i
Precision Infomatic M Pvt Ltd
Filter interviews by
I was interviewed in Jan 2025.
It's a scenario based task
Memory ballooning is a memory reclamation technique used in virtualization to reclaim memory from virtual machines.
Memory ballooning is a technique used by hypervisors to reclaim memory from virtual machines by inflating or 'ballooning' a balloon driver inside the guest OS.
The hypervisor can then allocate this reclaimed memory to other virtual machines that need it more.
Memory ballooning is typically used when the host...
Check for underlying issues, restart services, verify network connectivity, review logs, escalate if necessary.
Check for any underlying issues that may have caused the cluster to go down
Restart the necessary services related to the cluster
Verify network connectivity between the cluster nodes
Review logs for any error messages or warnings
Escalate the issue to higher level support if necessary
Vm migration issue can occur due to compatibility issues, network problems, or insufficient resources.
Check for compatibility issues between source and target environments
Ensure network connectivity and bandwidth are sufficient for migration
Verify that there are enough resources (CPU, memory, storage) available for the migration
Consider using migration tools like VMware vMotion or Storage vMotion
Troubleshoot any errors
PSOD stands for Purple Screen of Death. It is a critical error in VMware that requires troubleshooting to fix.
Check for hardware issues such as faulty memory or CPU
Review system logs for any error messages leading up to the PSOD
Update VMware ESXi to the latest version
Check for compatibility issues with hardware or software
Contact VMware support for further assistance
The Vm kernel is a Unix-like operating system that runs on the physical hardware and manages the virtual machines on a VMware host.
It is a thin layer of software that runs directly on the host hardware to enable multiple operating systems to run on a single physical server.
It is responsible for managing the physical resources of the host machine and providing a platform for virtual machines to run.
The Vm kernel is high...
VSS is a virtual switch that operates at the host level, while Distributed Switch is a single switch that spans multiple hosts.
VSS is specific to each host, while Distributed Switch is shared across multiple hosts.
VSS is managed at the host level, while Distributed Switch is managed centrally.
Distributed Switch allows for centralized network configuration and monitoring.
VSS is limited to the host's physical NICs, while...
Thin provisioning allocates storage space on demand, while thick provisioning allocates all space upfront.
Thin provisioning only uses space as data is written, maximizing storage efficiency.
Thick provisioning allocates all space upfront, ensuring immediate availability but potentially wasting space.
Thin provisioning is more flexible and allows for overcommitting storage resources.
Thick provisioning is more suitable for...
Template is a master copy used to create multiple identical VMs, while Clone is a copy of an existing VM.
Template is a blueprint for creating VMs, while Clone is a duplicate of an existing VM.
Templates are used for deploying multiple VMs with the same configuration, while Clones are used for creating copies of specific VMs.
Templates are typically read-only, while Clones can be modified independently.
Clones retain the s...
Orphaned status means the virtual machine is no longer associated with its parent resource pool or host.
Orphaned virtual machines can occur when a host fails or when a VM is manually removed from a resource pool.
Orphaned VMs can still consume resources and may need to be manually removed from the inventory.
To resolve orphaned status, the VM can be re-registered with a host or resource pool.
Virtual machine may be inaccessible due to various reasons such as network issues, configuration errors, or resource constraints.
Check network connectivity to the virtual machine
Verify that the virtual machine is powered on
Ensure that the virtual machine's configuration is correct
Check for resource constraints such as CPU or memory usage
Review logs for any error messages or warnings
TPM stands for Trusted Platform Module, a hardware-based security feature that stores cryptographic keys and provides secure boot capabilities.
TPM is a microchip that is typically installed on the motherboard of a computer or server.
It provides hardware-based security functions such as secure boot, key storage, and encryption.
TPM helps ensure the integrity of the system by verifying that it has not been tampered with.
I...
Admission control is a feature in Vmware that ensures resources are available for virtual machines during failover or migration.
Admission control prevents virtual machines from being powered on if it would violate resource constraints
It helps maintain high availability by ensuring that there are enough resources available for failover
Admission control policies include slot policy, dedicated failover hosts, and resource
Protocols used for Storage include iSCSI, Fibre Channel, NFS, and SMB.
iSCSI (Internet Small Computer System Interface)
Fibre Channel
NFS (Network File System)
SMB (Server Message Block)
I am a highly experienced Senior Systems Engineer with a strong background in designing and implementing complex IT solutions.
Over 10 years of experience in system design and implementation
Expertise in virtualization technologies such as VMware and Hyper-V
Proficient in network infrastructure design and troubleshooting
Strong knowledge of cloud computing platforms like AWS and Azure
Certified in relevant technologies such
Precision Infomatic M Pvt Ltd interview questions for popular designations
I applied via Job Portal
DHCP is a network protocol that assigns IP addresses to devices on a network. Active Directory is a directory service used to manage network resources. DNS translates domain names to IP addresses. Service Now is a cloud-based platform for IT service management.
DHCP assigns IP addresses dynamically to devices on a network
Active Directory is a directory service used to manage users, computers, and other network resources
...
Get interview-ready with Top Precision Infomatic M Pvt Ltd Interview Questions
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
I applied via Walk-in
To take data backup of a server, you can use backup software or built-in tools to create regular backups of important data.
Use backup software like Veeam, Acronis, or Backup Exec to schedule regular backups
Utilize built-in tools like Windows Server Backup or Time Machine for Mac servers
Store backups on external hard drives, network-attached storage (NAS), or cloud storage for redundancy
Test backups regularly to ensure ...
To repair the C drive of a computer, you can use the built-in Windows tools like Check Disk or System File Checker.
Run Check Disk utility to scan and fix errors on the C drive
Use System File Checker tool to repair corrupted system files
Perform a System Restore to revert the system back to a previous working state
Reinstall Windows operating system if the above steps do not work
To backup Outlook data, you can use the built-in export feature to save emails, contacts, and calendar items to a PST file.
Open Outlook and go to File > Open & Export > Import/Export.
Select 'Export to a file' and click Next.
Choose 'Outlook Data File (.pst)' and select the items you want to backup.
Specify the location and name for the backup file, then click Finish.
You can also set up automatic backups using third-party
A forest is a large area covered chiefly with trees and undergrowth.
A forest is a complex ecosystem with various plant and animal species.
Forests play a crucial role in maintaining biodiversity and regulating climate.
Examples of forests include rainforests, deciduous forests, and coniferous forests.
Topology refers to the arrangement of nodes and connections in a network.
Topology defines how devices are connected in a network
Common topologies include bus, star, ring, mesh, and hybrid
Each topology has its own advantages and disadvantages
Topology affects network performance, scalability, and fault tolerance
Error OF outlook
Check internet connection
Restart Outlook
Update Outlook to latest version
Check for any conflicting add-ins
Repair Outlook data file
MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC address stands for Media Access Control address.
It is a 12-digit hexadecimal number typically written in the format XX:XX:XX:XX:XX:XX.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are hardcoded into the network interface card.
MAC addresses are used in Etherne
The Internet is a global network of interconnected computers that allows for communication, information sharing, and access to resources.
Global network of interconnected computers
Allows for communication, information sharing, and resource access
Uses protocols like TCP/IP for data transmission
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It inspects all incoming and outgoing traffic and decides whether to allow or block specific traffic based on a set of security rules.
Firewalls can be hardware-based or software-based, and...
I applied via Naukri.com and was interviewed in Oct 2023. There were 3 interview rounds.
Top trending discussions
The duration of Precision Infomatic M Pvt Ltd interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 35 interviews
Interview experience
based on 721 reviews
Rating in categories
Vijayawada,
Hyderabad / Secunderabad
+11-6 Yrs
₹ 0.6-3 LPA
System Engineer
841
salaries
| ₹1 L/yr - ₹4.5 L/yr |
Senior Systems Engineer
247
salaries
| ₹1.9 L/yr - ₹4.9 L/yr |
Desktop Support Engineer
115
salaries
| ₹1.3 L/yr - ₹4.2 L/yr |
System Administrator
89
salaries
| ₹1.2 L/yr - ₹6 L/yr |
Network Engineer
61
salaries
| ₹1.5 L/yr - ₹5.5 L/yr |
Wipro
TCS
HCLTech
Tech Mahindra