Upload Button Icon Add office photos

Filter interviews by

Pinnacle Technology System Administrator Interview Questions and Answers

Updated 13 Sep 2024

Pinnacle Technology System Administrator Interview Experiences

1 interview found

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Sep 2023. There were 2 interview rounds.

Round 1 - Aptitude Test 

Basic english and basic networking

Round 2 - One-on-one 

(2 Questions)

  • Q1. What is port number?
  • Ans. 

    A port number is a communication endpoint in a network that identifies a specific process or service running on a device.

    • Port numbers range from 0 to 65535

    • Well-known port numbers are reserved for specific services (e.g. HTTP uses port 80, HTTPS uses port 443)

    • Ports below 1024 are considered privileged and require special permissions to use

  • Answered by AI
  • Q2. What is ip address?
  • Ans. 

    An IP address is a unique numerical label assigned to each device connected to a computer network.

    • IP addresses are used to identify and locate devices on a network.

    • There are two types of IP addresses: IPv4 (e.g. 192.168.1.1) and IPv6 (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

    • IP addresses can be static (manually assigned) or dynamic (assigned by a DHCP server).

  • Answered by AI

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Ages,distance,time,decoding

Interview Preparation Tips

Interview preparation tips for other job seekers - Good
Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - One-on-one 

(20 Questions)

  • Q1. How to dics scan, create LVM
  • Ans. 

    To disk scan, use tools like fsck or badblocks. To create LVM, use pvcreate, vgcreate, and lvcreate commands.

    • To disk scan, use fsck command to check and repair file system errors.

    • To scan for bad blocks on a disk, use badblocks command.

    • To create LVM, first initialize physical volumes (pvcreate), then create volume groups (vgcreate), and finally create logical volumes (lvcreate).

    • Example: fsck /dev/sda1

    • Example: badblocks ...

  • Answered by AI
  • Q2. Server is behaving Slow, How can i Troubleshoot This.
  • Q3. User is not able to login, How can troubleshoot this
  • Ans. 

    To troubleshoot a user not able to login, check for account lockouts, password issues, network connectivity, and system errors.

    • Check if the user's account is locked or disabled

    • Verify if the user's password has expired or needs to be reset

    • Ensure network connectivity is working properly

    • Check for any system errors or issues that may prevent login

    • Review system logs for any relevant error messages

    • Confirm if the user is usin

  • Answered by AI
  • Q4. How to create bonding in linux
  • Ans. 

    Bonding in Linux is a technique to combine multiple network interfaces into a single virtual interface for increased bandwidth and fault tolerance.

    • Install the bonding driver module

    • Configure the bonding interface in the network configuration file

    • Specify the bonding mode and options

    • Assign the physical interfaces to the bonding interface

    • Restart the network service to apply the changes

  • Answered by AI
  • Q5. Disc LVM partion for LVM
  • Ans. 

    Disc LVM partitioning allows for flexible management of storage space by creating logical volumes on physical disks.

    • LVM stands for Logical Volume Manager.

    • It allows for dynamic allocation and resizing of storage space.

    • LVM partitions are created by combining physical volumes (disks) into volume groups, and then creating logical volumes within those groups.

    • Logical volumes can be resized, moved, or even span multiple physi...

  • Answered by AI
  • Q6. How to run Cronjob for Process
  • Ans. 

    To run a cronjob for a process, use the crontab command to create a cron job entry.

    • Use the crontab command to edit the cron table

    • Specify the schedule using the cron syntax

    • Specify the command or script to be executed

    • Save and exit the cron table to schedule the cron job

  • Answered by AI
  • Q7. File sharing with nfs, step to step process, how to mount on server
  • Q8. Patching Process in your current Organization
  • Ans. 

    The patching process in my current organization involves regular updates and maintenance to ensure system security and performance.

    • Regularly scheduled patching cycles

    • Testing patches in a non-production environment before deployment

    • Applying patches to all systems, including servers, workstations, and network devices

    • Monitoring and tracking patch status

    • Documenting patching procedures and maintaining an inventory of patche...

  • Answered by AI
  • Q9. How to rollback Patches trough Yum
  • Ans. 

    To rollback patches through Yum, use the yum history command and the yum history undo command.

    • Use the 'yum history' command to view the history of installed packages and patches.

    • Identify the transaction ID of the patch you want to rollback.

    • Use the 'yum history undo ' command to rollback the patch.

    • Confirm the rollback by reviewing the output and checking the system's package status.

Answered by AI
  • Q10. Server is not able to login, how to troubleshoot this
  • Ans. 

    To troubleshoot a server not able to login, check network connectivity, verify credentials, and review system logs.

    • Check network connectivity to ensure the server is reachable

    • Verify the correctness of login credentials

    • Review system logs for any error messages or indications of login failures

    • Restart the server if necessary

    • Check for any recent system updates or changes that may have caused the login issue

  • Answered by AI
  • Q11. Create swap for linux server
  • Ans. 

    To create swap for a Linux server, use the 'mkswap' command to create a swap file or partition and then activate it using the 'swapon' command.

    • Use 'dd' command to create a swap file with desired size: 'dd if=/dev/zero of=/path/to/swapfile bs=1G count=4'

    • Set the correct permissions for the swap file: 'chmod 600 /path/to/swapfile'

    • Create swap space on the file: 'mkswap /path/to/swapfile'

    • Activate the swap space: 'swapon /pa...

  • Answered by AI
  • Q12. How to take backup via tar utility
  • Ans. 

    Tar utility is used to create backups by compressing files and directories.

    • To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.

    • Specify the files or directories to be included in the backup.

    • Use the '-cvf' options to create a new tar archive file.

    • Specify the name of the archive file to be created.

    • To compress the backup, use the '-z' option for gzip compression or '-j' opt...

  • Answered by AI
  • Q13. You know scp what is use for linux.
  • Ans. 

    scp is a command-line tool used for securely transferring files between a local and remote Linux system.

    • scp stands for secure copy.

    • It uses SSH protocol for secure file transfer.

    • It can be used to copy files between local and remote systems, or between two remote systems.

    • Syntax: scp [options] [source] [destination]

    • Example: scp file.txt user@remote:/path/to/destination

  • Answered by AI
  • Q14. Difference between yum & rpm.
  • Ans. 

    yum is a package manager that resolves dependencies and installs packages from repositories, while rpm is a low-level package manager that directly installs packages.

    • yum is a high-level package manager that uses rpm as its underlying package management system.

    • yum can automatically resolve dependencies and install packages from repositories, while rpm requires manual dependency resolution.

    • yum can also update packages an...

  • Answered by AI
  • Q15. Https is not working, how to troubleshoot this.
  • Ans. 

    To troubleshoot HTTPS not working, check certificate validity, firewall settings, and web server configuration.

    • Check if the SSL/TLS certificate is valid and properly installed

    • Verify if the web server is configured to listen on the correct HTTPS port (usually 443)

    • Ensure that the firewall allows incoming connections on the HTTPS port

    • Check if the SSL/TLS protocols and cipher suites are correctly configured

    • Inspect the web ...

  • Answered by AI
  • Q16. You know about port , ssh, http, https, ftp, nfs, telnet , samba,
  • Ans. 

    These are common network protocols used for communication and file transfer.

    • SSH (Secure Shell) is a secure protocol used for remote login and secure file transfer.

    • HTTP (Hypertext Transfer Protocol) is used for transmitting web pages and other resources over the internet.

    • HTTPS (HTTP Secure) is the secure version of HTTP, encrypted with SSL/TLS.

    • FTP (File Transfer Protocol) is used for transferring files between a client ...

  • Answered by AI
  • Q17. Difference between udp & tcp
  • Ans. 

    UDP is a connectionless protocol that provides fast, but unreliable communication. TCP is a connection-oriented protocol that ensures reliable communication.

    • UDP stands for User Datagram Protocol, while TCP stands for Transmission Control Protocol.

    • UDP is faster than TCP because it does not establish a connection before sending data.

    • UDP does not guarantee delivery of packets, while TCP ensures reliable delivery.

    • TCP uses ...

  • Answered by AI
  • Q18. Network layers for network
  • Ans. 

    The network layers for network are a hierarchical structure that defines the communication process between devices.

    • The network layers are a way to organize and standardize the communication process in a network.

    • There are several models that define the network layers, such as the OSI model and the TCP/IP model.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The layers provide abstract...

  • Answered by AI
  • Q19. You are not able to login through putty, troubleshooting
  • Ans. 

    Troubleshooting steps for not being able to login through putty

    • Check network connectivity

    • Verify correct IP address and port number

    • Ensure SSH service is running on the server

    • Check firewall settings

    • Verify correct username and password

    • Check if the server is reachable and not down

  • Answered by AI
  • Q20. You know about scripting , bash or sh
  • Ans. 

    Yes, I am familiar with scripting in bash and sh.

    • I have experience writing scripts in bash and sh.

    • I am comfortable with using variables, loops, conditionals, and functions in bash and sh scripts.

    • I have used bash and sh scripts for automating tasks, managing system configurations, and troubleshooting.

    • I am familiar with common commands and utilities in bash and sh, such as grep, sed, awk, and find.

    • I have written scripts ...

  • Answered by AI

    Skills evaluated in this interview

    Interview experience
    5
    Excellent
    Difficulty level
    Moderate
    Process Duration
    Less than 2 weeks
    Result
    Selected Selected

    I applied via Naukri.com and was interviewed before Apr 2023. There were 3 interview rounds.

    Round 1 - HR 

    (1 Question)

    • Q1. Basics Skills Salary expectation Relocation Etc
    Round 2 - Technical 

    (1 Question)

    • Q1. Skills Test Basic intro Team bonding
    Round 3 - Technical 

    (1 Question)

    • Q1. Machine test Question answer
    Interview experience
    5
    Excellent
    Difficulty level
    Moderate
    Process Duration
    Less than 2 weeks
    Result
    Selected Selected

    I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.

    Round 1 - Resume Shortlist 
    Pro Tip by AmbitionBox:
    Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
    View all tips
    Round 2 - Aptitude Test 

    It was apti test with lot of technical questions and basic codes were ask

    Round 3 - HR 

    (5 Questions)

    • Q1. Hr round with technical questions
    • Q2. Name , technical background, academics.
    • Q3. Acadamics que qualification results
    • Q4. Coding knowledge basics
    • Q5. Formal question relates personal intrest

    I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.

    Interview Questionnaire 

    2 Questions

    • Q1. Why are you joing this company
    • Q2. If you will join this organization so how will you grow this company

    Interview Preparation Tips

    Interview preparation tips for other job seekers - If I will joing this company so i will grow with top leval with our self confident and knowledge. I will hard work with better performance.
    Interview experience
    5
    Excellent
    Difficulty level
    -
    Process Duration
    -
    Result
    -
    Round 1 - Technical 

    (2 Questions)

    • Q1. Data structures - related topics
    • Q2. Algorithm topics + related topics

    I applied via Naukri.com and was interviewed in Aug 2021. There was 1 interview round.

    Round 1 - Technical 

    (1 Question)

    • Q1. They took only one round .it was technical interview conducted by Team member, With in two days i got a mail you are short listed for our company.They took the round approximately 30min.

    Interview Preparation Tips

    Interview preparation tips for other job seekers - If your are technically well and good ,they recruit automatically.
    Interview experience
    5
    Excellent
    Difficulty level
    -
    Process Duration
    -
    Result
    -
    Round 1 - Aptitude Test 

    Ages,distance,time,decoding

    Interview Preparation Tips

    Interview preparation tips for other job seekers - Good
    Interview experience
    5
    Excellent
    Difficulty level
    Hard
    Process Duration
    4-6 weeks
    Result
    Selected Selected

    I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.

    Round 1 - Resume Shortlist 
    Pro Tip by AmbitionBox:
    Properly align and format text in your resume. A recruiter will have to spend more time reading poorly aligned text, leading to high chances of rejection.
    View all tips
    Round 2 - One-on-one 

    (20 Questions)

    • Q1. How to dics scan, create LVM
    • Ans. 

      To disk scan, use tools like fsck or badblocks. To create LVM, use pvcreate, vgcreate, and lvcreate commands.

      • To disk scan, use fsck command to check and repair file system errors.

      • To scan for bad blocks on a disk, use badblocks command.

      • To create LVM, first initialize physical volumes (pvcreate), then create volume groups (vgcreate), and finally create logical volumes (lvcreate).

      • Example: fsck /dev/sda1

      • Example: badblocks ...

    • Answered by AI
    • Q2. Server is behaving Slow, How can i Troubleshoot This.
    • Q3. User is not able to login, How can troubleshoot this
    • Ans. 

      To troubleshoot a user not able to login, check for account lockouts, password issues, network connectivity, and system errors.

      • Check if the user's account is locked or disabled

      • Verify if the user's password has expired or needs to be reset

      • Ensure network connectivity is working properly

      • Check for any system errors or issues that may prevent login

      • Review system logs for any relevant error messages

      • Confirm if the user is usin

    • Answered by AI
    • Q4. How to create bonding in linux
    • Ans. 

      Bonding in Linux is a technique to combine multiple network interfaces into a single virtual interface for increased bandwidth and fault tolerance.

      • Install the bonding driver module

      • Configure the bonding interface in the network configuration file

      • Specify the bonding mode and options

      • Assign the physical interfaces to the bonding interface

      • Restart the network service to apply the changes

    • Answered by AI
    • Q5. Disc LVM partion for LVM
    • Ans. 

      Disc LVM partitioning allows for flexible management of storage space by creating logical volumes on physical disks.

      • LVM stands for Logical Volume Manager.

      • It allows for dynamic allocation and resizing of storage space.

      • LVM partitions are created by combining physical volumes (disks) into volume groups, and then creating logical volumes within those groups.

      • Logical volumes can be resized, moved, or even span multiple physi...

    • Answered by AI
    • Q6. How to run Cronjob for Process
    • Ans. 

      To run a cronjob for a process, use the crontab command to create a cron job entry.

      • Use the crontab command to edit the cron table

      • Specify the schedule using the cron syntax

      • Specify the command or script to be executed

      • Save and exit the cron table to schedule the cron job

    • Answered by AI
    • Q7. File sharing with nfs, step to step process, how to mount on server
    • Q8. Patching Process in your current Organization
    • Ans. 

      The patching process in my current organization involves regular updates and maintenance to ensure system security and performance.

      • Regularly scheduled patching cycles

      • Testing patches in a non-production environment before deployment

      • Applying patches to all systems, including servers, workstations, and network devices

      • Monitoring and tracking patch status

      • Documenting patching procedures and maintaining an inventory of patche...

    • Answered by AI
    • Q9. How to rollback Patches trough Yum
    • Ans. 

      To rollback patches through Yum, use the yum history command and the yum history undo command.

      • Use the 'yum history' command to view the history of installed packages and patches.

      • Identify the transaction ID of the patch you want to rollback.

      • Use the 'yum history undo ' command to rollback the patch.

      • Confirm the rollback by reviewing the output and checking the system's package status.

    Answered by AI
  • Q10. Server is not able to login, how to troubleshoot this
  • Ans. 

    To troubleshoot a server not able to login, check network connectivity, verify credentials, and review system logs.

    • Check network connectivity to ensure the server is reachable

    • Verify the correctness of login credentials

    • Review system logs for any error messages or indications of login failures

    • Restart the server if necessary

    • Check for any recent system updates or changes that may have caused the login issue

  • Answered by AI
  • Q11. Create swap for linux server
  • Ans. 

    To create swap for a Linux server, use the 'mkswap' command to create a swap file or partition and then activate it using the 'swapon' command.

    • Use 'dd' command to create a swap file with desired size: 'dd if=/dev/zero of=/path/to/swapfile bs=1G count=4'

    • Set the correct permissions for the swap file: 'chmod 600 /path/to/swapfile'

    • Create swap space on the file: 'mkswap /path/to/swapfile'

    • Activate the swap space: 'swapon /pa...

  • Answered by AI
  • Q12. How to take backup via tar utility
  • Ans. 

    Tar utility is used to create backups by compressing files and directories.

    • To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.

    • Specify the files or directories to be included in the backup.

    • Use the '-cvf' options to create a new tar archive file.

    • Specify the name of the archive file to be created.

    • To compress the backup, use the '-z' option for gzip compression or '-j' opt...

  • Answered by AI
  • Q13. You know scp what is use for linux.
  • Ans. 

    scp is a command-line tool used for securely transferring files between a local and remote Linux system.

    • scp stands for secure copy.

    • It uses SSH protocol for secure file transfer.

    • It can be used to copy files between local and remote systems, or between two remote systems.

    • Syntax: scp [options] [source] [destination]

    • Example: scp file.txt user@remote:/path/to/destination

  • Answered by AI
  • Q14. Difference between yum & rpm.
  • Ans. 

    yum is a package manager that resolves dependencies and installs packages from repositories, while rpm is a low-level package manager that directly installs packages.

    • yum is a high-level package manager that uses rpm as its underlying package management system.

    • yum can automatically resolve dependencies and install packages from repositories, while rpm requires manual dependency resolution.

    • yum can also update packages an...

  • Answered by AI
  • Q15. Https is not working, how to troubleshoot this.
  • Ans. 

    To troubleshoot HTTPS not working, check certificate validity, firewall settings, and web server configuration.

    • Check if the SSL/TLS certificate is valid and properly installed

    • Verify if the web server is configured to listen on the correct HTTPS port (usually 443)

    • Ensure that the firewall allows incoming connections on the HTTPS port

    • Check if the SSL/TLS protocols and cipher suites are correctly configured

    • Inspect the web ...

  • Answered by AI
  • Q16. You know about port , ssh, http, https, ftp, nfs, telnet , samba,
  • Ans. 

    These are common network protocols used for communication and file transfer.

    • SSH (Secure Shell) is a secure protocol used for remote login and secure file transfer.

    • HTTP (Hypertext Transfer Protocol) is used for transmitting web pages and other resources over the internet.

    • HTTPS (HTTP Secure) is the secure version of HTTP, encrypted with SSL/TLS.

    • FTP (File Transfer Protocol) is used for transferring files between a client ...

  • Answered by AI
  • Q17. Difference between udp & tcp
  • Ans. 

    UDP is a connectionless protocol that provides fast, but unreliable communication. TCP is a connection-oriented protocol that ensures reliable communication.

    • UDP stands for User Datagram Protocol, while TCP stands for Transmission Control Protocol.

    • UDP is faster than TCP because it does not establish a connection before sending data.

    • UDP does not guarantee delivery of packets, while TCP ensures reliable delivery.

    • TCP uses ...

  • Answered by AI
  • Q18. Network layers for network
  • Ans. 

    The network layers for network are a hierarchical structure that defines the communication process between devices.

    • The network layers are a way to organize and standardize the communication process in a network.

    • There are several models that define the network layers, such as the OSI model and the TCP/IP model.

    • Each layer has a specific function and interacts with the layers above and below it.

    • The layers provide abstract...

  • Answered by AI
  • Q19. You are not able to login through putty, troubleshooting
  • Ans. 

    Troubleshooting steps for not being able to login through putty

    • Check network connectivity

    • Verify correct IP address and port number

    • Ensure SSH service is running on the server

    • Check firewall settings

    • Verify correct username and password

    • Check if the server is reachable and not down

  • Answered by AI
  • Q20. You know about scripting , bash or sh
  • Ans. 

    Yes, I am familiar with scripting in bash and sh.

    • I have experience writing scripts in bash and sh.

    • I am comfortable with using variables, loops, conditionals, and functions in bash and sh scripts.

    • I have used bash and sh scripts for automating tasks, managing system configurations, and troubleshooting.

    • I am familiar with common commands and utilities in bash and sh, such as grep, sed, awk, and find.

    • I have written scripts ...

  • Answered by AI

    Skills evaluated in this interview

    Pinnacle Technology Interview FAQs

    How many rounds are there in Pinnacle Technology System Administrator interview?
    Pinnacle Technology interview process usually has 2 rounds. The most common rounds in the Pinnacle Technology interview process are Aptitude Test and One-on-one Round.
    What are the top questions asked in Pinnacle Technology System Administrator interview?

    Some of the top questions asked at the Pinnacle Technology System Administrator interview -

    1. what is port numb...read more
    2. what is ip addre...read more

    Tell us how to improve this page.

    Software Developer
    28 salaries
    unlock blur

    ₹2.2 L/yr - ₹8.4 L/yr

    Software Engineer
    26 salaries
    unlock blur

    ₹3.6 L/yr - ₹13.6 L/yr

    Plsql Developer
    15 salaries
    unlock blur

    ₹6 L/yr - ₹8.5 L/yr

    Java Developer
    14 salaries
    unlock blur

    ₹1.2 L/yr - ₹9 L/yr

    DOT NET Developer
    13 salaries
    unlock blur

    ₹1.9 L/yr - ₹13.1 L/yr

    Explore more salaries
    Compare Pinnacle Technology with

    Infosys

    3.7
    Compare

    TCS

    3.7
    Compare

    Wipro

    3.7
    Compare

    HCLTech

    3.5
    Compare
    Did you find this page helpful?
    Yes No
    write
    Share an Interview