Add office photos
Employer?
Claim Account for FREE

Microland

3.5
based on 1.5k Reviews
Filter interviews by

70+ Interview Questions and Answers

Updated 25 Sep 2024

Q1. Have you handle most difficult incident? If Is! What is your approach and what is the learning

Ans.

Yes, I have handled difficult incidents. My approach is to gather all available information, prioritize actions, and communicate effectively with stakeholders.

  • Gather all available information about the incident

  • Prioritize actions based on impact and urgency

  • Communicate effectively with stakeholders, including regular updates

  • Ensure all necessary resources are available to resolve the incident

  • Conduct a thorough post-incident review to identify areas for improvement

  • Example: Manage...read more

View 1 answer

Q2. What is problem management and change management?

Ans.

Problem management is the process of identifying and resolving the root cause of recurring incidents. Change management is the process of controlling and implementing changes to IT infrastructure.

  • Problem management focuses on identifying and resolving the underlying cause of incidents to prevent their recurrence.

  • Change management focuses on controlling and implementing changes to IT infrastructure in a controlled and systematic manner.

  • Problem management aims to minimize the i...read more

View 1 answer

Q3. What are switching technologies used in day to day life of network engineer

Ans.

Switching technologies used by network engineers include VLANs, STP, VTP, EtherChannel, and Port Security.

  • VLANs (Virtual Local Area Networks) allow for logical segmentation of a physical network

  • STP (Spanning Tree Protocol) prevents loops in redundant network topologies

  • VTP (VLAN Trunking Protocol) allows for automatic VLAN configuration across multiple switches

  • EtherChannel allows for the bundling of multiple physical links into a single logical link for increased bandwidth and...read more

Add your answer

Q4. ASA - Security levels, Difference between 8.3 pre and post, Transparent and Routed mode firewall, VPN, Stateful and stateless failover. Commands related to vpn

Ans.

The question covers various topics related to ASA firewall, including security levels, differences between pre and post 8.3 versions, transparent and routed mode, VPN, stateful and stateless failover, and VPN commands.

  • ASA firewall has security levels assigned to interfaces to control traffic flow

  • The 8.3 version of ASA introduced significant changes in NAT configuration

  • Transparent mode firewall operates at Layer 2 and doesn't modify IP addresses

  • Routed mode firewall operates at...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. What's are wireless controller and it's working?

Ans.

A wireless controller is a device that manages and controls wireless access points (APs) in a network.

  • Wireless controllers provide centralized management and configuration of wireless networks.

  • They can monitor and control the performance of APs, adjust radio frequencies, and manage security settings.

  • Wireless controllers can also provide features such as load balancing, roaming, and guest access.

  • Examples of wireless controllers include Cisco Wireless Controller, Aruba Mobility...read more

Add your answer

Q6. suppose in case if HA cable gets faulty in active-active mode what will happen ?

Ans.

In active-active mode, if HA cable gets faulty, the traffic will be automatically rerouted through the secondary cable to ensure continuous operation.

  • Traffic will be rerouted through the secondary cable to maintain connectivity

  • There may be a brief interruption in service during the failover process

  • The system is designed to handle cable faults without impacting overall operation

Add your answer
Are these interview questions helpful?

Q7. If the number of change failure is high, is it good and why

Ans.

No, high change failure rate is not good.

  • High change failure rate indicates poor planning and execution.

  • It can lead to increased downtime, loss of productivity, and decreased customer satisfaction.

  • It is important to identify the root cause of the failures and implement corrective actions.

  • Regular monitoring and analysis of change failure rate can help improve overall performance.

Add your answer

Q8. IPsec tunnel works on which port and differents modes in ipsec tunnel configuration.

Ans.

IPsec tunnel works on port 500 and has two modes - transport mode and tunnel mode.

  • IPsec tunnel works on port 500 for both IKE (Internet Key Exchange) and ESP (Encapsulating Security Payload) protocols.

  • IPsec tunnel can be configured in two modes - transport mode and tunnel mode.

  • In transport mode, only the payload (data) of the IP packet is encrypted and/or authenticated.

  • In tunnel mode, the entire IP packet is encrypted and/or authenticated, including the original IP header.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. what is outlook and outlook 365

Ans.

Outlook is a personal information manager and email client developed by Microsoft. Outlook 365 is a cloud-based subscription service of Outlook.

  • Outlook is a software application used for managing personal information such as emails, calendars, contacts, and tasks.

  • It allows users to send, receive, and organize emails from multiple email accounts.

  • Outlook provides features like calendar management, task tracking, note-taking, and journaling.

  • Outlook 365 is a subscription-based ve...read more

View 1 answer

Q10. What's is DNS DHCP ACTIVE DIRECTORY

Ans.

DNS, DHCP, and Active Directory are all essential components of a Windows-based network infrastructure.

  • DNS (Domain Name System) is responsible for translating domain names into IP addresses.

  • DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.

  • Active Directory is a centralized database that stores information about network resources and enables authentication and authorization for users and devices.

  • All three components...read more

Add your answer

Q11. What is cloud? Types of cloud? difference between types of cloud

Ans.

Cloud computing is the delivery of computing services over the internet. Types include public, private, and hybrid clouds.

  • Cloud computing is the delivery of computing services over the internet.

  • Public cloud: Services are delivered over the internet and shared across multiple organizations (e.g. AWS, Azure).

  • Private cloud: Services are maintained on a private network and used by a single organization.

  • Hybrid cloud: Combination of public and private clouds, allowing data and appl...read more

Add your answer

Q12. What is Modem and how to connect it with Router.

Ans.

A modem is a device that converts digital signals from a computer into analog signals for transmission over telephone lines.

  • Connect the modem to the router using an Ethernet cable

  • Configure the modem to bridge mode

  • Configure the router to use PPPoE or DHCP

  • Ensure the modem and router have different IP addresses

  • Test the connection by accessing the internet

Add your answer

Q13. what is spark? what is legacy defect? find the xpath of given example how will you run the 1 test case multiple times in testng? if the some task will take 8 hours but your manager said that you should complete...

read more
Ans.

Spark is a fast and general-purpose cluster computing system. Legacy defect refers to a known issue in older versions of software. XPath is a way to navigate XML documents. TestNG allows running test cases multiple times. Approach to completing a task in less time involves prioritizing and optimizing.

  • Spark is a cluster computing system for big data processing.

  • Legacy defect is a known issue in older versions of software that has not been fixed.

  • XPath is a language used to navig...read more

Add your answer

Q14. What is Pricing and what are the different models for it

Ans.

Pricing refers to the process of setting a value for a product or service. There are various models for pricing.

  • Cost-plus pricing

  • Value-based pricing

  • Penetration pricing

  • Skimming pricing

  • Dynamic pricing

  • Freemium pricing

  • Subscription pricing

Add your answer

Q15. What is proactive and reactive

Ans.

Proactive refers to taking preventive measures to avoid potential issues, while reactive refers to responding to issues after they have occurred.

  • Proactive actions are taken in advance to prevent problems or mitigate their impact.

  • Reactive actions are taken in response to problems that have already occurred.

  • Proactive measures include risk assessments, preventive maintenance, and training.

  • Reactive measures include incident response, troubleshooting, and problem resolution.

  • Proact...read more

View 1 answer

Q16. Whether I'll be able to do (24×7) rotational shifts, provided no can facilities.

Ans.

Yes, I am willing to work in rotational shifts without any can facilities.

  • I am flexible with working hours and can adjust my schedule accordingly.

  • I understand the importance of providing uninterrupted service to customers.

  • I have experience working in rotational shifts in my previous job.

  • I am willing to make necessary arrangements for transportation and accommodation.

  • I am committed to my job and will ensure that I am available whenever required.

Add your answer

Q17. What is vlan and type of vlan

Ans.

VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on their function, project or application.

  • VLANs allow network administrators to segment a network into smaller, more manageable groups.

  • Each VLAN has its own broadcast domain, which means that broadcasts are contained within the VLAN and do not spread to other VLANs.

  • VLANs can be configured based on port, protocol, MAC address, or subnet.

  • Types of VLANs include default VLAN, data V...read more

View 2 more answers

Q18. How you push firmware using fortimanger and manual upgradation process.

Ans.

Firmware can be pushed using FortiManager by creating a firmware policy and applying it to devices. Manual upgrade process involves downloading firmware, uploading it to device, and initiating upgrade.

  • Create a firmware policy in FortiManager

  • Assign the policy to the devices that need firmware upgrade

  • Monitor the upgrade process through FortiManager

  • For manual upgrade, download the firmware from Fortinet support site

  • Upload the firmware to the device using GUI or CLI

  • Initiate the u...read more

Add your answer

Q19. What do mean by domain ?

Ans.

A domain is a group of computers and devices on a network that share a common set of rules and procedures.

  • Domains are used to manage and organize network resources.

  • A domain is typically controlled by a domain controller.

  • Users and computers within a domain can be managed centrally.

  • Domains can have different levels of security and access control.

  • Examples of domains include microsoft.com, google.com, and amazon.com.

Add your answer

Q20. How will you creat a new domain in forest ?

Ans.

To create a new domain in a forest, use Active Directory Domain Services (AD DS) installation wizard.

  • Open Server Manager and select Add Roles and Features.

  • Select Active Directory Domain Services and follow the installation wizard.

  • After installation, open Active Directory Domains and Trusts and right-click on the root domain.

  • Select New Domain and follow the wizard to create the new domain.

  • Verify the new domain in Active Directory Users and Computers.

Add your answer

Q21. What is proxy server, firewalls?

Ans.

Proxy server acts as an intermediary between clients and servers, while firewalls are security systems that monitor and control network traffic.

  • Proxy server caches frequently accessed web pages to improve performance and can be used to filter content or block access to certain websites.

  • Firewalls can be hardware or software-based and can be configured to allow or block traffic based on predefined rules.

  • Firewalls can also be used to create virtual private networks (VPNs) to sec...read more

View 1 answer

Q22. What is tcp in network? If your system in under Trojan attack then, what will be the first step you will do?? Difference between the ost and pst.

Ans.

TCP stands for Transmission Control Protocol, a core protocol of the Internet protocol suite. It ensures reliable and ordered delivery of data.

  • TCP is a connection-oriented protocol that provides reliable communication between devices on a network.

  • If my system is under a Trojan attack, the first step I would take is to disconnect the infected system from the network to prevent further spread of the malware.

  • OST (Offline Storage Table) is a file format used by Microsoft Outlook ...read more

Add your answer

Q23. What is the work of Sysvol folder ?

Ans.

Sysvol folder is used to store Group Policy Objects and scripts for Active Directory domain controllers.

  • Sysvol folder is automatically created on each domain controller when it is promoted to a domain controller.

  • It contains Group Policy Objects (GPOs) and scripts that are replicated to all domain controllers in the domain.

  • Sysvol folder is also used to store logon scripts, administrative templates, and security templates.

  • It is located in the %SystemRoot%\SYSVOL\sysvol folder o...read more

Add your answer

Q24. Database migration from lower version to higher version

Ans.

Database migration involves upgrading a lower version of a database to a higher version.

  • Ensure compatibility between the source and target database versions

  • Backup the source database before migration

  • Use a migration tool or script to transfer data and schema

  • Test the migrated database thoroughly before deploying to production

Add your answer

Q25. what is client and server os

Ans.

Client OS is used by end-users to interact with the computer while Server OS is used to manage resources and provide services to clients.

  • Client OS is designed for personal computers and laptops, such as Windows 10, macOS, and Ubuntu.

  • Server OS is designed for servers, such as Windows Server, Linux Server, and Unix.

  • Client OS provides a graphical user interface (GUI) for end-users to interact with the computer, while Server OS typically does not have a GUI and is managed remotel...read more

Add your answer

Q26. Explain how you were managing cloud based products in you current role

Ans.

I managed cloud based products by overseeing implementation, monitoring performance, and ensuring security.

  • Coordinated with cross-functional teams to implement cloud solutions

  • Monitored performance metrics and made adjustments as needed

  • Ensured data security and compliance with industry regulations

  • Implemented cost-saving measures by optimizing cloud resources

Add your answer

Q27. Which is the Payroll company to micro land?

Ans.

I'm sorry, but I cannot answer that question as it is too specific and lacks context.

  • Without more information about the context of the question, it is impossible to provide a meaningful answer.

  • It is important to clarify the purpose of the question and the specific industry or region being referred to.

  • If you have more information or a specific scenario in mind, I would be happy to provide guidance on how to approach the problem.

Add your answer

Q28. What is active directory , what is DHCP, DNS , FTP

Ans.

Active Directory is a directory service that stores information about network resources. DHCP assigns IP addresses. DNS resolves domain names. FTP is a file transfer protocol.

  • Active Directory is used to manage users, computers, and other network resources in a domain environment.

  • DHCP automatically assigns IP addresses to devices on a network.

  • DNS translates domain names into IP addresses.

  • FTP is a protocol used to transfer files between computers on a network.

  • Active Directory, ...read more

Add your answer

Q29. Are u comfortable with flexi shifts

Ans.

Yes, I am comfortable with flexi shifts.

  • I am willing to work flexible hours to ensure smooth operations.

  • I understand the importance of being available during peak hours.

  • I have experience working in shifts and can adapt to changing schedules.

  • I am committed to meeting the needs of the team and the organization.

Add your answer

Q30. How do you troubleshoot a browser slowness issue

Ans.

To troubleshoot browser slowness, check for network issues, clear cache and cookies, disable extensions, update browser, and check for malware.

  • Check for network issues such as slow internet connection

  • Clear browser cache and cookies to improve performance

  • Disable unnecessary browser extensions that may be causing slowness

  • Update the browser to the latest version for better performance

  • Scan for malware or viruses that could be affecting browser speed

Add your answer

Q31. How to add Network printer.

Ans.

To add a network printer, you need to connect it to the network and install the printer driver on your computer.

  • Connect the printer to the network using an Ethernet cable or Wi-Fi.

  • Find the IP address of the printer.

  • Open the Control Panel on your computer and go to Devices and Printers.

  • Click on 'Add a printer' and select 'Add a network, wireless or Bluetooth printer'.

  • Enter the IP address of the printer and follow the on-screen instructions to install the driver.

View 1 answer

Q32. What is Router and how to configure it.

Ans.

A router is a networking device that forwards data packets between computer networks. It connects multiple devices to the internet.

  • Connect the router to the modem using an Ethernet cable

  • Access the router's web-based setup page using a web browser

  • Configure the router's network settings, such as SSID and password

  • Set up port forwarding and other advanced settings if needed

  • Save and apply the changes to the router

Add your answer

Q33. Different stages of a change in ServiceNOW

Ans.

Different stages of a change in ServiceNOW

  • Initiation - Request for change is raised

  • Assessment - Change request is assessed for feasibility and impact

  • Approval - Change request is approved or rejected

  • Implementation - Change is implemented in a controlled manner

  • Review - Change is reviewed for effectiveness and any issues are addressed

  • Closure - Change is closed and documentation is updated

Add your answer

Q34. New SQL Server installation and configuration

Ans.

New SQL Server installation and configuration

  • Determine hardware and software requirements

  • Install SQL Server software

  • Configure server settings and security

  • Create and configure databases

  • Set up backup and recovery procedures

Add your answer

Q35. Aer you ready for rotational shift

Ans.

Yes, I am ready for rotational shift.

  • I have prior experience working in rotational shifts.

  • I am flexible with my work schedule and can adjust accordingly.

  • I understand the importance of maintaining network and security operations 24/7.

  • I am willing to work extra hours if required during critical situations.

Add your answer

Q36. What do you know about Human Resources

Ans.

Human Resources is the department responsible for managing an organization's workforce.

  • HR is responsible for recruitment, training, and development of employees

  • They handle employee benefits, compensation, and performance evaluations

  • HR ensures compliance with labor laws and regulations

  • They also handle employee relations and conflict resolution

  • HR plays a crucial role in shaping the company culture and promoting diversity and inclusion

Add your answer

Q37. How to troubleshoot high CPU and Memory

Ans.

To troubleshoot high CPU and Memory, monitor performance metrics, identify resource-intensive queries, optimize queries and indexes, check for memory leaks.

  • Monitor performance metrics using tools like SQL Server Profiler, Performance Monitor, or DMVs.

  • Identify resource-intensive queries using tools like SQL Server Management Studio or query execution plans.

  • Optimize queries and indexes by rewriting queries, adding missing indexes, or removing unused indexes.

  • Check for memory lea...read more

Add your answer

Q38. What is router? how to configure one?

Ans.

A router is a networking device that forwards data packets between computer networks. To configure a router, access its web interface or command line interface and set up network settings.

  • Access the router's web interface by entering its IP address in a web browser

  • Log in with the router's username and password

  • Navigate to the settings section to configure network settings such as IP address, subnet mask, and DNS servers

  • Save the changes and restart the router for the new settin...read more

Add your answer

Q39. Understanding of interest in online education

Ans.

Online education offers flexibility, accessibility, and a wide range of courses.

  • Online education allows individuals to learn at their own pace and schedule.

  • It provides access to a variety of courses and programs from reputable institutions.

  • Online education eliminates geographical barriers and allows for learning from anywhere.

  • It offers flexibility for working professionals to balance their job and studies.

  • Online education often provides interactive learning materials and reso...read more

View 1 answer

Q40. How to trouble shoot routers

Ans.

To troubleshoot routers, start by checking the physical connections and power supply. Then, check the router settings and firmware.

  • Check physical connections and power supply

  • Check router settings and firmware

  • Reset the router to default settings if necessary

  • Check for firmware updates and install if available

  • Check for any network issues or conflicts

  • Contact the manufacturer or internet service provider for further assistance

View 1 answer

Q41. Difference between local and network printer?

Ans.

Local printers are directly connected to a single computer, while network printers are shared among multiple computers over a network.

  • Local printers are connected to a single computer via USB or parallel port.

  • Network printers are connected to a network and can be accessed by multiple computers.

  • Local printers are typically used for individual use, while network printers are used in office environments for shared printing.

  • Local printers require drivers to be installed on each c...read more

Add your answer

Q42. What is the current and expected CTC

Ans.

Current CTC is $70,000 and expected CTC is $80,000

  • Current CTC: $70,000

  • Expected CTC: $80,000

Add your answer

Q43. What is fault tolerance?

Ans.

Fault tolerance is the ability of a system to continue functioning even in the event of a failure.

  • It involves redundancy and backup systems to ensure continuity of operations.

  • Examples include RAID storage systems, redundant power supplies, and failover clustering.

  • Fault tolerance is important for critical systems where downtime can result in significant losses.

  • It is often achieved through a combination of hardware and software solutions.

  • Regular testing and maintenance are nece...read more

Add your answer

Q44. What do you know about Broadband and Leased Line

Ans.

Broadband and Leased Line are types of internet connections with different characteristics.

  • Broadband is a high-speed internet connection that is always on and typically shared among multiple users.

  • Leased Line is a dedicated connection between two points, providing consistent bandwidth and reliability.

  • Broadband is suitable for residential use and small businesses, while Leased Line is preferred by large corporations for mission-critical applications.

  • Broadband is usually cheape...read more

Add your answer

Q45. How to join domain.

Ans.

To join a domain, you need to have administrative privileges and follow a few steps.

  • Ensure the computer is connected to the network

  • Open System Properties and click on 'Change'

  • Enter the domain name and provide administrative credentials

  • Restart the computer for changes to take effect

Add your answer

Q46. What do you know about Microland?

Ans.

Microland is a leading digital transformation company providing IT infrastructure and cloud services.

  • Founded in 1989 and headquartered in Bangalore, India

  • Offers services in areas such as network management, data center, and end-user computing

  • Has a global presence with offices in India, UK, US, Middle East, and Southeast Asia

  • Clients include Fortune 500 companies across various industries such as banking, healthcare, and retail

Add your answer

Q47. What is the IP and types version

Ans.

IP stands for Internet Protocol. It is a unique numerical address assigned to each device connected to a computer network.

  • IP is used to identify and locate devices on a network.

  • There are two versions of IP: IPv4 and IPv6.

  • IPv4 uses a 32-bit address and is the most widely used version.

  • IPv6 uses a 128-bit address and provides a larger address space.

  • Examples of IP addresses: 192.168.0.1 (IPv4) and 2001:0db8:85a3:0000:0000:8a2e:0370:7334 (IPv6).

Add your answer

Q48. How to find IP address

Ans.

To find IP address, go to command prompt and type 'ipconfig' for Windows or 'ifconfig' for Mac/Linux.

  • Open command prompt/terminal

  • Type 'ipconfig' for Windows or 'ifconfig' for Mac/Linux

  • Look for 'IPv4 Address' or 'inet' in the output

  • Alternatively, search 'what is my IP address' on Google

Add your answer

Q49. What is DAG, DNN and VNN

Ans.

DAG stands for Directed Acyclic Graph, DNN stands for Deep Neural Network, and VNN stands for Virtual Neural Network.

  • DAG is a graph with directed edges and no cycles, commonly used in data processing.

  • DNN is a type of artificial neural network with multiple hidden layers, used in deep learning.

  • VNN is a virtual neural network, a concept that may refer to a neural network implemented in a virtual environment.

Add your answer

Q50. What is pay and ost

Ans.

Pay and OST are not related terms in engineering.

  • Pay refers to the amount of money an employee receives for their work.

  • OST is not a commonly used term in engineering and may refer to a variety of things such as Open Source Technology or On-Site Training.

  • Without further context, it is difficult to provide a more specific answer.

Add your answer

Q51. what are network switches?

Ans.

Network switches are devices used to connect multiple devices within a local area network (LAN) and manage the traffic between them.

  • Network switches operate at the data link layer (Layer 2) of the OSI model.

  • They use MAC addresses to forward data to the appropriate destination.

  • Switches can provide better performance compared to hubs by creating dedicated connections between devices.

  • Managed switches offer additional features like VLAN support, QoS, and security settings.

  • Example...read more

Add your answer

Q52. ITIL procedure or certification

Ans.

ITIL is a framework for IT service management that focuses on aligning IT services with the needs of the business.

  • ITIL stands for Information Technology Infrastructure Library

  • It provides a set of best practices for IT service management

  • ITIL certification is a globally recognized qualification for IT professionals

  • ITIL procedures help organizations improve their IT service delivery and customer satisfaction

  • ITIL includes processes such as incident management, problem management,...read more

Add your answer

Q53. What is gost

Ans.

GOST is a set of cryptographic standards developed by the Russian government.

  • GOST includes algorithms for encryption, hashing, and digital signatures.

  • It is widely used in Russia and other countries that have close ties with Russia.

  • GOST algorithms are known for their high level of security and resistance to attacks.

  • Some examples of GOST algorithms include GOST R 34.10-2012 for digital signatures and GOST R 34.11-2012 for hashing.

Add your answer

Q54. Ethical hacking in cyber security

Ans.

Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.

  • Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.

  • The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.

  • Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking activities.

  • Examples of ethical hacking include penetration...read more

Add your answer

Q55. Ready to work on multiple technologies?

Ans.

Yes, I am ready to work on multiple technologies.

  • I have experience working with a variety of backup solutions such as Veeam, Commvault, and NetBackup.

  • I am proficient in managing different operating systems like Windows, Linux, and Unix.

  • I am comfortable learning and adapting to new technologies as needed.

Add your answer

Q56. What is Cash Flow statement

Ans.

Cash Flow statement is a financial statement that shows the inflow and outflow of cash in a business over a period of time.

  • It shows the sources of cash and how it was used.

  • It is divided into three sections: operating, investing, and financing activities.

  • It helps in assessing the liquidity and solvency of a business.

  • Example: A company's cash flow statement shows that it received cash from customers, sold some of its investments, and borrowed money from a bank.

  • Example: A negati...read more

Add your answer

Q57. Packet flow in PALO ALTO FIREWALL?

Ans.

Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.

  • Packet enters the firewall through an ingress interface

  • Firewall performs policy lookup to determine if the packet should be allowed or denied

  • If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.

  • NAT (Network Address Translation) may be applied to the packet if configured

  • Packet e...read more

Add your answer

Q58. Election of DR AND BDR IN OSPF?

Ans.

DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.

  • DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.

  • The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.

  • If two routers have the same priority, the router with the highest router ID will become ...read more

Add your answer

Q59. what is auto discover what is e-discovery

Ans.

Auto discover is a feature that allows email clients to automatically find and configure settings for accessing email servers. E-discovery is the process of identifying, collecting, and producing electronically stored information for legal purposes.

  • Auto discover is a feature in email clients that automatically configures settings for accessing email servers

  • E-discovery is the process of identifying, collecting, and producing electronically stored information for legal purposes...read more

Add your answer

Q60. what is roles and responsiblity

Ans.

Roles and responsibilities refer to the tasks and duties assigned to an individual within an organization.

  • Analyzing business processes and identifying areas for improvement

  • Gathering and documenting business requirements

  • Creating functional specifications for IT development

  • Collaborating with stakeholders to ensure project success

  • Conducting data analysis to support decision-making

  • Providing recommendations based on data-driven insights

Add your answer

Q61. What is a DNS?

Ans.

DNS stands for Domain Name System, which translates domain names to IP addresses.

  • DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).

  • It helps users access websites by typing in easy-to-remember domain names instead of complex IP addresses.

  • DNS servers store records of domain names and their corresponding IP addresses, allowing for efficient internet navigation.

  • DNS also plays a crucial role in...read more

Add your answer

Q62. what is BA and what they do

Ans.

Business Analyst (BA) is responsible for analyzing business processes, identifying needs, and recommending solutions to help organizations improve efficiency and achieve their goals.

  • BA works closely with stakeholders to understand their needs and gather requirements.

  • They analyze data, create reports, and make recommendations for process improvements.

  • BA may also be involved in testing and implementing new systems or processes.

  • Examples: Conducting interviews with stakeholders, ...read more

Add your answer

Q63. Please explain Citrix logon process

Ans.

Citrix logon process involves authentication, enumeration, and connection establishment.

  • User enters credentials on Citrix login page

  • Authentication server verifies the credentials

  • Enumeration process determines the available resources for the user

  • Connection establishment process creates a secure connection between user device and Citrix server

  • User gains access to the resources available to them

Add your answer

Q64. The Architecture of SQL Server

Ans.

The architecture of SQL Server involves components like storage engine, query processor, and buffer manager.

  • SQL Server architecture consists of multiple components such as storage engine, query processor, and buffer manager.

  • The storage engine manages data storage, retrieval, and modification.

  • The query processor processes SQL queries and generates execution plans.

  • The buffer manager is responsible for managing data cache in memory.

  • SQL Server also includes components like securi...read more

Add your answer

Q65. How does a DHCP work

Ans.

DHCP assigns IP addresses to devices on a network automatically

  • DHCP server receives a request from a device for an IP address

  • DHCP server assigns an available IP address to the device

  • DHCP server also provides other network configuration information like subnet mask and default gateway

  • DHCP lease time determines how long the IP address is valid for

  • DHCP uses a client-server model

Add your answer

Q66. Recent issues and resolution

Ans.

Resolved recent issues related to database performance by optimizing queries and increasing server resources.

  • Identified slow performing queries and optimized them by adding indexes or rewriting them

  • Increased server resources such as CPU, memory, or storage to improve performance

  • Implemented query caching or stored procedures to reduce load on the database server

Add your answer

Q67. What is the marketing

Ans.

Marketing is the process of promoting and selling products or services by understanding customer needs and creating value.

  • Marketing involves identifying customer needs and wants

  • Creating products or services that meet those needs

  • Promoting and selling those products or services through various channels

  • Building relationships with customers to create value and loyalty

Add your answer

Q68. What's ur current package

Ans.

My current package is competitive and includes benefits such as health insurance and paid time off.

  • Competitive salary

  • Health insurance coverage

  • Paid time off benefits

Add your answer

Q69. What is the eus role?

Ans.

EUS stands for Endoscopic Ultrasound. It is a minimally invasive procedure that combines endoscopy and ultrasound to diagnose and stage diseases.

  • EUS is commonly used to diagnose and stage cancers of the digestive system, such as pancreatic cancer.

  • During an EUS procedure, a thin, flexible tube with an ultrasound probe is inserted through the mouth or rectum to obtain images of the digestive tract and nearby organs.

  • EUS can also be used to obtain tissue samples for biopsy or to ...read more

Add your answer

Q70. Future of education in India

Ans.

The future of education in India is evolving with advancements in technology and a focus on skill-based learning.

  • Technology will play a crucial role in transforming the education system

  • Online learning platforms and digital tools will become more prevalent

  • Skill-based education will gain importance to meet industry demands

  • Personalized learning and adaptive assessments will enhance student engagement

  • Collaborative learning and project-based approaches will be encouraged

  • Education ...read more

View 1 answer

Q71. What is tha dhcp?

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.

  • DHCP is used to simplify network administration by automatically assigning IP addresses to devices.

  • It allows devices to join a network without requiring manual configuration of IP addresses.

  • DHCP servers can also assign other network configuration information, such as subnet masks and default gateways.

  • DHCP leases are temporary and must be renewed per...read more

Add your answer

Q72. The backup process of Avamar

Ans.

Avamar is a backup software solution that utilizes deduplication technology to efficiently store and manage backups.

  • Avamar uses deduplication technology to reduce storage space and improve backup efficiency.

  • It performs backups at the block level rather than file level, allowing for faster backups and restores.

  • Avamar integrates with various applications and databases for seamless backup and recovery processes.

  • It offers features like automated backup scheduling, data encryption...read more

Add your answer

Q73. Ospf states and explain?

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

  • OSPF is a link-state routing protocol

  • It uses Dijkstra's algorithm to calculate the shortest path

  • OSPF routers exchange link-state advertisements (LSAs)

  • It supports VLSM (Variable Length Subnet Masking)

  • OSPF areas are used to divide large networks into smaller segments

Add your answer

Q74. technical details of azure cloud

Add your answer

Q75. Explain about Agile process?

Ans.

Agile process is a software development methodology that promotes adaptive planning, evolutionary development, early delivery, and continuous improvement.

  • Iterative and incremental development

  • Cross-functional teams

  • Regular feedback and adaptation

  • Customer collaboration

  • Time-boxed iterations (sprints)

  • Continuous integration and testing

Add your answer

Q76. What is group policy

Ans.

Group Policy is a feature in Windows that allows administrators to manage settings and configurations for users and computers in a network.

  • Group Policy is used to enforce security policies, software installation policies, and other settings across a network.

  • It allows administrators to centrally manage and configure settings for multiple users and computers.

  • Group Policy settings can be applied to specific users, groups, or computers.

  • Examples of Group Policy settings include pa...read more

Add your answer

Q77. Explain osi model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It helps in understanding how different networking protocols work together.

  • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with adjacent layers.

  • For example, HTTP operates at the Appl...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 38 interviews in the last 1 year
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 386 Interview Questions
4.2
 • 384 Interview Questions
4.0
 • 200 Interview Questions
4.2
 • 190 Interview Questions
3.6
 • 173 Interview Questions
4.0
 • 170 Interview Questions
View all
Top Microland Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter