Add office photos
Employer?
Claim Account for FREE

Microsoft Corporation

4.1
based on 1.6k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

20+ Evertz Microsystems Interview Questions and Answers

Updated 13 Nov 2024
Popular Designations

Q1. What are the steps which you will follow if a customer calls and tell you that he is not able to do any editing in Microsoft word?

Ans.

Steps to follow when a customer reports inability to edit in Microsoft Word

  • Ask the customer if they are receiving any error messages

  • Check if the document is in read-only mode

  • Check if the customer has the necessary permissions to edit the document

  • Check if the customer's version of Microsoft Word is up to date

  • Try repairing or reinstalling Microsoft Word

  • If all else fails, escalate the issue to a higher level of support

View 1 answer

Q2. How do we solve the power bi report refresh issue, if the credentials are fine and report is refreshing fine at desktop ?

Ans.

Check if the data source is accessible and refresh schedule is set up correctly.

  • Verify if the data source is accessible from the Power BI service.

  • Check if the refresh schedule is set up correctly.

  • Ensure that the credentials used for refreshing the report are correct.

  • Check if there are any errors or warnings in the refresh history.

  • Try refreshing the report manually from the Power BI service.

  • Check if there are any issues with the data model or queries used in the report.

View 1 answer

Q3. What would you do if there is an escalation and no solution is present currently

Ans.

I would follow the escalation process and involve higher-level support and management to find a solution.

  • Review all available documentation and resources

  • Collaborate with colleagues and subject matter experts

  • Communicate regularly with the customer to provide updates and manage expectations

  • Escalate to higher-level support and management as necessary

  • Continue to troubleshoot and test potential solutions

  • Document all steps taken and findings for future reference

Add your answer

Q4. What is the use of public and private key?

Ans.

Public and private keys are used for secure communication and encryption.

  • Public key is used for encryption and can be shared with anyone.

  • Private key is used for decryption and should be kept secret.

  • They are used in various security protocols like SSL, SSH, and PGP.

  • Example: When you visit a website with SSL, your browser uses the website's public key to encrypt data, which can only be decrypted by the website's private key.

  • Another example: When you send an encrypted email usin...read more

Add your answer
Discover Evertz Microsystems interview dos and don'ts from real experiences

Q5. Comms : a computer is broken and you have to guide a non tech savvy user over the phone to fix it

Ans.

Guide non tech savvy user over phone to fix broken computer

  • Ask user to describe the problem and what they see on the screen

  • Guide user to check if all cables are properly connected

  • Instruct user to restart the computer and check if problem persists

  • If problem still exists, guide user to run basic troubleshooting steps

  • If issue is not resolved, escalate to higher level of support

Add your answer

Q6. What all modes are there to get data from different sources in Power BI ?

Ans.

Power BI has various modes to get data from different sources.

  • Power Query Editor

  • DirectQuery

  • Import

  • Live Connection

  • Power BI API

  • Power BI Desktop

  • Power BI Mobile

  • Power BI Gateway

  • Third-party connectors

Add your answer
Are these interview questions helpful?

Q7. What is the use of encoder and decoder?

Ans.

Encoders and decoders are used to convert data from one format to another.

  • Encoders convert analog signals to digital signals.

  • Decoders convert digital signals to analog signals.

  • Encoders are used in devices like cameras, sensors, and audio equipment.

  • Decoders are used in devices like televisions, radios, and DVD players.

Add your answer

Q8. What are the properties of a B-Tree?

Ans.

B-Tree is a self-balancing tree data structure with multiple child nodes and is used for efficient disk access.

  • B-Tree has a root node, internal nodes, and leaf nodes.

  • Each node can have multiple child nodes.

  • The number of child nodes is fixed for a given B-Tree.

  • B-Tree is self-balancing, which means that the height of the tree is minimized.

  • B-Tree is used for efficient disk access as it reduces the number of disk accesses required to find a particular data item.

  • Example: File syst...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Write code for creating a node in linked list

Ans.

Code for creating a node in linked list

  • Create a struct for the node with data and pointer to next node

  • Allocate memory for the node using malloc()

  • Assign data to the node

  • Assign the next pointer to NULL or the next node in the list

Add your answer

Q10. What is an IP address, server, how to troubleshoot an issue

Ans.

An IP address is a unique identifier for a device on a network, a server is a computer or software that provides services to other devices, troubleshooting involves identifying and resolving issues.

  • An IP address is a numerical label assigned to each device connected to a computer network, used for communication and identification.

  • A server is a computer or software that provides services to other devices on the network, such as hosting websites or storing files.

  • Troubleshooting...read more

Add your answer

Q11. If you were to troubleshoot a non-RDP scenario, how would you approach it?

Ans.

I would start by checking network connectivity, firewall settings, and remote desktop settings.

  • Check network connectivity to ensure the device is connected to the network

  • Verify firewall settings to ensure RDP traffic is allowed

  • Check remote desktop settings on the target device to ensure it is enabled

  • Verify if the target device is reachable and responding to ping requests

Add your answer

Q12. What if a customer refuses to share logs and data?

Ans.

Explain importance of logs, offer alternative solutions, emphasize need for troubleshooting

  • Explain the importance of logs in diagnosing and resolving technical issues

  • Offer alternative solutions such as remote troubleshooting or guiding the customer through the process

  • Emphasize the need for collaboration and transparency to effectively resolve the issue

Add your answer

Q13. Difference between #define and const

Ans.

Difference between #define and const

  • Both are used to define constants

  • #define is a preprocessor directive and replaces all occurrences of the defined identifier with the given value

  • const is a keyword and creates a read-only variable

  • const is type-safe and has better scope control than #define

  • Example: #define PI 3.14 vs const float PI = 3.14;

  • Example: #define MAX(a,b) ((a)>(b)?(a):(b)) vs const int MAX = (a)>(b)?(a):(b);

Add your answer

Q14. Explain one cryptographic technique

Ans.

One cryptographic technique is RSA, which uses public and private keys to encrypt and decrypt data.

  • RSA stands for Rivest-Shamir-Adleman, named after its creators.

  • It is a widely used asymmetric encryption algorithm.

  • RSA uses a public key to encrypt data and a private key to decrypt it.

  • The security of RSA is based on the difficulty of factoring large prime numbers.

  • RSA is used in various applications such as secure communication, digital signatures, and authentication.

Add your answer

Q15. How would you deploy a Virtual Machine?

Ans.

To deploy a Virtual Machine, you would need to use a virtualization platform and follow specific steps to create and configure the VM.

  • Choose a virtualization platform such as VMware, Hyper-V, or VirtualBox.

  • Create a new virtual machine and specify settings such as CPU, memory, storage, and network.

  • Install an operating system on the virtual machine.

  • Configure any additional settings or software needed for the VM to function properly.

  • Start the virtual machine and test its functio...read more

Add your answer

Q16. OSI layers and their functions

Ans.

OSI layers are a conceptual model that describes the communication functions of a network.

  • Layer 1 (Physical): Transmits raw data bits over a physical medium

  • Layer 2 (Data Link): Provides error-free transfer of data frames between nodes

  • Layer 3 (Network): Routes data packets between networks

  • Layer 4 (Transport): Provides reliable data transfer between end systems

  • Layer 5 (Session): Establishes, manages, and terminates sessions between applications

  • Layer 6 (Presentation): Formats da...read more

Add your answer

Q17. Deep dive through Mobile Device Management

Ans.

Mobile Device Management (MDM) is a system that allows organizations to manage and secure mobile devices used by employees.

  • MDM software enables remote management of devices, including configuration, security policies, and app distribution.

  • It helps ensure data security by enforcing encryption, passcode requirements, and remote wipe capabilities.

  • MDM solutions can also track device location, monitor usage, and provide insights for optimizing device performance.

  • Popular MDM vendor...read more

Add your answer

Q18. what are the day to day activities

Ans.

Day to day activities of a Technical Support Engineer involve troubleshooting technical issues, providing customer support, and documenting solutions.

  • Troubleshooting technical issues reported by customers

  • Providing customer support via phone, email, or chat

  • Documenting solutions and creating knowledge base articles

  • Collaborating with other teams to resolve complex issues

  • Testing software updates and patches before deployment

Add your answer

Q19. What do you know about DNS?

Ans.

DNS stands for Domain Name System, which translates domain names to IP addresses.

  • DNS is a decentralized system used to translate domain names to IP addresses

  • It helps users access websites using easy-to-remember domain names instead of complex IP addresses

  • DNS servers store records like A, CNAME, MX, and TXT to provide various types of information

  • DNS resolution process involves recursive and iterative queries to find the correct IP address

  • Common DNS providers include Google DNS...read more

Add your answer

Q20. What is Managed Identity

Ans.

Managed Identity is a feature in Azure Active Directory that provides an identity for applications to use when connecting to resources.

  • Managed Identity eliminates the need to store credentials in code or configuration files.

  • It allows applications to authenticate to Azure services without needing to manage credentials.

  • Managed Identity can be assigned to Azure resources like Virtual Machines, App Services, and Functions.

  • It simplifies the process of securely accessing Azure reso...read more

Add your answer

Q21. Whats is Autodiscover

Ans.

Autodiscover is a feature in Microsoft Exchange that automatically configures user settings for email clients.

  • Automatically configures user settings for email clients

  • Uses a user's email address to find the appropriate Exchange server settings

  • Helps users easily set up their email accounts on various devices

Add your answer

Q22. Free busy in outlook

Ans.

Free busy in Outlook refers to the availability status of a user's calendar for scheduling meetings.

  • Free busy information is used to check when a user is available for a meeting.

  • Outlook uses this information to show when a user is busy or free during specific time slots.

  • Users can set their availability status as busy, free, tentative, or out of office.

  • Free busy information is crucial for scheduling meetings efficiently.

Add your answer

More about working at Microsoft Corporation

Top Rated Internet/Product Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Evertz Microsystems

based on 8 interviews in the last 1 year
3 Interview rounds
Technical Round 1
Technical Round 2
Behavioral Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Technical Support Engineer Interview Questions from Similar Companies

4.1
 • 25 Interview Questions
3.6
 • 24 Interview Questions
3.9
 • 21 Interview Questions
3.7
 • 12 Interview Questions
4.1
 • 11 Interview Questions
4.8
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter