NTT Data
300+ M.V.Associates Interview Questions and Answers
Q101. What is router ? What are the type of routers?
Q102. How a new entrant can compete with dominant market leaders
A new entrant can compete with dominant market leaders by focusing on niche markets, offering unique value propositions, leveraging technology, and building strong relationships.
Identify and target niche markets where the dominant players may not be as strong
Offer unique value propositions that differentiate your product or service from competitors
Leverage technology to streamline operations, improve efficiency, and enhance customer experience
Build strong relationships with c...read more
Q103. How does data packets move in a personal network environment
Data packets move in a personal network environment through a series of steps involving routing, addressing, and transmission.
Data packets are created at the source device and are broken down into smaller chunks for transmission.
Each packet is assigned a destination address, which helps routers determine the best path for delivery.
Routers along the network route the packets based on the destination address, ensuring they reach the intended recipient.
Packets may take different...read more
Q104. What are the information in TCP IP Header?
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
Q105. What is Active Directory Federation Service
Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.
AD FS allows users to access multiple applications with a single set of credentials
It enables secure sharing of identity information between trusted partners
AD FS uses claims-based authentication to verify user identity
It supports integration with cloud-based services like Office 365
Q106. Which programs are managed by you
I manage multiple programs including X, Y, and Z.
Program X focuses on improving customer experience through new product development.
Program Y is aimed at reducing operational costs by streamlining processes.
Program Z involves implementing a new software system to enhance data analysis capabilities.
Q107. difference between link state and DV. STP. BGP.
Link state and DV are routing protocols, STP is for loop prevention, BGP is for inter-domain routing.
Link state protocols (e.g. OSPF) use Dijkstra's algorithm to calculate shortest path.
Distance vector protocols (e.g. RIP) use Bellman-Ford algorithm and exchange routing tables.
STP (Spanning Tree Protocol) prevents loops in Ethernet networks by blocking redundant paths.
BGP (Border Gateway Protocol) is used for inter-domain routing and is based on path vector algorithm.
Link sta...read more
Q108. what is use of routing and its uses?
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing helps in directing network traffic efficiently
It determines the best path for data packets to travel from source to destination
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information
Routing tables are used to store information about network paths
Dynamic routing adjusts to network changes automatically
Q109. difference between systemd and services?
systemd is a system and service manager while services are individual programs that run in the background.
systemd is responsible for managing the system's startup and shutdown processes
services are individual programs that run in the background and can be managed by systemd
systemd can start, stop, restart, enable, and disable services
services can be configured to start automatically at boot time using systemd
systemd provides better logging and error reporting for services com...read more
Q110. What is Border Gateway Protocol
Border Gateway Protocol (BGP) is a routing protocol used to exchange routing information between different autonomous systems (AS) on the internet.
BGP is an exterior gateway protocol used for inter-domain routing.
It allows routers in different autonomous systems to exchange information about the best paths for routing traffic.
BGP uses a path vector algorithm to determine the best path for routing.
It is commonly used by internet service providers (ISPs) to connect their networ...read more
Q111. How to improve the performance of asp application
To improve the performance of an ASP application, consider optimizing database queries, caching frequently accessed data, minimizing server requests, and using asynchronous programming.
Optimize database queries by using indexes, avoiding unnecessary joins, and limiting the amount of data retrieved.
Implement caching for frequently accessed data to reduce the load on the server and improve response times.
Minimize server requests by combining multiple requests into a single requ...read more
Q112. What is ip address , different types of ip
An IP address is a unique identifier assigned to devices on a network. There are two types of IP addresses: IPv4 and IPv6.
IP stands for Internet Protocol
IPv4 addresses are 32-bit and expressed in dotted decimal notation (e.g. 192.168.0.1)
IPv6 addresses are 128-bit and expressed in hexadecimal notation (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Private IP addresses are used within a local network and are not accessible from the internet
Public IP addresses are assigned by an...read more
Q113. How do we use Conditional Access in Azure
Conditional Access in Azure is used to control access to resources based on specific conditions.
Conditional Access policies can be set up to require multi-factor authentication for certain users or devices
It can restrict access based on location, device compliance, or other factors
Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data
Q114. What is the North Bridge ans South Bridge
The North Bridge and South Bridge are components of a computer's motherboard responsible for connecting the CPU, RAM, and other high-speed components.
North Bridge connects the CPU, RAM, and high-speed components directly
South Bridge connects the slower peripheral devices like USB, SATA, and audio controllers
North Bridge and South Bridge work together to facilitate communication between the CPU and other components
Example: In older computers, the North Bridge and South Bridge ...read more
Q115. OSPF LSA types and which routes generates each LSA
OSPF LSA types include Router LSA, Network LSA, Summary LSA, and ASBR Summary LSA.
Router LSA (Type 1) - Generated by all routers and contains information about directly connected links.
Network LSA (Type 2) - Generated by DR to advertise the network segment.
Summary LSA (Type 3, 4, 5) - Generated by ABR to advertise routes to other areas.
ASBR Summary LSA (Type 4) - Generated by ABR to advertise ASBR information to other areas.
Q116. What are backups? what are ports?
Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.
Backups are essential for data recovery in case of disasters or system failures
Ports are identified by numbers and are used to establish connections between devices
Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.
Q117. What is a HashMap?
HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.
HashMap is part of the Java Collections Framework.
It uses hashing to store and retrieve elements.
It allows null values and null keys.
It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.
Example: HashMap
map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2
Q118. how will you do capacity planning
Capacity planning involves estimating future resource needs based on current and projected usage.
Analyze current usage patterns and trends
Forecast future demand based on growth projections
Consider potential changes in technology or business needs
Identify potential bottlenecks and plan for scalability
Regularly review and adjust plans as needed
Q119. Ajy improvements that u worked for response optimisation
Implemented caching and compression techniques to reduce response time.
Used Memcached to cache frequently accessed data.
Enabled Gzip compression to reduce response size.
Optimized database queries to reduce response time.
Used CDN to serve static content.
Implemented lazy loading of resources to reduce initial load time.
Q120. Why we use angular? Limitations
Angular is a popular front-end framework for building dynamic web applications.
Angular provides a powerful set of tools for building complex user interfaces
It uses a component-based architecture for organizing code
It offers two-way data binding and dependency injection for efficient development
Limitations include a steep learning curve and potential performance issues with large applications
Q121. Which tools do you use to administer Hana db
I use SAP HANA Studio, SAP HANA Cockpit, and SAP HANA Database Explorer to administer Hana db.
SAP HANA Studio is a tool used for administration, development, and monitoring of Hana databases.
SAP HANA Cockpit provides a web-based interface for monitoring and managing Hana systems.
SAP HANA Database Explorer is a tool for exploring and querying Hana databases.
SQL Console can also be used for executing SQL queries directly on the Hana database.
Q122. -Expert mode in PFCG?
Expert mode in PFCG allows advanced customization of authorization roles.
Expert mode provides access to additional tabs and fields for fine-tuning roles.
It allows for more complex authorization logic and the ability to add custom fields.
Expert mode should only be used by experienced users as it can be complex and difficult to troubleshoot.
Examples of advanced customization include restricting access to specific transactions or fields within transactions.
Q123. What are the structure of O365 and it’s function
O365 is a cloud-based subscription service that provides access to various Microsoft applications and services.
O365 includes applications such as Outlook, Word, Excel, PowerPoint, and OneNote.
It also includes cloud services such as OneDrive, SharePoint, Teams, and Yammer.
The structure of O365 is based on a subscription model, where users pay a monthly or yearly fee to access the applications and services.
O365 allows for collaboration and communication among users, with featur...read more
Q124. roles and responsibilities ,how to reslove the laptop issues
Q125. What OSPF and its state and LSAs
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to each network.
OSPF routers exchange Link State Advertisements (LSAs) to build a topology database.
There are several types of LSAs, including Router LSAs, Network LSAs, Summary LSAs, and AS External LSAs.
OSPF routers maintain neighbor relationships and exchange H...read more
Q126. Sorting program without using any in built functions
Implement a sorting program without using any built-in functions
Iterate through the array and compare each element with the rest to sort
Use a sorting algorithm like bubble sort, selection sort, or insertion sort
Implement the sorting logic using loops and conditional statements
Q127. How you handle if worker node fail
We ensure high availability by configuring multiple worker nodes and using load balancers.
Configure multiple worker nodes to distribute the load and ensure redundancy.
Use load balancers to distribute the traffic among the available worker nodes.
Monitor the worker nodes for any failures and take appropriate actions to replace or repair them.
Ensure that the Tableau Server is configured to automatically recover from worker node failures.
Perform regular backups to ensure that dat...read more
Q128. How to debug smartform
To debug a smartform, use transaction SMARTFORMS and set breakpoints in the code.
Open transaction SMARTFORMS
Select the smartform to be debugged
Click on the 'Debugging' button
Set breakpoints in the code
Execute the smartform and the debugger will stop at the breakpoints
Q129. How do express your idea or point of view?
I express my ideas clearly and confidently through effective communication skills.
I use clear and concise language to convey my thoughts
I provide examples or evidence to support my point of view
I actively listen to others' perspectives and incorporate feedback into my ideas
Q130. Advantages of Agile Methodology
Agile methodology allows for flexibility, collaboration, and faster delivery of high-quality software.
Encourages customer involvement and feedback throughout the development process
Allows for changes and adjustments to be made quickly and efficiently
Promotes teamwork and communication among team members
Delivers working software in shorter timeframes
Reduces the risk of project failure
Increases customer satisfaction
Examples: Scrum, Kanban, Extreme Programming (XP)
Q131. Different types of joins in SQL.
Different types of joins in SQL include inner join, outer join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Outer join: Returns all rows when there is a match in one of the tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match in one of the tabl...read more
Q132. Explain the Defect Life Cycle and its Categories?
Defect Life Cycle is a process followed by testers to identify, report, and resolve defects in software.
Defect is identified and reported by tester
Defect is reviewed by development team
Defect is assigned to a developer for fixing
Defect is fixed by developer
Defect is retested by tester
Defect is closed if it passes retest, else reopened
Categories include New, Open, In Progress, Fixed, Reopened, Closed
Q133. What are pointers in java language?
Pointers in Java are variables that store memory addresses of other variables or objects.
Pointers in Java are not directly supported like in languages such as C or C++.
Instead, Java uses references to objects, which act like pointers but with restrictions.
Example: String str = new String("Hello"); // str is a reference to the String object
Q134. What is difference between a budget and forecast
Budget is a financial plan for a specific period, while forecast is a prediction of future financial outcomes.
Budget is a detailed financial plan that outlines expected revenues and expenses for a specific period, usually a year.
Forecast is a prediction of future financial outcomes based on past data and trends.
Budgets are typically set at the beginning of a fiscal year and are used as a benchmark to measure actual performance against.
Forecasts are updated regularly to reflec...read more
Q135. Difference between Nortons current and load current?
Norton's current is the current flowing through a short circuit while load current is the current flowing through a load connected to the circuit.
Norton's current is the current that would flow through a short circuit connected across the output terminals of a circuit.
Load current is the current that flows through the load connected to the circuit, such as a resistor or a device.
Norton's current is independent of the load connected to the circuit, while load current depends o...read more
Q136. kubernetes pod creation teplicatset events in kubernetes ingress controller
Kubernetes pod creation and replicaset events in Kubernetes Ingress controller.
Pod creation involves defining a pod specification in a YAML file and using 'kubectl create' command to create the pod.
Replicaset events can be monitored using 'kubectl describe replicaset' command to check for events related to the replicaset.
Ingress controller manages external access to services in a Kubernetes cluster by routing traffic based on rules defined in the Ingress resource.
Events relat...read more
Q137. How you will write the test scenario for elevator
Test scenarios for an elevator to ensure proper functionality and safety
Test the elevator buttons for all floors
Test emergency stop button functionality
Test door opening and closing mechanism
Test elevator capacity by loading it with maximum weight limit
Test response time for elevator arrival at different floors
Q138. How you approach a busy stakeholder?
Approach with clear communication, understanding their priorities, and offering solutions.
Schedule a meeting at a convenient time for the stakeholder
Clearly communicate the purpose of the meeting and the desired outcomes
Listen actively to understand their priorities and challenges
Offer solutions that align with their goals and address their concerns
Follow up with any additional information or support they may need
Q139. What to do you understand by procurement
Q140. Expalin what is ABAP dictionary Events in ALV report Have you worked on oops abp
ABAP Dictionary is a central repository for data definitions used in SAP applications. ALV report events are user actions in ALV grid. OOPs ABAP is object-oriented programming in ABAP.
ABAP Dictionary is used to define and manage data definitions in SAP applications
ALV report events include user actions like clicking on a row or column header
OOPs ABAP allows for object-oriented programming concepts like classes and inheritance
Q141. how to approach rdp connection during analysis
Approach RDP connection during analysis by examining logs, network traffic, and user activity.
Review RDP logs for any suspicious activity or unauthorized access.
Analyze network traffic for any anomalies or unusual patterns related to RDP connections.
Monitor user activity to identify any unauthorized or suspicious RDP sessions.
Consider using tools like Wireshark, Splunk, or ELK stack for in-depth analysis.
Look for failed login attempts, unusual login times, or multiple simulta...read more
Q142. What are technologies you have worked so far
I have worked with a variety of technologies including Java, Python, SQL, AWS, and Docker.
Proficient in Java and Python programming languages
Experience with SQL databases and data modeling
Familiarity with AWS cloud services and infrastructure
Knowledge of containerization using Docker
Experience with version control using Git
Q143. What is Domain Name System
DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other.
DNS stands for Domain Name System
It is responsible for translating domain names into IP addresses
DNS allows computers to communicate with each other over the internet
DNS uses a hierarchical system of domain names, with the top-level domains being .com, .org, .net, etc.
DNS servers store information about domain names and their corresponding IP addresses
Q144. What is Normalisation?
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves dividing larger tables into smaller ones and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.
Normalization can improve database performance and make it easier to maintain.
Example: A custom...read more
Q145. What is polimorphism?
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have multiple subclasses like circle, square, etc. and all can be treated as shapes.
Example: A method can take an object of a parent class as a parameter and it can accept any of its child classes.
Q146. What is App ID in Palo Alto Firewalls?
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular control over application usage within the network.
Examples...read more
Q147. What is User Acceptance Testing?
User Acceptance Testing (UAT) is the final phase of testing where end-users test the software to ensure it meets their requirements.
UAT is performed by end-users or business representatives
It is done in a real-world environment
The focus is on validating the software's functionality and usability
UAT is conducted after all other testing phases are completed
Defects found during UAT are reported and fixed before the software is released
Q148. What is modifier
A modifier is a two-digit code added to a CPT or HCPCS code to provide additional information about a service or procedure.
Modifiers are used to indicate that a service or procedure has been altered in some way but not changed in its definition
Modifiers can affect reimbursement rates and are used to indicate that multiple procedures were performed during a single session
Examples of modifiers include -22 (increased procedural services) and -59 (distinct procedural service)
Modi...read more
Q149. What is Profit and Loss Statement?
A Profit and Loss Statement is a financial report that summarizes a company's revenues, expenses, and profits over a specific period of time.
It shows the company's total revenue, total expenses, and net income or loss for a specific period, typically a month, quarter, or year.
Revenue includes sales, interest income, and other sources of income, while expenses include costs of goods sold, operating expenses, and taxes.
The net income is calculated by subtracting total expenses ...read more
Q150. Define firewall generations and their roles
Firewall generations refer to the evolution of firewall technology and their roles in network security.
First generation firewalls - packet filtering based on IP addresses and ports
Second generation firewalls - stateful inspection and improved security features
Third generation firewalls - application layer filtering and deep packet inspection
Fourth generation firewalls - next-generation firewalls with advanced threat protection capabilities
Each generation builds upon the previ...read more
Q151. What do you understand by procurement
Q152. how router and switches work in network?
Q153. Define one body system like urinary, digestive
The respiratory system is responsible for breathing and gas exchange.
Includes organs such as the lungs, trachea, and bronchi
Works to bring oxygen into the body and remove carbon dioxide
Can be affected by diseases such as asthma and pneumonia
Q154. Validation of data between source and target
Validation of data between source and target is a crucial step in ETL process.
Compare the data types and formats of source and target data
Check for missing or extra data in target
Verify data transformation rules are applied correctly
Perform data profiling to identify anomalies
Use checksums or hash values to ensure data integrity
Q155. What are screen Reader modes
Screen Reader modes are different ways in which a screen reader can read and interpret content on a webpage.
Screen Reader modes can include reading the entire page, reading only headings or links, or reading specific sections of the page.
Screen Reader modes can also include different levels of verbosity, such as reading only the most important information or providing detailed descriptions of all content.
Examples of screen reader modes include NVDA's browse mode, JAWS' virtua...read more
Q156. How will you Schedule Jobs using TWS in Mainframe
Scheduling jobs using TWS in Mainframe involves creating job definitions, specifying dependencies, setting up schedules, and monitoring job execution.
Create job definitions with specific parameters and requirements
Specify job dependencies to ensure proper sequencing
Set up schedules for job execution based on time, frequency, or event triggers
Monitor job execution and troubleshoot any issues that arise
Q157. what is network
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.
Networks can be wired or wireless
They can be local (LAN), wide (WAN), or global (Internet)
Networks use protocols like TCP/IP to communicate
Examples include Ethernet, Wi-Fi, and cellular networks
Q158. Tell me something about windows!?
Q159. what is the difference lookup ,join ,merge
Lookup is used to search for a specific value in a dataset, join is used to combine two datasets based on a common key, and merge is used to combine datasets based on common columns.
Lookup is used to find a specific value in a dataset
Join is used to combine two datasets based on a common key
Merge is used to combine datasets based on common columns
Example: Lookup - searching for a customer's email address in a customer dataset
Example: Join - combining sales data with customer ...read more
Q160. BGP attributes and how they work
BGP attributes are used to influence the path selection process in BGP routing.
BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, etc.
AS_PATH is a list of AS numbers that the route has traversed.
NEXT_HOP is the IP address to reach the next hop towards the destination.
LOCAL_PREF is used to influence outbound traffic.
MED (Multi-Exit Discriminator) is used to influence inbound traffic.
Weight is a Cisco-specific attribute used for path selection within the same AS.
Communities ...read more
Q161. What is IPS? How does it work?
IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.
IPS is a network security technology that monitors network traffic in real-time.
It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.
IPS works by analyzing network packets, comparing them to a database of known threats, and taking action to block or allow t...read more
Q162. What is test NG annotation, Can you define priority 0
TestNG annotation is used in TestNG framework to provide additional information about test methods or classes.
TestNG annotations are used to control the execution flow of test methods.
They can be used to set the priority of test methods, define dependencies, configure test groups, etc.
Examples of TestNG annotations include @Test, @BeforeMethod, @AfterMethod, @DataProvider, etc.
Q163. How do you start a program
Starting a program involves defining goals, assembling a team, creating a plan, and securing resources.
Define program goals and objectives
Assemble a team with the necessary skills and expertise
Create a detailed program plan with timelines and milestones
Secure necessary resources, including funding and equipment
Establish communication channels and reporting mechanisms
Monitor progress and adjust plans as necessary
Q164. What is Blue Screen of Death?
Blue Screen of Death is a Windows operating system error screen that appears when the system encounters a critical error.
Occurs when Windows encounters a critical system error and cannot recover
Displays a blue screen with error message and code
Often requires a system restart to resolve
Can be caused by hardware or software issues
Q165. What do you know about VPN?
A VPN, or Virtual Private Network, is a secure network connection that allows users to access the internet privately and securely.
VPN encrypts data to ensure privacy and security
It allows users to access restricted websites or content
Commonly used for remote work or accessing company networks
Examples include NordVPN, ExpressVPN, and Cisco AnyConnect
Q166. Networking and difference between UDP AND TCP
UDP and TCP are protocols used in networking. UDP is faster but less reliable, while TCP is slower but more reliable.
UDP stands for User Datagram Protocol and is connectionless
TCP stands for Transmission Control Protocol and is connection-oriented
UDP is faster because it doesn't establish a connection before sending data
TCP is more reliable because it ensures all data is received and in the correct order
UDP is used for applications where speed is more important than reliabili...read more
Q167. Spark internal working and optimization techniques
Spark internal working and optimization techniques
Spark uses Directed Acyclic Graph (DAG) for optimizing workflows
Lazy evaluation helps in optimizing transformations by combining them into a single stage
Caching and persistence of intermediate results can improve performance
Partitioning data can help in parallel processing and reducing shuffle operations
Q168. What is material requirements planning
Material Requirements Planning (MRP) is a production planning and inventory control system.
MRP helps in determining the quantity and timing of raw materials, components, and subassemblies needed to manufacture a product.
It ensures that the right materials are available at the right time to meet production demand.
MRP takes into account factors such as lead times, inventory levels, and production schedules to calculate material requirements.
It helps in reducing inventory costs ...read more
Q169. Tell some features of Java 8
Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions allow for functional programming and simplify code.
Streams provide a way to process collections of data in a parallel and efficient manner.
Default methods allow for adding new methods to interfaces without breaking existing implementations.
Date and Time API provides a more comprehensive and flexible way to handle date and time.
Nashorn JavaScript engine allows f...read more
Q170. What is the complex integration you did?
I led a complex integration project between two large financial institutions to streamline their data sharing processes.
Designed a custom API to facilitate real-time data exchange between the systems
Implemented data mapping and transformation logic to ensure compatibility between the different data formats
Worked closely with both technical teams to troubleshoot and resolve integration issues
Developed a comprehensive testing plan to validate the integration and ensure data acc...read more
Q171. Explain SLA management how to do it
SLA management involves setting, monitoring, and meeting service level agreements with customers.
Define clear and measurable SLA metrics with customers
Monitor performance against SLA targets regularly
Implement processes to address SLA breaches
Communicate effectively with customers about SLA status
Use SLA management tools to track and report on performance
Review and update SLAs periodically based on feedback and performance
Q172. difference between ram and rom
RAM is volatile memory used for temporary storage, while ROM is non-volatile memory used for permanent storage.
RAM stands for Random Access Memory, used for temporary storage of data and program instructions
ROM stands for Read-Only Memory, used for permanent storage of data and program instructions
RAM is volatile, meaning data is lost when power is turned off
ROM is non-volatile, meaning data is retained even when power is turned off
Q173. Explain about VLAN and how it works?
VLAN is a virtual LAN that separates network traffic based on logical grouping, improving network security and performance.
VLANs divide a physical network into multiple logical networks, allowing for better traffic management.
Devices within the same VLAN can communicate directly with each other, while devices in different VLANs require a router to communicate.
VLANs can be configured based on port, MAC address, or protocol.
Example: VLAN 10 for finance department, VLAN 20 for m...read more
Q174. Explain about Table B components in MDM scoresheet?
Q175. What is CUCM, CUC, Regarding Networking.
CUCM and CUC are networking technologies used for communication and collaboration.
CUCM stands for Cisco Unified Communications Manager and is a call processing software used for IP telephony.
CUC stands for Cisco Unity Connection and is a voicemail and unified messaging platform.
Both technologies are used for communication and collaboration in a networked environment.
They are commonly used in enterprise environments for managing and routing calls and messages.
CUCM and CUC are ...read more
Q176. What actions I have used fromDWPC
I have used actions from DWPC to integrate systems and streamline processes.
Implemented data mapping and transformation using DWPC
Automated data transfer between different systems
Configured workflows to trigger actions based on specific events
Monitored system integrations for errors and performance issues
Q177. Explain LSA Types in detail
LSA Types are used in OSPF to describe the type of information contained in the LSA.
Type 1: Router LSA - contains information about the router and its directly connected networks
Type 2: Network LSA - describes the networks connected to a multi-access network
Type 3: Summary LSA - contains information about networks outside of the area
Type 4: ASBR Summary LSA - describes the ASBR router to the rest of the OSPF domain
Type 5: External LSA - contains information about external net...read more
Q178. What is Linux Boot Process ?
Linux Boot Process is the sequence of events that occur from power on to the login prompt.
BIOS/UEFI firmware initializes hardware
Bootloader loads kernel into memory
Kernel initializes system processes and mounts filesystems
Init process starts system services and user login
Graphical user interface (GUI) or command line interface (CLI) is presented to user
Q179. Do you know excel microsoft
Yes, I know Excel Microsoft.
I am proficient in using Excel for data analysis and reporting.
I have experience in creating pivot tables, charts, and graphs.
I am familiar with advanced functions such as VLOOKUP, IF, and SUMIF.
I have used Excel for budgeting, forecasting, and project management.
I am comfortable working with large datasets and can manipulate data using filters and sorting.
Q180. What is entry criteria & exit criteria
Entry criteria and exit criteria are conditions that must be met before and after testing, respectively.
Entry criteria are the conditions that must be fulfilled before testing can begin
Exit criteria are the conditions that must be fulfilled before testing can be considered complete
Entry criteria can include having test data ready, test environment set up, and test cases prepared
Exit criteria can include all test cases executed, all defects fixed, and test reports generated
Q181. Firewall works at what layer?
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters and controls incoming and outgoing network traffic based on predetermined security rules.
Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.
Q182. how to deal with s/w shortcommings
Addressing software shortcomings involves identifying the issues, prioritizing them, creating a plan for improvement, and implementing solutions.
Identify the specific shortcomings in the software
Prioritize the issues based on impact and urgency
Create a plan for addressing each shortcoming, including assigning tasks and setting deadlines
Implement solutions, which may involve coding changes, testing, and deployment
Monitor the effectiveness of the solutions and make adjustments ...read more
Q183. What is Virtual Private Network?
A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over a public network, allowing users to access private networks remotely.
Encrypts data to ensure privacy and security
Allows users to access private networks remotely
Masks IP address to maintain anonymity
Commonly used for remote work, accessing geo-blocked content, and enhancing online security
Examples: NordVPN, ExpressVPN, Cisco AnyConnect
Q184. What is meant by bpo?
BPO stands for Business Process Outsourcing. It refers to the practice of contracting specific business processes to a third-party service provider.
BPO involves outsourcing non-core business functions to external vendors.
It helps companies reduce costs, improve efficiency, and focus on their core competencies.
Examples of BPO services include customer support, data entry, payroll processing, and IT support.
BPO can be onshore (within the same country), nearshore (in neighboring...read more
Q185. Where is the headquarters of NTT located
NTT's headquarters is located in Tokyo, Japan.
NTT's headquarters is in Tokyo, Japan
NTT stands for Nippon Telegraph and Telephone Corporation
Tokyo is the capital city of Japan
Q186. Explain the pseudocode of displaying the nth Prime number.
Q187. What is icd
ICD stands for International Classification of Diseases, a system used to classify and code diagnoses, symptoms, and procedures.
ICD is used by healthcare providers to accurately document and communicate patient conditions and treatments.
ICD codes are updated regularly to reflect changes in medical knowledge and technology.
ICD codes are used for billing and reimbursement purposes by insurance companies and government programs like Medicare and Medicaid.
Examples of ICD codes in...read more
Q188. What is consumption based planning
Consumption based planning is a method of inventory management where the demand for a product determines the production or procurement of it.
It is a pull-based planning approach
It is used to manage inventory levels based on actual customer demand
It helps to avoid overproduction and stockouts
It requires accurate demand forecasting and real-time inventory tracking
Examples include Just-in-Time (JIT) and Kanban systems
Q189. Write a test case in selenium.
Test case to verify login functionality on a website using Selenium
Open the browser and navigate to the login page
Enter valid username and password
Click on the login button
Verify that user is successfully logged in
Q190. How you do Xamarin Forms migration
Xamarin Forms migration involves updating code, libraries, and UI elements to the latest version.
Start by updating Xamarin Forms NuGet packages to the latest version
Check for any deprecated APIs and update them to the new equivalents
Test the app thoroughly on different devices and screen sizes to ensure compatibility
Update any custom renderers or platform-specific code to match the new Xamarin Forms version
Q191. What is do know about BSOD?
BSOD stands for Blue Screen of Death, a Windows error screen displayed when a system encounters a critical error.
BSOD is a stop error screen that appears when a Windows operating system encounters a system crash or critical error.
It is often displayed with white text on a blue background, hence the name Blue Screen of Death.
BSOD can be caused by hardware failures, software issues, driver problems, or system overheating.
Common error messages on BSOD include 'IRQL_NOT_LESS_OR_E...read more
Q192. What are Azure Security Policies
Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.
Azure Security Policies help ensure compliance with security standards and best practices
They can be used to enforce specific security configurations, such as requiring encryption for storage accounts
Policies can be assigned at the subscription, resource group, or resource level
Q193. How 150 Computer at time connect
150 computers can connect simultaneously through a network switch or router.
Use a network switch or router to connect all 150 computers simultaneously.
Ensure that the network infrastructure can handle the bandwidth and traffic of 150 computers.
Set up the network with proper IP addressing and subnetting to avoid conflicts.
Consider using VLANs to segregate traffic and improve network performance.
Implement security measures such as firewalls and access control lists to protect t...read more
Q194. BGP and its states and attributes
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems.
BGP has four main states: Idle, Connect, OpenSent, and Established.
BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, and ORIGIN.
AS_PATH attribute shows the path the route has taken through different autonomous systems.
NEXT_HOP attribute specifies the next hop IP address to reach a particular destination.
LOCAL_PREF attribute is used to influence out...read more
Q195. What is Infrastructure library?
Infrastructure Library (ITIL) is a set of best practices for IT service management.
ITIL provides a framework for organizations to plan, deliver, and support IT services.
It helps improve efficiency, reduce costs, and enhance customer satisfaction.
Examples of ITIL processes include incident management, change management, and service level management.
Q196. What is VPN and why it is used for
VPN stands for Virtual Private Network. It is used to create a secure connection over the internet, allowing users to access private networks remotely.
VPN encrypts data to ensure privacy and security
It allows users to access restricted websites or content
VPN can be used to bypass geo-restrictions and access region-locked content
It is commonly used by remote workers to securely connect to their company's network
Q197. Q.2) Golden rules of accounting?
Golden rules of accounting are basic principles to maintain financial records accurately.
Debit the receiver, credit the giver
Debit what comes in, credit what goes out
Debit all expenses and losses, credit all incomes and gains
Q198. What does NTT company do?
NTT is a global technology services company that provides IT solutions and services to clients worldwide.
NTT offers a wide range of services including cloud computing, cybersecurity, data analytics, and IoT solutions.
The company operates in over 80 countries and has over 300,000 employees.
NTT is also involved in research and development in areas such as artificial intelligence and quantum computing.
Some of NTT's clients include major corporations in industries such as finance...read more
Q199. BGP Attributes in detail
BGP attributes are used to determine the best path for routing traffic between autonomous systems.
BGP attributes include: AS Path, Next Hop, Local Preference, Weight, Multi-Exit Discriminator (MED), Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router in the path
Local Preference is used to indicate the preferred path for outbound traffic
Weight is a Cisco-specific attribute used to indicate ...read more
Q200. What is ost a file?
An OST file is an offline storage table file used by Microsoft Outlook to store a copy of mailbox data from an Exchange server.
OST files allow users to access their mailbox data even when offline
Changes made to an OST file while offline will sync with the Exchange server once online
OST files can be created when using Outlook in Cached Exchange Mode
Interview Process at M.V.Associates
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month