Add office photos
Employer?
Claim Account for FREE

Rackspace

3.9
based on 594 Reviews
Filter interviews by

20+ BML Munjal University Interview Questions and Answers

Updated 27 Mar 2024

Q1. Where would you go to review windows events/logs? What kind of events would you see in each log App/security/system?

Ans.

Windows events/logs can be reviewed in Event Viewer. App log shows application events, Security log shows security-related events, and System log shows system events.

  • Open Event Viewer by typing 'eventvwr' in the Run dialog box

  • Application log shows events related to applications and programs

  • Security log shows events related to security, such as logon attempts and resource access

  • System log shows events related to the operating system, such as driver failures and system crashes

Add your answer

Q2. What is load average in Linux? What is the command and path for the same?

Ans.

Load average is the average number of processes waiting to run on a CPU. Command: 'uptime' or 'top'.

  • Load average is a measure of system utilization.

  • It is the average number of processes waiting to run on a CPU.

  • It is calculated over a period of time, usually 1, 5, and 15 minutes.

  • High load average indicates that the system is overloaded.

  • Command to check load average: 'uptime' or 'top'.

  • Path for 'uptime': /usr/bin/uptime

  • Path for 'top': /usr/bin/top

Add your answer

Q3. Why would you choose a Cloud solution over a "traditional" dedicated solution?

Ans.

Cloud solutions offer scalability, flexibility, and cost-effectiveness compared to traditional dedicated solutions.

  • Scalability: Cloud solutions can easily scale up or down based on demand.

  • Flexibility: Cloud solutions offer more flexibility in terms of customization and integration with other services.

  • Cost-effectiveness: Cloud solutions can be more cost-effective as they eliminate the need for expensive hardware and maintenance costs.

  • Examples: AWS, Azure, Google Cloud Platform

Add your answer

Q4. Difference between public and private cloud? Which one is more secure and why?

Ans.

Public cloud is shared by multiple organizations while private cloud is dedicated to a single organization. Private cloud is more secure.

  • Public cloud is accessible to anyone on the internet while private cloud is accessible only to authorized users.

  • Public cloud is less secure as it is shared by multiple organizations and there is a risk of data breaches.

  • Private cloud is more secure as it is dedicated to a single organization and has more control over security measures.

  • Example...read more

Add your answer
Discover BML Munjal University interview dos and don'ts from real experiences

Q5. What is a Cron job and set it up process in Linux?

Ans.

A Cron job is a scheduled task that runs automatically at specified intervals in Linux.

  • Cron is a time-based job scheduler in Linux.

  • It is used to automate repetitive tasks like backups, updates, etc.

  • Cron jobs are defined in a crontab file.

  • The syntax for setting up a Cron job is: * * * * * command-to-be-executed

  • The five asterisks represent the minute, hour, day of the month, month, and day of the week respectively.

  • For example, to run a script every day at 3 AM, the syntax would...read more

Add your answer

Q6. Cloud hosting Advantages and Disadvantages of cloud technology?

Ans.

Cloud technology offers flexibility and scalability, but also comes with security concerns and potential downtime.

  • Advantages: flexibility, scalability, cost-effectiveness, accessibility, automatic updates

  • Disadvantages: security concerns, potential downtime, dependency on internet connectivity, limited control over infrastructure

  • Examples: Amazon Web Services, Microsoft Azure, Google Cloud Platform

  • Security concerns: data breaches, unauthorized access, data loss

  • Downtime: can res...read more

Add your answer
Are these interview questions helpful?

Q7. Difference between PowerShell and CMD? Troubleshooting commands for both.

Ans.

PowerShell is a more advanced command-line interface than CMD, with more features and capabilities.

  • PowerShell is object-oriented, while CMD is text-based

  • PowerShell has more advanced scripting capabilities

  • PowerShell has more built-in commands and modules

  • CMD is more limited in its capabilities

  • Troubleshooting commands for PowerShell include Get-Help, Get-Command, and Test-NetConnection

  • Troubleshooting commands for CMD include Ping, Ipconfig, and Netstat

Add your answer

Q8. Difference between public IP and private IP?

Ans.

Public IP is accessible from the internet while private IP is only accessible within a local network.

  • Public IP is assigned by the ISP and is unique to the internet.

  • Private IP is assigned by a router and is unique within a local network.

  • Public IP allows devices to communicate with the internet.

  • Private IP allows devices to communicate within a local network.

  • Examples of public IP include 8.8.8.8 and 216.58.194.174.

  • Examples of private IP include 192.168.0.1 and 10.0.0.1.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How AD replication works and troubleshooting steps if AD replication fails.

Ans.

AD replication is the process of copying and distributing data between domain controllers in Active Directory.

  • AD replication ensures that changes made on one domain controller are synchronized with other domain controllers in the network.

  • Troubleshooting steps for AD replication failure include checking network connectivity, DNS configuration, firewall settings, and replication topology.

  • Common tools used for troubleshooting AD replication issues include Repadmin, DCDiag, and E...read more

Add your answer

Q10. How to check who owns an IP?

Ans.

To check who owns an IP, use a WHOIS lookup tool.

  • Use a WHOIS lookup tool to find the owner of an IP address.

  • WHOIS lookup tools can be found online or through command line interfaces.

  • Enter the IP address into the WHOIS lookup tool to retrieve information about the owner.

  • The information provided may include the owner's name, contact information, and organization.

  • Some WHOIS lookup tools may require payment or registration to access certain information.

Add your answer

Q11. Load balancers and how they work

Ans.

Load balancers distribute network traffic across multiple servers to improve performance and availability.

  • Load balancers can be hardware or software-based

  • They use algorithms to distribute traffic based on factors like server health and response time

  • Load balancers can improve scalability and reduce downtime

  • Examples of load balancers include NGINX, F5, and Amazon ELB

Add your answer

Q12. What is Active directory Tree, Forest, OU, sites, DNS

Ans.

Active Directory is a directory service that stores information about objects on a network and allows for centralized management.

  • Active Directory Tree: A collection of domains that share a contiguous namespace.

  • Active Directory Forest: A collection of one or more AD trees that do not share a contiguous namespace.

  • OU (Organizational Unit): A container within a domain that can hold users, groups, computers, and other OUs.

  • Sites: Physical or logical network locations that help opti...read more

Add your answer

Q13. What are cloud Service Models?

Ans.

Cloud service models are the different ways in which cloud computing services are offered to users.

  • There are three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)

  • IaaS provides users with virtualized computing resources, such as servers and storage, over the internet

  • PaaS provides users with a platform for developing, running, and managing applications without having to worry about the underlying infr...read more

Add your answer

Q14. Difference between HTTP and HTTPS?

Ans.

HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.

  • HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.

  • HTTP operates on port 80 while HTTPS operates on port 443.

  • HTTP is vulnerable to attacks like man-in-the-middle and eavesdropping while HTTPS is secure against such attacks.

  • HTTPS uses SSL/TLS encryption to secure the communication between the client and server.

  • Examples of websites using HTTPS are banking websites...read more

Add your answer

Q15. Difference between IDS and IPS?

Ans.

IDS detects and alerts about potential threats, while IPS detects and prevents them.

  • IDS stands for Intrusion Detection System

  • IPS stands for Intrusion Prevention System

  • IDS monitors network traffic and alerts about potential threats

  • IPS actively blocks potential threats

  • IDS is passive and does not interfere with network traffic

  • IPS is active and can modify or block network traffic

  • IDS can be used for forensic analysis after an attack

  • IPS can prevent attacks in real-time

  • Examples of I...read more

Add your answer

Q16. Protocols used to login to Linux server.

Ans.

SSH and Telnet are the most commonly used protocols to login to Linux servers.

  • SSH (Secure Shell) is a secure protocol that encrypts the data transmitted between the client and server.

  • Telnet is an unencrypted protocol that transmits data in plain text.

  • SSH is the recommended protocol for logging in to Linux servers due to its security features.

  • Other protocols like FTP and SFTP can also be used for file transfer and remote access.

  • Authentication methods like password-based, key-b...read more

Add your answer

Q17. Diffrent between VM Cloning and templete.

Ans.

VM cloning creates an exact copy of a virtual machine, while a template is a pre-configured image used to create new VMs.

  • VM cloning duplicates an existing VM with all configurations and data intact.

  • Templates are pre-configured images used as a baseline for creating new VMs.

  • Cloning results in an identical copy, while templates are used as a starting point for customization.

  • Cloning is useful for creating backups or testing, while templates streamline VM deployment.

  • Example: Clon...read more

Add your answer

Q18. OSI vs TCP/IP

Ans.

OSI and TCP/IP are both networking models, but OSI has 7 layers while TCP/IP has 4 layers.

  • OSI stands for Open Systems Interconnection and TCP/IP stands for Transmission Control Protocol/Internet Protocol.

  • OSI has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • TCP/IP has 4 layers: Network Interface, Internet, Transport, and Application.

  • OSI is a theoretical model while TCP/IP is a practical model used in the internet.

  • TCP/IP is more wide...read more

Add your answer

Q19. Firewalls and its types

Ans.

Firewalls are network security systems that monitor and control incoming and outgoing network traffic.

  • Firewalls can be hardware, software, or cloud-based.

  • Types of firewalls include packet-filtering, stateful inspection, proxy, and next-generation firewalls.

  • Packet-filtering firewalls examine packets and filter them based on pre-defined rules.

  • Stateful inspection firewalls keep track of the state of network connections and filter traffic based on that information.

  • Proxy firewalls...read more

Add your answer

Q20. RAID and clustering in Windows

Ans.

RAID and clustering are two different technologies used in Windows for data redundancy and high availability.

  • RAID stands for Redundant Array of Independent Disks and is used to combine multiple physical disks into a single logical unit for data redundancy and performance improvement.

  • Clustering is used to provide high availability for applications and services by grouping multiple servers together to act as a single system.

  • Windows Server supports various RAID levels such as RA...read more

Add your answer

Q21. What is Sysprep ?

Ans.

Sysprep is a tool used to prepare a Windows system for cloning or imaging by removing unique identifiers and resetting system settings.

  • Sysprep stands for System Preparation Tool.

  • It is used to remove system-specific information from a Windows installation, such as unique identifiers like SID and computer name.

  • Sysprep resets the Windows activation and licensing information.

  • After running Sysprep, the system is ready to be captured as an image for deployment on multiple machines.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at BML Munjal University

based on 1 interviews
1 Interview rounds
Technical Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Technical Support Engineer Interview Questions from Similar Companies

4.0
 • 22 Interview Questions
3.3
 • 20 Interview Questions
4.3
 • 15 Interview Questions
4.2
 • 13 Interview Questions
3.7
 • 12 Interview Questions
3.7
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter