Nexpro Systems
Hamleys Interview Questions and Answers
Q1. How will you catagorize tickets priority?
Tickets priority can be categorized based on impact and urgency.
Impact refers to the extent of damage or disruption caused by the issue.
Urgency refers to the time frame within which the issue needs to be resolved.
Priority levels can be high, medium, or low based on the combination of impact and urgency.
For example, a critical system outage would have high impact and high urgency, while a minor bug would have low impact and low urgency.
Q2. What do you know about OSI model?
OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with adjacent layers.
Example: HTTP operates at the Application layer, while TCP operates at the Transport layer.
The model helps in troubleshooting network issues and developing network protocols.
Q3. What do you understand by Ticketing?
Ticketing is a process of logging, tracking, and resolving customer issues or requests.
Ticketing systems are used to manage customer support requests.
Each request is assigned a unique ticket number for tracking purposes.
Tickets can be prioritized based on severity and assigned to appropriate teams or individuals.
Ticketing systems allow for communication between customers and support teams.
Examples of ticketing systems include Zendesk, JIRA, and Freshdesk.
Q4. What do you understand by Networks?
Networks refer to the interconnection of devices and systems to facilitate communication and data exchange.
Networks allow devices to communicate and share resources
They can be wired or wireless
Examples include LAN, WAN, and the internet
Networks can be secured using firewalls and other security measures
Q5. What is DNS, how does it work?
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is like a phonebook for the internet
It maps domain names to IP addresses
DNS servers store this information and respond to requests for domain name resolution
DNS uses a hierarchical structure with top-level domains like .com, .org, .net, etc.
DNS resolution can be recursive or iterative
DNS caching helps to speed up the resolution process
Q6. What is SLA? and TAT?
SLA stands for Service Level Agreement and TAT stands for Turnaround Time.
SLA is a contract between a service provider and a customer that outlines the level of service expected.
TAT is the amount of time it takes to complete a task or resolve an issue.
Both SLA and TAT are important metrics in measuring the quality of service provided.
For example, an SLA may guarantee a response time of 24 hours and a TAT of 48 hours for a particular issue.
Meeting or exceeding SLA and TAT expe...read more
Q7. Comparison between OSI and TCP/IP Model.
OSI and TCP/IP models are both used to describe how data is transmitted over a network.
OSI has 7 layers while TCP/IP has 4 layers
OSI is a theoretical model while TCP/IP is a practical model
OSI is a top-down approach while TCP/IP is a bottom-up approach
OSI is more complex and comprehensive than TCP/IP
TCP/IP is the most widely used model in practice
Q8. What is Active Directory?
Active Directory is a Microsoft service that manages network resources and user accounts.
It provides centralized authentication and authorization for Windows-based computers.
It allows administrators to manage users, computers, and other network resources from a single location.
It uses a hierarchical structure of domains, trees, and forests to organize network resources.
It supports group policies, which allow administrators to enforce security settings and other configurations...read more
Q9. What is Group Policy?
Group Policy is a feature in Windows that allows administrators to manage user and computer settings centrally.
Group Policy is used to enforce security policies, software installation policies, and other settings across a network.
It can be used to restrict access to certain features or applications, set password policies, and configure network settings.
Group Policy settings are stored in Group Policy Objects (GPOs) which can be linked to domains, sites, or organizational unit...read more
Reviews
Interviews
Salaries
Users/Month