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) offerings
Offers services such as virtual machines, databases, AI and machine learning tools, and more
Allows for scalability, flexibility, and co...
FSMO stands for Flexible Single Master Operations. They are specialized roles in Active Directory that handle specific tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Each FSMO role is responsible for a specific aspect of the Active Directory environment.
For example, the PDC Emulator role handles password changes and time synchronization within a do
Service Delivery involves providing services to customers in a timely and efficient manner.
Service Delivery focuses on meeting customer needs and expectations
It involves ensuring services are delivered on time and within budget
Service Delivery often includes managing relationships with customers and stakeholders
Examples of Service Delivery include IT support, logistics, and customer service
Incident is an unplanned event that disrupts or degrades a service, while Problem is the underlying cause of one or more incidents.
Incident is a specific event that causes an interruption or reduction in the quality of a service.
Problem is the root cause of one or more incidents and is identified through the analysis of incidents.
Incidents are typically resolved quickly to restore service, while problems require invest...
I prioritize tasks, stay organized, communicate effectively, and remain calm to manage work under pressure.
Prioritize tasks based on urgency and importance
Stay organized by creating to-do lists and setting deadlines
Communicate effectively with team members and stakeholders to manage expectations
Remain calm by taking deep breaths and focusing on solutions rather than problems
Kyndryl interview questions for popular designations
DNS is a domain name system that translates domain names to IP addresses.
DNS stands for Domain Name System
It translates human-readable domain names (like www.example.com) to IP addresses (like 192.168.1.1)
DNS helps in locating websites and other resources on the internet
DNS operates through a distributed database system that stores domain names and their corresponding IP addresses
DHCP is a protocol used to automatically assign IP addresses to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It helps in efficient management of IP addresses in a network
DHCP servers lease IP addresses to devices for a specific period of time
Example: When a new device connects to a network, DHCP assigns it an available IP address
Get interview-ready with Top Kyndryl Interview Questions
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.
Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...
I have extensive experience in network security and have successfully implemented various security measures in my previous roles.
I have a strong background in network security protocols and technologies
I have experience in implementing firewalls, intrusion detection systems, and VPNs
I have successfully managed security incidents and conducted security audits
I have a track record of staying up-to-date with the latest se
I applied via Approached by Company
Multiple questions are given to evaluate how you collaborate with others to reach a decision.
My area of interest is artificial intelligence and machine learning. I am well-informed about various technologies and stay updated through continuous learning.
I have a strong interest in artificial intelligence and machine learning, and have completed several projects in this field.
I regularly attend workshops, seminars, and online courses to stay updated on the latest technologies and trends.
I actively participate in...
My area of focus is strategic planning and implementation. I propose to use data-driven decision-making and cross-functional collaboration to drive change.
Utilize data analytics to identify key trends and opportunities for improvement
Implement agile methodologies to quickly adapt to changing market conditions
Foster a culture of innovation by encouraging team members to think creatively and share ideas
Collaborate with s...
TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection before sending data.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is commonly used for applications that require reliable data transmission, such as web browsing, emai...
To troubleshoot a user's system that cannot connect to the internet, I would follow these steps
Check if the internet connection is working on other devices
Restart the router and modem
Check network settings on the user's system
Run network diagnostics or troubleshoot network connection
Update network drivers or reset network settings
I applied via LinkedIn and was interviewed in Dec 2024. There was 1 interview round.
Some of the top questions asked at the Kyndryl interview -
The duration of Kyndryl interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 182 interviews
Interview experience
based on 2.9k reviews
Rating in categories
System Administrator
1.3k
salaries
| ₹2.9 L/yr - ₹12.1 L/yr |
Project Manager
621
salaries
| ₹7.1 L/yr - ₹28.1 L/yr |
Associate Technical Engineer
581
salaries
| ₹3.5 L/yr - ₹6.5 L/yr |
Infrastructure Specialist
579
salaries
| ₹5.9 L/yr - ₹23 L/yr |
SME
419
salaries
| ₹7.5 L/yr - ₹25.5 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions