Miraj Group
10+ Ascendeum Interview Questions and Answers
Q1. Firewall security policy and implementation?
Firewall security policy involves defining rules for network traffic and implementing them to protect against unauthorized access.
Define a clear firewall security policy outlining what traffic is allowed and what is blocked
Implement the policy by configuring firewall rules based on the defined policy
Regularly review and update the firewall rules to adapt to changing security threats
Monitor firewall logs for any suspicious activity and investigate any potential security breach...read more
Q2. Availability according to company requirements?
Availability will be maintained as per company requirements through proper planning and monitoring.
Availability will be ensured through regular maintenance of IT systems and infrastructure.
Implementing redundancy and failover mechanisms to minimize downtime.
Monitoring system performance and addressing any issues promptly.
Establishing service level agreements (SLAs) with vendors and third-party providers.
Conducting regular backups and disaster recovery drills to mitigate risks...read more
Q3. What is the TDS & Income Tax Slab
TDS is a tax deducted at source while Income Tax Slab is the range of income on which tax is levied.
TDS is a tax deducted by the payer at the time of making payment to the payee.
It is applicable to various types of payments such as salary, interest, rent, commission, etc.
The rate of TDS varies depending on the type of payment and the income of the payee.
Income Tax Slab is the range of income on which tax is levied.
It is divided into different slabs based on the income level o...read more
Q4. Firewall configuration ?
Firewall configuration involves setting up rules to control incoming and outgoing network traffic.
Define the purpose of the firewall (e.g. protecting against unauthorized access)
Create rules to allow or block specific types of traffic based on IP addresses, ports, protocols, etc.
Regularly review and update firewall rules to ensure security
Consider implementing additional security measures like intrusion detection/prevention systems
Test the firewall configuration to ensure it ...read more
Q5. Vista server configuration?
Vista server configuration involves setting up and managing servers running on the Windows Vista operating system.
Ensure compatibility with Vista operating system
Install necessary server roles and features
Configure network settings and security options
Set up user accounts and permissions
Monitor server performance and troubleshoot issues
Q6. SQL server configuration?
SQL server configuration involves setting up database properties, security settings, and performance optimizations.
Configure database properties such as collation, recovery model, and compatibility level
Set up security settings including user permissions, roles, and encryption
Optimize performance by configuring indexes, query optimization, and memory allocation
Q7. SAP T Code & Process of Asset Management
SAP T Code & Process of Asset Management
SAP T Code for Asset Management is AS01, AS02, AS03, AS11, AS21, AS41, AS91
Asset Management process includes acquisition, depreciation, retirement, and disposal of assets
Assets are classified into different categories such as tangible, intangible, and financial assets
Asset accounting is integrated with other SAP modules such as FI, CO, and MM
Q8. Cheque lot insert in SAP
Cheque lot insert in SAP is a process of creating a batch of cheques for printing and processing.
Cheque lot insert is done in transaction code FCHI in SAP
It involves creating a batch of cheques with specific criteria such as bank account, payment method, and payment date
Once the batch is created, it can be printed and processed for payment
Cheque lot insert helps in streamlining the cheque printing and payment process
Q9. How to calculate Network subnet
Network subnet can be calculated using the subnet mask and IP address.
Determine the subnet mask of the network
Convert the subnet mask to binary
Perform a bitwise AND operation between the IP address and subnet mask to find the network address
Calculate the number of hosts in the subnet using the formula 2^(32 - subnet mask length) - 2
Identify the range of IP addresses in the subnet
Q10. How is behavior of company people.
Q11. How many type network .
There are mainly three types of networks: LAN, WAN, and MAN.
LAN (Local Area Network) - connects devices within a limited area like a home, office, or school.
WAN (Wide Area Network) - connects devices over a large geographical area, like different cities or countries.
MAN (Metropolitan Area Network) - covers a larger area than a LAN but smaller than a WAN, typically within a city.
Top HR Questions asked in Ascendeum
Interview Process at Ascendeum
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month