NTT Data Information Processing Services
300+ Interview Questions and Answers
Q101. What is bdc and how many type
BDC stands for Batch Data Communication. It is a method used in SAP ABAP to transfer data from external systems to SAP.
BDC is used to automate the process of data entry in SAP.
There are two types of BDC: Classic BDC and Call Transaction Method.
Classic BDC involves creating a batch input session and processing it using transaction codes.
Call Transaction Method uses the CALL TRANSACTION statement to directly process data without creating a session.
BDC is commonly used for tasks...read more
Q102. how will you install, support and manage platform
I will use a combination of automation tools and manual processes to install, support and manage the platform.
I will use automation tools like Ansible, Puppet or Chef to automate the installation process.
I will create documentation and provide training to support the platform.
I will monitor the platform using tools like Nagios or Zabbix to ensure it is running smoothly.
I will provide support to users and troubleshoot any issues that arise.
I will perform regular maintenance ta...read more
Q103. How to troubleshoot outlook issues?
To troubleshoot Outlook issues, check for connectivity, repair the application, and recreate the profile.
Check internet connectivity and server status
Repair the Outlook application using the built-in repair tool
Recreate the Outlook profile
Disable add-ins and antivirus software temporarily
Check for any recent updates or changes made to the system
Clear the Outlook cache
Check for any conflicting software or applications
Contact IT support if issue persists
Q104. Do you have experience in ESXI, Vsphere, Vcenter?
Yes, I have experience in ESXI, Vsphere, and Vcenter.
I have worked with ESXI to create and manage virtual machines.
I am familiar with Vsphere for virtualization management.
I have used Vcenter for centralized management of virtualized environments.
Q105. Three layers of skin
The three layers of skin are the epidermis, dermis, and subcutaneous tissue.
The epidermis is the outermost layer and provides a barrier to the environment.
The dermis contains blood vessels, nerves, and hair follicles.
The subcutaneous tissue is the deepest layer and contains fat and connective tissue.
Each layer has a specific function and works together to protect and regulate the body.
Examples of skin conditions that affect these layers include eczema, acne, and cellulitis.
Q106. Explain the technical part and Implementation project and Enchancements and abap core and tcode?
Technical aspects of SAP ABAP development including implementation projects, enhancements, ABAP core, and transaction codes.
Implementation projects involve customizing SAP systems to meet specific business requirements.
Enhancements are modifications made to standard SAP programs to add new functionality.
ABAP core refers to the basic programming language used in SAP development.
Transaction codes are shortcuts to access specific functions in SAP systems.
Example: Implementing a ...read more
Q107. How do you estimate user stories
User story estimation is done using relative sizing and team consensus.
Use story points to estimate complexity and effort
Relative sizing is used to compare user stories
Team consensus is important for accurate estimation
Estimation should be done by the entire team, including developers and stakeholders
Q108. What does backlog mean?
Backlog is a list of tasks or requirements that need to be completed in a project.
Backlog is a prioritized list of work items
It includes user stories, bugs, and technical tasks
It is constantly updated throughout the project
It helps the team to plan and track progress
Examples: JIRA, Trello, Asana
Q109. Explain booting process?
Booting process is the sequence of events that occur when a computer system is turned on.
BIOS/UEFI firmware initializes hardware components
Bootloader loads the kernel into memory
Kernel initializes system processes and drivers
Init system starts user space processes and services
Graphical user interface (GUI) is loaded for user interaction
Q110. When does Mixed DML Exception occurs?
Mixed DML Exception occurs when DML operations are performed on setup and non-setup objects in a single transaction.
Occurs when DML operations are performed on both setup and non-setup objects in a single transaction
Setup objects include User, Profile, PermissionSet, etc.
Non-setup objects include custom objects, standard objects like Account, Contact, etc.
Q111. How a new entrant can compete with dominant market leaders
A new entrant can compete with dominant market leaders by focusing on niche markets, offering unique value propositions, leveraging technology, and building strong relationships.
Identify and target niche markets where the dominant players may not be as strong
Offer unique value propositions that differentiate your product or service from competitors
Leverage technology to streamline operations, improve efficiency, and enhance customer experience
Build strong relationships with c...read more
Q112. What is router ? What are the type of routers?
Q113. What are the information in TCP IP Header?
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
Q114. What are strength and weakness?
Strengths are positive attributes that contribute to success, while weaknesses are areas that need improvement.
Strengths: leadership skills, attention to detail, problem-solving abilities
Weaknesses: public speaking, time management, delegation
Examples: Strength - ability to motivate team members; Weakness - tendency to procrastinate
Q115. What is Active Directory Federation Service
Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.
AD FS allows users to access multiple applications with a single set of credentials
It enables secure sharing of identity information between trusted partners
AD FS uses claims-based authentication to verify user identity
It supports integration with cloud-based services like Office 365
Q116. Project management life cycle What is admin account in AD What is OU
Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.
Admin account has full control over AD objects and can perform any action on them
OU is a container object used to organize and manage AD objects
OU can be used to delegate administrative control over specific objects to non-administrative users
Example: Sales OU can contain all user accounts and resources related to the sales departmen...read more
Q117. difference between link state and DV. STP. BGP.
Link state and DV are routing protocols, STP is for loop prevention, BGP is for inter-domain routing.
Link state protocols (e.g. OSPF) use Dijkstra's algorithm to calculate shortest path.
Distance vector protocols (e.g. RIP) use Bellman-Ford algorithm and exchange routing tables.
STP (Spanning Tree Protocol) prevents loops in Ethernet networks by blocking redundant paths.
BGP (Border Gateway Protocol) is used for inter-domain routing and is based on path vector algorithm.
Link sta...read more
Q118. what is use of routing and its uses?
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing helps in directing network traffic efficiently
It determines the best path for data packets to travel from source to destination
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information
Routing tables are used to store information about network paths
Dynamic routing adjusts to network changes automatically
Q119. Which programs are managed by you
I manage multiple programs including X, Y, and Z.
Program X focuses on improving customer experience through new product development.
Program Y is aimed at reducing operational costs by streamlining processes.
Program Z involves implementing a new software system to enhance data analysis capabilities.
Q120. difference between systemd and services?
systemd is a system and service manager while services are individual programs that run in the background.
systemd is responsible for managing the system's startup and shutdown processes
services are individual programs that run in the background and can be managed by systemd
systemd can start, stop, restart, enable, and disable services
services can be configured to start automatically at boot time using systemd
systemd provides better logging and error reporting for services com...read more
Q121. What is Border Gateway Protocol
Border Gateway Protocol (BGP) is a routing protocol used to exchange routing information between different autonomous systems (AS) on the internet.
BGP is an exterior gateway protocol used for inter-domain routing.
It allows routers in different autonomous systems to exchange information about the best paths for routing traffic.
BGP uses a path vector algorithm to determine the best path for routing.
It is commonly used by internet service providers (ISPs) to connect their networ...read more
Q122. What is ip address , different types of ip
An IP address is a unique identifier assigned to devices on a network. There are two types of IP addresses: IPv4 and IPv6.
IP stands for Internet Protocol
IPv4 addresses are 32-bit and expressed in dotted decimal notation (e.g. 192.168.0.1)
IPv6 addresses are 128-bit and expressed in hexadecimal notation (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Private IP addresses are used within a local network and are not accessible from the internet
Public IP addresses are assigned by an...read more
Q123. How do we use Conditional Access in Azure
Conditional Access in Azure is used to control access to resources based on specific conditions.
Conditional Access policies can be set up to require multi-factor authentication for certain users or devices
It can restrict access based on location, device compliance, or other factors
Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data
Q124. What is the North Bridge ans South Bridge
The North Bridge and South Bridge are components of a computer's motherboard responsible for connecting the CPU, RAM, and other high-speed components.
North Bridge connects the CPU, RAM, and high-speed components directly
South Bridge connects the slower peripheral devices like USB, SATA, and audio controllers
North Bridge and South Bridge work together to facilitate communication between the CPU and other components
Example: In older computers, the North Bridge and South Bridge ...read more
Q125. What are backups? what are ports?
Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.
Backups are essential for data recovery in case of disasters or system failures
Ports are identified by numbers and are used to establish connections between devices
Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.
Q126. How do we configure FAILOVER via static Route?
Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.
Create multiple static routes with different next-hop IP addresses
Assign different administrative distances to each static route
Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails
Q127. What is a HashMap?
HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.
HashMap is part of the Java Collections Framework.
It uses hashing to store and retrieve elements.
It allows null values and null keys.
It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.
Example: HashMap
map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2
Q128. how will you do capacity planning
Capacity planning involves estimating future resource needs based on current and projected usage.
Analyze current usage patterns and trends
Forecast future demand based on growth projections
Consider potential changes in technology or business needs
Identify potential bottlenecks and plan for scalability
Regularly review and adjust plans as needed
Q129. Ajy improvements that u worked for response optimisation
Implemented caching and compression techniques to reduce response time.
Used Memcached to cache frequently accessed data.
Enabled Gzip compression to reduce response size.
Optimized database queries to reduce response time.
Used CDN to serve static content.
Implemented lazy loading of resources to reduce initial load time.
Q130. Network call flows and interfaces in 2G,3G4G and IMS
Understanding network call flows and interfaces is crucial for testing 2G, 3G, 4G, and IMS technologies.
2G call flow involves circuit-switched technology and uses GSM architecture
3G call flow involves packet-switched technology and uses UMTS architecture
4G call flow involves all-IP technology and uses LTE architecture
IMS call flow involves VoIP technology and uses SIP protocol
Interfaces include RAN, Core Network, and IMS
Testing involves verifying call setup, handovers, and da...read more
Q131. Why we use angular? Limitations
Angular is a popular front-end framework for building dynamic web applications.
Angular provides a powerful set of tools for building complex user interfaces
It uses a component-based architecture for organizing code
It offers two-way data binding and dependency injection for efficient development
Limitations include a steep learning curve and potential performance issues with large applications
Q132. Which tools do you use to administer Hana db
I use SAP HANA Studio, SAP HANA Cockpit, and SAP HANA Database Explorer to administer Hana db.
SAP HANA Studio is a tool used for administration, development, and monitoring of Hana databases.
SAP HANA Cockpit provides a web-based interface for monitoring and managing Hana systems.
SAP HANA Database Explorer is a tool for exploring and querying Hana databases.
SQL Console can also be used for executing SQL queries directly on the Hana database.
Q133. -Expert mode in PFCG?
Expert mode in PFCG allows advanced customization of authorization roles.
Expert mode provides access to additional tabs and fields for fine-tuning roles.
It allows for more complex authorization logic and the ability to add custom fields.
Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.
Examples of advanced customization include restricting access to specific transactions or fields within transactions.
Q134. What are the bgp state's?
BGP states are the different stages a BGP session goes through during establishment and maintenance.
BGP Idle state
BGP Connect state
BGP Active state
BGP OpenSent state
BGP OpenConfirm state
BGP Established state
Q135. What are the structure of O365 and it’s function
O365 is a cloud-based subscription service that provides access to various Microsoft applications and services.
O365 includes applications such as Outlook, Word, Excel, PowerPoint, and OneNote.
It also includes cloud services such as OneDrive, SharePoint, Teams, and Yammer.
The structure of O365 is based on a subscription model, where users pay a monthly or yearly fee to access the applications and services.
O365 allows for collaboration and communication among users, with featur...read more
Q136. roles and responsibilities ,how to reslove the laptop issues
Q137. Sorting program without using any in built functions
Implement a sorting program without using any built-in functions
Iterate through the array and compare each element with the rest to sort
Use a sorting algorithm like bubble sort, selection sort, or insertion sort
Implement the sorting logic using loops and conditional statements
Q138. How you handle if worker node fail
We ensure high availability by configuring multiple worker nodes and using load balancers.
Configure multiple worker nodes to distribute the load and ensure redundancy.
Use load balancers to distribute the traffic among the available worker nodes.
Monitor the worker nodes for any failures and take appropriate actions to replace or repair them.
Ensure that the Tableau Server is configured to automatically recover from worker node failures.
Perform regular backups to ensure that dat...read more
Q139. How to debug smartform
To debug a smartform, use transaction SMARTFORMS and set breakpoints in the code.
Open transaction SMARTFORMS
Select the smartform to be debugged
Click on the 'Debugging' button
Set breakpoints in the code
Execute the smartform and the debugger will stop at the breakpoints
Q140. What are pointers in java language?
Pointers in Java are variables that store memory addresses of other variables or objects.
Pointers in Java are not directly supported like in languages such as C or C++.
Instead, Java uses references to objects, which act like pointers but with restrictions.
Example: String str = new String("Hello"); // str is a reference to the String object
Q141. How do express your idea or point of view?
I express my ideas clearly and confidently through effective communication skills.
I use clear and concise language to convey my thoughts
I provide examples or evidence to support my point of view
I actively listen to others' perspectives and incorporate feedback into my ideas
Q142. Different types of joins in SQL.
Different types of joins in SQL include inner join, outer join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Outer join: Returns all rows when there is a match in one of the tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match in one of the tabl...read more
Q143. Advantages of Agile Methodology
Agile methodology allows for flexibility, collaboration, and faster delivery of high-quality software.
Encourages customer involvement and feedback throughout the development process
Allows for changes and adjustments to be made quickly and efficiently
Promotes teamwork and communication among team members
Delivers working software in shorter timeframes
Reduces the risk of project failure
Increases customer satisfaction
Examples: Scrum, Kanban, Extreme Programming (XP)
Q144. Explain the Defect Life Cycle and its Categories?
Defect Life Cycle is a process followed by testers to identify, report, and resolve defects in software.
Defect is identified and reported by tester
Defect is reviewed by development team
Defect is assigned to a developer for fixing
Defect is fixed by developer
Defect is retested by tester
Defect is closed if it passes retest, else reopened
Categories include New, Open, In Progress, Fixed, Reopened, Closed
Q145. What is difference between a budget and forecast
Budget is a financial plan for a specific period, while forecast is a prediction of future financial outcomes.
Budget is a detailed financial plan that outlines expected revenues and expenses for a specific period, usually a year.
Forecast is a prediction of future financial outcomes based on past data and trends.
Budgets are typically set at the beginning of a fiscal year and are used as a benchmark to measure actual performance against.
Forecasts are updated regularly to reflec...read more
Q146. Difference between Nortons current and load current?
Norton's current is the current flowing through a short circuit while load current is the current flowing through a load connected to the circuit.
Norton's current is the current that would flow through a short circuit connected across the output terminals of a circuit.
Load current is the current that flows through the load connected to the circuit, such as a resistor or a device.
Norton's current is independent of the load connected to the circuit, while load current depends o...read more
Q147. How you will write the test scenario for elevator
Test scenarios for an elevator to ensure proper functionality and safety
Test the elevator buttons for all floors
Test emergency stop button functionality
Test door opening and closing mechanism
Test elevator capacity by loading it with maximum weight limit
Test response time for elevator arrival at different floors
Q148. kubernetes pod creation teplicatset events in kubernetes ingress controller
Kubernetes pod creation and replicaset events in Kubernetes Ingress controller.
Pod creation involves defining a pod specification in a YAML file and using 'kubectl create' command to create the pod.
Replicaset events can be monitored using 'kubectl describe replicaset' command to check for events related to the replicaset.
Ingress controller manages external access to services in a Kubernetes cluster by routing traffic based on rules defined in the Ingress resource.
Events relat...read more
Q149. Expalin what is ABAP dictionary Events in ALV report Have you worked on oops abp
ABAP Dictionary is a central repository for data definitions used in SAP applications. ALV report events are user actions in ALV grid. OOPs ABAP is object-oriented programming in ABAP.
ABAP Dictionary is used to define and manage data definitions in SAP applications
ALV report events include user actions like clicking on a row or column header
OOPs ABAP allows for object-oriented programming concepts like classes and inheritance
Q150. How you approach a busy stakeholder?
Approach with clear communication, understanding their priorities, and offering solutions.
Schedule a meeting at a convenient time for the stakeholder
Clearly communicate the purpose of the meeting and the desired outcomes
Listen actively to understand their priorities and challenges
Offer solutions that align with their goals and address their concerns
Follow up with any additional information or support they may need
Q151. how to approach rdp connection during analysis
Approach RDP connection during analysis by examining logs, network traffic, and user activity.
Review RDP logs for any suspicious activity or unauthorized access.
Analyze network traffic for any anomalies or unusual patterns related to RDP connections.
Monitor user activity to identify any unauthorized or suspicious RDP sessions.
Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.
Look for failed login attempts, unusual login times, or multiple simulta...read more
Q152. What to do you understand by procurement
Q153. What is Domain Name System
DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other.
DNS stands for Domain Name System
It is responsible for translating domain names into IP addresses
DNS allows computers to communicate with each other over the internet
DNS uses a hierarchical system of domain names, with the top-level domains being .com, .org, .net, etc.
DNS servers store information about domain names and their corresponding IP addresses
Q154. What are technologies you have worked so far
I have worked with a variety of technologies including Java, Python, SQL, AWS, and Docker.
Proficient in Java and Python programming languages
Experience with SQL databases and data modeling
Familiarity with AWS cloud services and infrastructure
Knowledge of containerization using Docker
Experience with version control using Git
Q155. What is Normalisation?
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves dividing larger tables into smaller ones and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.
Normalization can improve database performance and make it easier to maintain.
Example: A custom...read more
Q156. What is polimorphism?
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have multiple subclasses like circle, square, etc. and all can be treated as shapes.
Example: A method can take an object of a parent class as a parameter and it can accept any of its child classes.
Q157. What is App ID in Palo Alto Firewalls?
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular control over application usage within the network.
Examples...read more
Q158. Diff b/w Virtual and new keyword?
Virtual keyword is used for method overriding while new keyword is used for hiding base class member.
Virtual keyword is used to allow a derived class to override a method in the base class.
New keyword is used to hide a base class member in the derived class.
Virtual keyword is used with the base class method while new keyword is used with the derived class method.
Virtual keyword is used for runtime polymorphism while new keyword is used for compile-time polymorphism.
Q159. What is User Acceptance Testing?
User Acceptance Testing (UAT) is the final phase of testing where end-users test the software to ensure it meets their requirements.
UAT is performed by end-users or business representatives
It is done in a real-world environment
The focus is on validating the software's functionality and usability
UAT is conducted after all other testing phases are completed
Defects found during UAT are reported and fixed before the software is released
Q160. What is modifier
A modifier is a two-digit code added to a CPT or HCPCS code to provide additional information about a service or procedure.
Modifiers are used to indicate that a service or procedure has been altered in some way but not changed in its definition
Modifiers can affect reimbursement rates and are used to indicate that multiple procedures were performed during a single session
Examples of modifiers include -22 (increased procedural services) and -59 (distinct procedural service)
Modi...read more
Q161. Define firewall generations and their roles
Firewall generations refer to the evolution of firewall technology and their roles in network security.
First generation firewalls - packet filtering based on IP addresses and ports
Second generation firewalls - stateful inspection and improved security features
Third generation firewalls - application layer filtering and deep packet inspection
Fourth generation firewalls - next-generation firewalls with advanced threat protection capabilities
Each generation builds upon the previ...read more
Q162. Define one body system like urinary, digestive
The respiratory system is responsible for breathing and gas exchange.
Includes organs such as the lungs, trachea, and bronchi
Works to bring oxygen into the body and remove carbon dioxide
Can be affected by diseases such as asthma and pneumonia
Q163. What do you understand by procurement
Q164. Validation of data between source and target
Validation of data between source and target is a crucial step in ETL process.
Compare the data types and formats of source and target data
Check for missing or extra data in target
Verify data transformation rules are applied correctly
Perform data profiling to identify anomalies
Use checksums or hash values to ensure data integrity
Q165. What are screen Reader modes
Screen Reader modes are different ways in which a screen reader can read and interpret content on a webpage.
Screen Reader modes can include reading the entire page, reading only headings or links, or reading specific sections of the page.
Screen Reader modes can also include different levels of verbosity, such as reading only the most important information or providing detailed descriptions of all content.
Examples of screen reader modes include NVDA's browse mode, JAWS' virtua...read more
Q166. How will you Schedule Jobs using TWS in Mainframe
Scheduling jobs using TWS in Mainframe involves creating job definitions, specifying dependencies, setting up schedules, and monitoring job execution.
Create job definitions with specific parameters and requirements
Specify job dependencies to ensure proper sequencing
Set up schedules for job execution based on time, frequency, or event triggers
Monitor job execution and troubleshoot any issues that arise
Q167. what is network
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.
Networks can be wired or wireless
They can be local (LAN), wide (WAN), or global (Internet)
Networks use protocols like TCP/IP to communicate
Examples include Ethernet, Wi-Fi, and cellular networks
Q168. what is the difference lookup ,join ,merge
Lookup is used to search for a specific value in a dataset, join is used to combine two datasets based on a common key, and merge is used to combine datasets based on common columns.
Lookup is used to find a specific value in a dataset
Join is used to combine two datasets based on a common key
Merge is used to combine datasets based on common columns
Example: Lookup - searching for a customer's email address in a customer dataset
Example: Join - combining sales data with customer ...read more
Q169. Tell me something about windows!?
Q170. What OSPF and its state and LSAs
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to each network.
OSPF routers exchange Link State Advertisements (LSAs) to build a topology database.
There are several types of LSAs, including Router LSAs, Network LSAs, Summary LSAs, and AS External LSAs.
OSPF routers maintain neighbor relationships and exchange H...read more
Q171. What is method hiding?
Method hiding is a technique in object-oriented programming where a subclass provides a method with the same name as a method in its superclass.
Method hiding is also known as static polymorphism or compile-time polymorphism.
It allows a subclass to provide its own implementation of a method without affecting the superclass's implementation.
The method in the subclass must have the same name and signature as the method in the superclass.
Method hiding is achieved by using the 'ne...read more
Q172. Difference between Problem and Incident
Problem is the underlying cause of one or more incidents, while an incident is an event that disrupts normal service operation.
A problem is a root cause of one or more incidents, while an incident is a disruption of normal service operation.
Problems are identified through multiple incidents, while incidents are reported as soon as they occur.
Problems require investigation and resolution, while incidents require immediate action to restore service.
Examples of problems include ...read more
Q173. Why bgp used, state, LP and weight, med
BGP is used for routing between autonomous systems. LP and weight are used for path selection. MED is used for path advertisement.
BGP is used for inter-domain routing between autonomous systems.
LP (Local Preference) is used to select the preferred path among multiple paths within the same AS.
Weight is a Cisco proprietary parameter used to select the preferred path among multiple paths within the same AS.
MED (Multi-Exit Discriminator) is used to influence the path selection in...read more
Q174. What is test NG annotation, Can you define priority 0
TestNG annotation is used in TestNG framework to provide additional information about test methods or classes.
TestNG annotations are used to control the execution flow of test methods.
They can be used to set the priority of test methods, define dependencies, configure test groups, etc.
Examples of TestNG annotations include @Test, @BeforeMethod, @AfterMethod, @DataProvider, etc.
Q175. What is IPS? How does it work?
IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.
IPS is a network security technology that monitors network traffic in real-time.
It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.
IPS works by analyzing network packets, comparing them to a database of known threats, and taking action to block or allow t...read more
Q176. How do you start a program
Starting a program involves defining goals, assembling a team, creating a plan, and securing resources.
Define program goals and objectives
Assemble a team with the necessary skills and expertise
Create a detailed program plan with timelines and milestones
Secure necessary resources, including funding and equipment
Establish communication channels and reporting mechanisms
Monitor progress and adjust plans as necessary
Q177. What is Blue Screen of Death?
Blue Screen of Death is a Windows operating system error screen that appears when the system encounters a critical error.
Occurs when Windows encounters a critical system error and cannot recover
Displays a blue screen with error message and code
Often requires a system restart to resolve
Can be caused by hardware or software issues
Q178. What do you know about VPN?
A VPN, or Virtual Private Network, is a secure network connection that allows users to access the internet privately and securely.
VPN encrypts data to ensure privacy and security
It allows users to access restricted websites or content
Commonly used for remote work or accessing company networks
Examples include NordVPN, ExpressVPN, and Cisco AnyConnect
Q179. Networking and difference between UDP AND TCP
UDP and TCP are protocols used in networking. UDP is faster but less reliable, while TCP is slower but more reliable.
UDP stands for User Datagram Protocol and is connectionless
TCP stands for Transmission Control Protocol and is connection-oriented
UDP is faster because it doesn't establish a connection before sending data
TCP is more reliable because it ensures all data is received and in the correct order
UDP is used for applications where speed is more important than reliabili...read more
Q180. Spark internal working and optimization techniques
Spark internal working and optimization techniques
Spark uses Directed Acyclic Graph (DAG) for optimizing workflows
Lazy evaluation helps in optimizing transformations by combining them into a single stage
Caching and persistence of intermediate results can improve performance
Partitioning data can help in parallel processing and reducing shuffle operations
Q181. What is material requirements planning
Material Requirements Planning (MRP) is a production planning and inventory control system.
MRP helps in determining the quantity and timing of raw materials, components, and subassemblies needed to manufacture a product.
It ensures that the right materials are available at the right time to meet production demand.
MRP takes into account factors such as lead times, inventory levels, and production schedules to calculate material requirements.
It helps in reducing inventory costs ...read more
Q182. What is the complex integration you did?
I led a complex integration project between two large financial institutions to streamline their data sharing processes.
Designed a custom API to facilitate real-time data exchange between the systems
Implemented data mapping and transformation logic to ensure compatibility between the different data formats
Worked closely with both technical teams to troubleshoot and resolve integration issues
Developed a comprehensive testing plan to validate the integration and ensure data acc...read more
Q183. What are account type s on fico?
Account types in FICO include asset accounts, liability accounts, equity accounts, revenue accounts, and expense accounts.
Asset accounts represent resources owned by the company, such as cash, inventory, and equipment.
Liability accounts represent obligations owed by the company, such as loans and accounts payable.
Equity accounts represent the owner's stake in the company.
Revenue accounts track income generated by the company, such as sales revenue.
Expense accounts track costs...read more
Q184. Tell some features of Java 8
Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions allow for functional programming and simplify code.
Streams provide a way to process collections of data in a parallel and efficient manner.
Default methods allow for adding new methods to interfaces without breaking existing implementations.
Date and Time API provides a more comprehensive and flexible way to handle date and time.
Nashorn JavaScript engine allows f...read more
Q185. Explain SLA management how to do it
SLA management involves setting, monitoring, and meeting service level agreements with customers.
Define clear and measurable SLA metrics with customers
Monitor performance against SLA targets regularly
Implement processes to address SLA breaches
Communicate effectively with customers about SLA status
Use SLA management tools to track and report on performance
Review and update SLAs periodically based on feedback and performance
Q186. Quick troubleshooting for admins like SCCM, AD and Azure
Quick troubleshooting tips for SCCM, AD, and Azure
Check event logs for errors or warnings
Verify network connectivity
Restart services related to the issue
Check permissions and group memberships
Review SCCM logs for client issues
Use Azure Resource Health for Azure service status
Check AD replication status
Q187. difference between ram and rom
RAM is volatile memory used for temporary storage, while ROM is non-volatile memory used for permanent storage.
RAM stands for Random Access Memory, used for temporary storage of data and program instructions
ROM stands for Read-Only Memory, used for permanent storage of data and program instructions
RAM is volatile, meaning data is lost when power is turned off
ROM is non-volatile, meaning data is retained even when power is turned off
Q188. Explain about VLAN and how it works?
VLAN is a virtual LAN that separates network traffic based on logical grouping, improving network security and performance.
VLANs divide a physical network into multiple logical networks, allowing for better traffic management.
Devices within the same VLAN can communicate directly with each other, while devices in different VLANs require a router to communicate.
VLANs can be configured based on port, MAC address, or protocol.
Example: VLAN 10 for finance department, VLAN 20 for m...read more
Q189. What actions I have used fromDWPC
I have used actions from DWPC to integrate systems and streamline processes.
Implemented data mapping and transformation using DWPC
Automated data transfer between different systems
Configured workflows to trigger actions based on specific events
Monitored system integrations for errors and performance issues
Q190. What is CUCM, CUC, Regarding Networking.
CUCM and CUC are networking technologies used for communication and collaboration.
CUCM stands for Cisco Unified Communications Manager and is a call processing software used for IP telephony.
CUC stands for Cisco Unity Connection and is a voicemail and unified messaging platform.
Both technologies are used for communication and collaboration in a networked environment.
They are commonly used in enterprise environments for managing and routing calls and messages.
CUCM and CUC are ...read more
Q191. Explain about Table B components in MDM scoresheet?
Q192. Do you know excel microsoft
Yes, I know Excel Microsoft.
I am proficient in using Excel for data analysis and reporting.
I have experience in creating pivot tables, charts, and graphs.
I am familiar with advanced functions such as VLOOKUP, IF, and SUMIF.
I have used Excel for budgeting, forecasting, and project management.
I am comfortable working with large datasets and can manipulate data using filters and sorting.
Q193. What is entry criteria & exit criteria
Entry criteria and exit criteria are conditions that must be met before and after testing, respectively.
Entry criteria are the conditions that must be fulfilled before testing can begin
Exit criteria are the conditions that must be fulfilled before testing can be considered complete
Entry criteria can include having test data ready, test environment set up, and test cases prepared
Exit criteria can include all test cases executed, all defects fixed, and test reports generated
Q194. Explanation (to customer) for missed SLA
The explanation should include the reason for the delay and steps taken to prevent it in the future.
Acknowledge the missed SLA and apologize for the inconvenience caused to the customer.
Explain the reason for the delay, whether it was due to unforeseen circumstances or internal issues.
Provide assurance that steps have been taken to prevent such delays in the future.
Offer a solution or compensation to the customer if possible.
Thank the customer for their patience and understan...read more
Q195. how to deal with s/w shortcommings
Addressing software shortcomings involves identifying the issues, prioritizing them, creating a plan for improvement, and implementing solutions.
Identify the specific shortcomings in the software
Prioritize the issues based on impact and urgency
Create a plan for addressing each shortcoming, including assigning tasks and setting deadlines
Implement solutions, which may involve coding changes, testing, and deployment
Monitor the effectiveness of the solutions and make adjustments ...read more
Q196. Firewall works at what layer?
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters and controls incoming and outgoing network traffic based on predetermined security rules.
Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.
Q197. What are production management?
Production management involves planning, organizing, directing, and controlling the production process to ensure efficient and effective operations.
Planning and scheduling production activities
Managing resources such as labor, materials, and equipment
Ensuring quality control and meeting production targets
Implementing and improving production processes
Managing budgets and costs
Coordinating with other departments such as sales and marketing
Ensuring compliance with safety and en...read more
Q198. What is Virtual Private Network?
A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a public network, allowing users to access private networks remotely.
Encrypts data to ensure privacy and security
Allows users to access private networks remotely
Masks IP address to maintain anonymity
Commonly used for remote work, accessing geo-blocked content, and enhancing online security
Examples: NordVPN, ExpressVPN, Cisco AnyConnect
Q199. Where is the headquarters of NTT located
NTT's headquarters is located in Tokyo, Japan.
NTT's headquarters is in Tokyo, Japan
NTT stands for Nippon Telegraph and Telephone Corporation
Tokyo is the capital city of Japan
Q200. What is meant by bpo?
BPO stands for Business Process Outsourcing. It refers to the practice of contracting specific business processes to a third-party service provider.
BPO involves outsourcing non-core business functions to external vendors.
It helps companies reduce costs, improve efficiency, and focus on their core competencies.
Examples of BPO services include customer support, data entry, payroll processing, and IT support.
BPO can be onshore (within the same country), nearshore (in neighboring...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month