i
Precision Infomatic M Pvt Ltd
Filter interviews by
Clear (1)
Memory ballooning is a memory reclamation technique used in virtualization to reclaim memory from virtual machines.
Memory ballooning is a technique used by hypervisors to reclaim memory from virtual machines by inflating or 'ballooning' a balloon driver inside the guest OS.
The hypervisor can then allocate this reclaimed memory to other virtual machines that need it more.
Memory ballooning is typically used when the host...
Check for underlying issues, restart services, verify network connectivity, review logs, escalate if necessary.
Check for any underlying issues that may have caused the cluster to go down
Restart the necessary services related to the cluster
Verify network connectivity between the cluster nodes
Review logs for any error messages or warnings
Escalate the issue to higher level support if necessary
Vm migration issue can occur due to compatibility issues, network problems, or insufficient resources.
Check for compatibility issues between source and target environments
Ensure network connectivity and bandwidth are sufficient for migration
Verify that there are enough resources (CPU, memory, storage) available for the migration
Consider using migration tools like VMware vMotion or Storage vMotion
Troubleshoot any errors
PSOD stands for Purple Screen of Death. It is a critical error in VMware that requires troubleshooting to fix.
Check for hardware issues such as faulty memory or CPU
Review system logs for any error messages leading up to the PSOD
Update VMware ESXi to the latest version
Check for compatibility issues with hardware or software
Contact VMware support for further assistance
The Vm kernel is a Unix-like operating system that runs on the physical hardware and manages the virtual machines on a VMware host.
It is a thin layer of software that runs directly on the host hardware to enable multiple operating systems to run on a single physical server.
It is responsible for managing the physical resources of the host machine and providing a platform for virtual machines to run.
The Vm kernel is high...
VSS is a virtual switch that operates at the host level, while Distributed Switch is a single switch that spans multiple hosts.
VSS is specific to each host, while Distributed Switch is shared across multiple hosts.
VSS is managed at the host level, while Distributed Switch is managed centrally.
Distributed Switch allows for centralized network configuration and monitoring.
VSS is limited to the host's physical NICs, while...
Thin provisioning allocates storage space on demand, while thick provisioning allocates all space upfront.
Thin provisioning only uses space as data is written, maximizing storage efficiency.
Thick provisioning allocates all space upfront, ensuring immediate availability but potentially wasting space.
Thin provisioning is more flexible and allows for overcommitting storage resources.
Thick provisioning is more suitable for...
Template is a master copy used to create multiple identical VMs, while Clone is a copy of an existing VM.
Template is a blueprint for creating VMs, while Clone is a duplicate of an existing VM.
Templates are used for deploying multiple VMs with the same configuration, while Clones are used for creating copies of specific VMs.
Templates are typically read-only, while Clones can be modified independently.
Clones retain the s...
Orphaned status means the virtual machine is no longer associated with its parent resource pool or host.
Orphaned virtual machines can occur when a host fails or when a VM is manually removed from a resource pool.
Orphaned VMs can still consume resources and may need to be manually removed from the inventory.
To resolve orphaned status, the VM can be re-registered with a host or resource pool.
Virtual machine may be inaccessible due to various reasons such as network issues, configuration errors, or resource constraints.
Check network connectivity to the virtual machine
Verify that the virtual machine is powered on
Ensure that the virtual machine's configuration is correct
Check for resource constraints such as CPU or memory usage
Review logs for any error messages or warnings
TPM stands for Trusted Platform Module, a hardware-based security feature that stores cryptographic keys and provides secure boot capabilities.
TPM is a microchip that is typically installed on the motherboard of a computer or server.
It provides hardware-based security functions such as secure boot, key storage, and encryption.
TPM helps ensure the integrity of the system by verifying that it has not been tampered with.
I...
Admission control is a feature in Vmware that ensures resources are available for virtual machines during failover or migration.
Admission control prevents virtual machines from being powered on if it would violate resource constraints
It helps maintain high availability by ensuring that there are enough resources available for failover
Admission control policies include slot policy, dedicated failover hosts, and resource
Protocols used for Storage include iSCSI, Fibre Channel, NFS, and SMB.
iSCSI (Internet Small Computer System Interface)
Fibre Channel
NFS (Network File System)
SMB (Server Message Block)
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There were 3 interview rounds.
I was interviewed before Feb 2023.
Virtualization is the process of creating a virtual version of a device or resource, such as a server, storage device, network or operating system.
Virtualization allows multiple virtual machines to run on a single physical machine, maximizing resources and increasing efficiency.
Thin provisioning allocates storage space on an as-needed basis, while thick provisioning allocates all required space upfront.
Snapshots captur...
ESXi OS upgrade and rollback procedures involve careful planning and execution to ensure system stability.
Before upgrading, ensure compatibility with hardware and software requirements
Take backups of important data and configurations
Use VMware Update Manager or command line interface for upgrade process
Monitor upgrade progress and resolve any issues that may arise
For rollback, restore from backups taken before upgrade
Thick provisioned eager and lazy zero are types of disk provisioning in VMware.
Thick provisioned eager zeroed: allocates all the space for a virtual disk at the time of creation and zeros out the disk blocks immediately.
Thick provisioned lazy zeroed: allocates all the space for a virtual disk at the time of creation but does not zero out the disk blocks until data is written to them.
Snapshot background process involves creating a point-in-time copy of a virtual machine's disk file.
Snapshots are created to capture the current state of a virtual machine's disk file
When a snapshot is initiated through vCenter or ESXi host, a background process is triggered to create the snapshot
The background process involves freezing the virtual machine's disk file, creating a delta disk to store changes, and redire
Lockdown technology in VMware restricts access to the ESXi host directly, allowing only authorized users to perform specific actions.
Lockdown mode can be enabled to prevent direct access to the ESXi host
Only users with specific permissions can perform actions on the host
Helps enhance security by limiting access to the host
Can be configured through the vSphere Client or vSphere Web Client
Snapshots can cause performance issues, take up storage space, and may not capture all changes.
Snapshots can impact VM performance as they introduce additional overhead.
Snapshots can quickly consume storage space, especially if multiple snapshots are taken.
Snapshots may not capture all changes if there are active processes or open files during the snapshot creation.
Snapshots are not a substitute for regular backups and...
Affinity and anti-affinity rules are used in VMware to control the placement of virtual machines on hosts.
Affinity rules specify that certain virtual machines should run on the same host
Anti-affinity rules specify that certain virtual machines should not run on the same host
These rules help optimize performance, availability, and resource utilization
Examples: Affinity rule for a web server and database server to run on...
I applied via Naukri.com and was interviewed before Oct 2023. There was 1 interview round.
I have handled major incidents such as server crashes, network outages, and data breaches.
Server crashes
Network outages
Data breaches
I applied via Naukri.com and was interviewed in Aug 2022. There were 3 interview rounds.
I was interviewed in Sep 2017.
I applied via Referral
Data structures are a way to organize and store data efficiently.
Data structures are used to store and manipulate data in a structured manner.
They provide different ways to access and perform operations on the data.
Examples include arrays, linked lists, stacks, queues, trees, and graphs.
Developed a web-based project management tool for tracking tasks and deadlines
Used React.js for front-end development
Implemented RESTful APIs using Node.js and Express for back-end
Utilized MongoDB for database management
Incorporated user authentication and authorization features
Integrated real-time notifications using Socket.io
My name is John Smith.
Full name is John Smith
Common name in English-speaking countries
Easy to remember and pronounce
The question is unrelated to the medical field and is not a puzzle or riddle.
The question is asking about the meaning of the interviewer's name.
You can ask the interviewer about the origin or cultural significance of their name.
You can also mention that names often have different meanings in different languages or cultures.
My strengths include problem-solving skills, attention to detail, and strong communication abilities.
Strong problem-solving skills - I enjoy tackling complex issues and finding creative solutions.
Attention to detail - I am meticulous in my work and strive for accuracy in all tasks.
Strong communication abilities - I can effectively convey ideas and collaborate with team members.
based on 1 interview
Interview experience
System Engineer
827
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Systems Engineer
249
salaries
| ₹0 L/yr - ₹0 L/yr |
Desktop Support Engineer
115
salaries
| ₹0 L/yr - ₹0 L/yr |
System Administrator
87
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Engineer
61
salaries
| ₹0 L/yr - ₹0 L/yr |
Wipro
TCS
HCLTech
Tech Mahindra