NetConnectGlobal
10+ C.P. Bangladesh Co. Interview Questions and Answers
Q1. Types of backup, file sharing permission
Types of backup include full, incremental, and differential. File sharing permissions include read, write, and execute.
Full backup: backs up all data
Incremental backup: backs up only changes since last backup
Differential backup: backs up changes since last full backup
File sharing permissions: read allows viewing of files, write allows editing of files, execute allows running of files
Q2. What is ITIL, ITSM, AD, ZONING IN STORAGE? What is vmotion?
ITIL is a framework for IT service management. ITSM is the process of managing IT services. AD is Active Directory. Zoning is a storage networking technique. vmotion is a feature of VMware.
ITIL - best practices for IT service management
ITSM - managing IT services to meet business needs
AD - Microsoft's directory service for Windows domain networks
Zoning - partitioning storage networks to improve performance and security
vmotion - live migration of virtual machines between hosts...read more
Q3. Linux booting process
The Linux booting process involves several stages including BIOS, bootloader, kernel initialization, and user space initialization.
BIOS (Basic Input/Output System) performs hardware initialization and loads bootloader
Bootloader (GRUB, LILO) loads the Linux kernel into memory
Kernel initializes devices, mounts the root filesystem, and starts user space processes
User space initialization involves starting system services and launching the login prompt
Q4. File system difference
File systems are methods used by operating systems to store, retrieve, and organize files on a storage device.
File systems determine how data is stored and accessed on a storage device.
Examples of file systems include ext4, NTFS, FAT32, and HFS+.
Each file system has its own features, limitations, and compatibility with different operating systems.
File systems can impact performance, security, and data integrity.
Q5. What is your short rearm and long term goal
My short term goal is to gain more experience in Hadoop administration. My long term goal is to become a lead Hadoop administrator.
Short term goal: Gain more experience in Hadoop administration
Long term goal: Become a lead Hadoop administrator
Examples: Work on complex Hadoop projects, learn new Hadoop tools and technologies, mentor junior Hadoop administrators
Q6. What is HA AND FT? WHAT IS CLONE AND TRMPLATE?
HA and FT are high availability and fault tolerance technologies used in computing. Clone and template are methods of creating virtual machines.
HA ensures that a system is always available by using redundant components and failover mechanisms.
FT ensures that a system can continue to function even if a component fails by using real-time replication of data and processes.
Clone creates an exact copy of a virtual machine, including its configuration and data.
Template is a pre-con...read more
Q7. Oops concepts Difference between abstraction, encapsulation and interface
Abstraction focuses on hiding the implementation details, encapsulation bundles data and methods together, and interfaces define a contract for classes to implement.
Abstraction: Hides the implementation details and only shows the necessary features. Example: Car class with start() and stop() methods without showing the internal engine workings.
Encapsulation: Bundles data and methods together within a class, preventing direct access from outside. Example: Private variables wit...read more
Q8. Do you able to raise ticket?
Yes, I am able to raise tickets for any security-related issues.
I have experience using ticketing systems such as JIRA and ServiceNow.
I am familiar with the process of creating and tracking tickets from start to resolution.
I understand the importance of accurately documenting security incidents and vulnerabilities.
For example, in my previous role, I raised a ticket for a phishing email that was sent to multiple employees, and worked with the incident response team to investig...read more
Q9. Difference between layer 2&layer2 switching.
Layer 2 is the data link layer of OSI model, while layer 2 switching is a process of forwarding data packets between network segments.
Layer 2 is responsible for framing, error checking, and flow control.
Layer 2 switching is faster than layer 3 switching as it operates at the data link layer.
Layer 2 switches use MAC addresses to forward data packets within a network segment.
Layer 2 switching is used in LANs to improve network performance and reduce congestion.
Examples of layer...read more
Q10. What is Active Directory?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows administrators to control access and permissions
Facilitates single sign-on for users across multiple applications
Supports group policies for managing security settings
Q11. Difference between problem and incident
Problem is the root cause of one or more incidents, while incident is an unplanned interruption to an IT service.
Problem is the underlying cause of one or more incidents, while incident is the actual event that disrupts the service.
Problems are identified through root cause analysis, while incidents are reported by users or detected by monitoring tools.
Problems require investigation and resolution to prevent future incidents, while incidents require immediate response and res...read more
Q12. What is DNS? EXPLAIN
DNS stands for Domain Name System. It translates domain names to IP addresses to locate resources on the internet.
DNS is like a phone book for the internet, translating domain names to IP addresses.
It helps users access websites by translating human-readable domain names (e.g. www.google.com) to machine-readable IP addresses (e.g. 172.217.3.206).
DNS servers store records that map domain names to IP addresses, allowing computers to locate resources on the internet.
DNS also hel...read more
Q13. What is domain?
A domain is a group of networked computers that share a common set of rules for communication.
A domain is a logical grouping of networked computers that share a centralized database of user accounts and security policies.
Domains are typically used in business environments to centralize management of resources and security.
Examples of domain systems include Microsoft Active Directory and Novell NetWare.
Q14. Configuration files in Hadoop
Configuration files in Hadoop
Hadoop uses XML-based configuration files
The main configuration file is core-site.xml
Other important configuration files are hdfs-site.xml, yarn-site.xml, and mapred-site.xml
Configuration files can be edited manually or through Hadoop's web UI
Changes to configuration files require a restart of the affected Hadoop services
Q15. Drawbacks of ATF
ATF can be time-consuming to set up and maintain, may not cover all testing scenarios, and can be complex for beginners.
Time-consuming to set up and maintain
May not cover all testing scenarios
Complex for beginners
Top HR Questions asked in C.P. Bangladesh Co.
Interview Process at C.P. Bangladesh Co.
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month