Rackspace
60+ Express Logistics Interview Questions and Answers
Q1. Where would you go to review windows events/logs? What kind of events would you see in each log App/security/system?
Windows events/logs can be reviewed in Event Viewer. App log shows application events, Security log shows security-related events, and System log shows system events.
Open Event Viewer by typing 'eventvwr' in the Run dialog box
Application log shows events related to applications and programs
Security log shows events related to security, such as logon attempts and resource access
System log shows events related to the operating system, such as driver failures and system crashes
Q2. What is load average in Linux? What is the command and path for the same?
Load average is the average number of processes waiting to run on a CPU. Command: 'uptime' or 'top'.
Load average is a measure of system utilization.
It is the average number of processes waiting to run on a CPU.
It is calculated over a period of time, usually 1, 5, and 15 minutes.
High load average indicates that the system is overloaded.
Command to check load average: 'uptime' or 'top'.
Path for 'uptime': /usr/bin/uptime
Path for 'top': /usr/bin/top
Q3. Why would you choose a Cloud solution over a "traditional" dedicated solution?
Cloud solutions offer scalability, flexibility, and cost-effectiveness compared to traditional dedicated solutions.
Scalability: Cloud solutions can easily scale up or down based on demand.
Flexibility: Cloud solutions offer more flexibility in terms of customization and integration with other services.
Cost-effectiveness: Cloud solutions can be more cost-effective as they eliminate the need for expensive hardware and maintenance costs.
Examples: AWS, Azure, Google Cloud Platform
Q4. Difference between public and private cloud? Which one is more secure and why?
Public cloud is shared by multiple organizations while private cloud is dedicated to a single organization. Private cloud is more secure.
Public cloud is accessible to anyone on the internet while private cloud is accessible only to authorized users.
Public cloud is less secure as it is shared by multiple organizations and there is a risk of data breaches.
Private cloud is more secure as it is dedicated to a single organization and has more control over security measures.
Example...read more
Q5. What is a Cron job and set it up process in Linux?
A Cron job is a scheduled task that runs automatically at specified intervals in Linux.
Cron is a time-based job scheduler in Linux.
It is used to automate repetitive tasks like backups, updates, etc.
Cron jobs are defined in a crontab file.
The syntax for setting up a Cron job is: * * * * * command-to-be-executed
The five asterisks represent the minute, hour, day of the month, month, and day of the week respectively.
For example, to run a script every day at 3 AM, the syntax would...read more
Q6. What is All path down & permanent device loss? How to troubleshoot or which log to check for the event/ sense code?
All path down is a condition where all paths to a storage device become unavailable. Permanent device loss refers to a situation where a storage device is permanently inaccessible.
All path down occurs when all paths to a storage device fail, resulting in loss of connectivity.
Permanent device loss happens when a storage device becomes permanently inaccessible due to hardware failure or other issues.
To troubleshoot all path down, check the host logs for any error messages relat...read more
Q7. Cloud hosting Advantages and Disadvantages of cloud technology?
Cloud technology offers flexibility and scalability, but also comes with security concerns and potential downtime.
Advantages: flexibility, scalability, cost-effectiveness, accessibility, automatic updates
Disadvantages: security concerns, potential downtime, dependency on internet connectivity, limited control over infrastructure
Examples: Amazon Web Services, Microsoft Azure, Google Cloud Platform
Security concerns: data breaches, unauthorized access, data loss
Downtime: can res...read more
Q8. Difference between PowerShell and CMD? Troubleshooting commands for both.
PowerShell is a more advanced command-line interface than CMD, with more features and capabilities.
PowerShell is object-oriented, while CMD is text-based
PowerShell has more advanced scripting capabilities
PowerShell has more built-in commands and modules
CMD is more limited in its capabilities
Troubleshooting commands for PowerShell include Get-Help, Get-Command, and Test-NetConnection
Troubleshooting commands for CMD include Ping, Ipconfig, and Netstat
Q9. Difference between public IP and private IP?
Public IP is accessible from the internet while private IP is only accessible within a local network.
Public IP is assigned by the ISP and is unique to the internet.
Private IP is assigned by a router and is unique within a local network.
Public IP allows devices to communicate with the internet.
Private IP allows devices to communicate within a local network.
Examples of public IP include 8.8.8.8 and 216.58.194.174.
Examples of private IP include 192.168.0.1 and 10.0.0.1.
Q10. How AD replication works and troubleshooting steps if AD replication fails.
AD replication is the process of copying and distributing data between domain controllers in Active Directory.
AD replication ensures that changes made on one domain controller are synchronized with other domain controllers in the network.
Troubleshooting steps for AD replication failure include checking network connectivity, DNS configuration, firewall settings, and replication topology.
Common tools used for troubleshooting AD replication issues include Repadmin, DCDiag, and E...read more
Q11. How to check who owns an IP?
To check who owns an IP, use a WHOIS lookup tool.
Use a WHOIS lookup tool to find the owner of an IP address.
WHOIS lookup tools can be found online or through command line interfaces.
Enter the IP address into the WHOIS lookup tool to retrieve information about the owner.
The information provided may include the owner's name, contact information, and organization.
Some WHOIS lookup tools may require payment or registration to access certain information.
Q12. Load balancers and how they work
Load balancers distribute network traffic across multiple servers to improve performance and availability.
Load balancers can be hardware or software-based
They use algorithms to distribute traffic based on factors like server health and response time
Load balancers can improve scalability and reduce downtime
Examples of load balancers include NGINX, F5, and Amazon ELB
Q13. What is Active directory Tree, Forest, OU, sites, DNS
Active Directory is a directory service that stores information about objects on a network and allows for centralized management.
Active Directory Tree: A collection of domains that share a contiguous namespace.
Active Directory Forest: A collection of one or more AD trees that do not share a contiguous namespace.
OU (Organizational Unit): A container within a domain that can hold users, groups, computers, and other OUs.
Sites: Physical or logical network locations that help opti...read more
Q14. What are cloud Service Models?
Cloud service models are the different ways in which cloud computing services are offered to users.
There are three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)
IaaS provides users with virtualized computing resources, such as servers and storage, over the internet
PaaS provides users with a platform for developing, running, and managing applications without having to worry about the underlying infr...read more
Q15. Difference between HTTP and HTTPS?
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is vulnerable to attacks like man-in-the-middle and eavesdropping while HTTPS is secure against such attacks.
HTTPS uses SSL/TLS encryption to secure the communication between the client and server.
Examples of websites using HTTPS are banking websites...read more
Q16. Difference between IDS and IPS?
IDS detects and alerts about potential threats, while IPS detects and prevents them.
IDS stands for Intrusion Detection System
IPS stands for Intrusion Prevention System
IDS monitors network traffic and alerts about potential threats
IPS actively blocks potential threats
IDS is passive and does not interfere with network traffic
IPS is active and can modify or block network traffic
IDS can be used for forensic analysis after an attack
IPS can prevent attacks in real-time
Examples of I...read more
Q17. Protocols used to login to Linux server.
SSH and Telnet are the most commonly used protocols to login to Linux servers.
SSH (Secure Shell) is a secure protocol that encrypts the data transmitted between the client and server.
Telnet is an unencrypted protocol that transmits data in plain text.
SSH is the recommended protocol for logging in to Linux servers due to its security features.
Other protocols like FTP and SFTP can also be used for file transfer and remote access.
Authentication methods like password-based, key-b...read more
Q18. Diffrent between VM Cloning and templete.
VM cloning creates an exact copy of a virtual machine, while a template is a pre-configured image used to create new VMs.
VM cloning duplicates an existing VM with all configurations and data intact.
Templates are pre-configured images used as a baseline for creating new VMs.
Cloning results in an identical copy, while templates are used as a starting point for customization.
Cloning is useful for creating backups or testing, while templates streamline VM deployment.
Example: Clon...read more
Q19. Troubleshoot ESXi in a not responding & disconnected state?
To troubleshoot ESXi in a not responding & disconnected state, check network connectivity, reboot the host, and verify hardware.
Check network connectivity to ensure the host is reachable
Reboot the host to clear any hung processes
Verify hardware to ensure there are no underlying issues causing the disconnect
Check logs for any errors or warnings that may indicate the cause of the issue
Q20. DRS Affinity/ Anti-affinity rule? Used case of must and should?
DRS Affinity/Anti-affinity rules are used to control VM placement on hosts in a cluster.
Affinity rules ensure that VMs are placed on the same host
Anti-affinity rules ensure that VMs are placed on different hosts
Must rules enforce the rule strictly, while should rules try to enforce the rule but allow exceptions
Use cases include ensuring high availability, separating workloads, and optimizing resource utilization
Q21. OSI vs TCP/IP
OSI and TCP/IP are both networking models, but OSI has 7 layers while TCP/IP has 4 layers.
OSI stands for Open Systems Interconnection and TCP/IP stands for Transmission Control Protocol/Internet Protocol.
OSI has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
TCP/IP has 4 layers: Network Interface, Internet, Transport, and Application.
OSI is a theoretical model while TCP/IP is a practical model used in the internet.
TCP/IP is more wide...read more
Q22. Firewalls and its types
Firewalls are network security systems that monitor and control incoming and outgoing network traffic.
Firewalls can be hardware, software, or cloud-based.
Types of firewalls include packet-filtering, stateful inspection, proxy, and next-generation firewalls.
Packet-filtering firewalls examine packets and filter them based on pre-defined rules.
Stateful inspection firewalls keep track of the state of network connections and filter traffic based on that information.
Proxy firewalls...read more
Q23. RAID and clustering in Windows
RAID and clustering are two different technologies used in Windows for data redundancy and high availability.
RAID stands for Redundant Array of Independent Disks and is used to combine multiple physical disks into a single logical unit for data redundancy and performance improvement.
Clustering is used to provide high availability for applications and services by grouping multiple servers together to act as a single system.
Windows Server supports various RAID levels such as RA...read more
Q24. Whats the name of the event where all Scrum Masters get together?
Q25. Whats Scope Creep? What would you do if you encounter any?
Scope creep is the gradual expansion of project scope beyond its original goals and objectives.
Identify the cause of scope creep
Evaluate the impact on project timeline and budget
Communicate with stakeholders and team members
Revisit project goals and objectives
Implement change control procedures
Document all changes and their impact
Q26. What is route map ? What is redistribution? What is prefix list ? What is acl ? Neighborship criteria in eigrp and ospf ? What is the range of private ip addresses ?
Q27. What is Sysprep ?
Sysprep is a tool used to prepare a Windows system for cloning or imaging by removing unique identifiers and resetting system settings.
Sysprep stands for System Preparation Tool.
It is used to remove system-specific information from a Windows installation, such as unique identifiers like SID and computer name.
Sysprep resets the Windows activation and licensing information.
After running Sysprep, the system is ready to be captured as an image for deployment on multiple machines.
Q28. Program to find pair of elements whose sum matches to k
Program to find pair of elements whose sum matches to k
Use a hash set to store elements as you iterate through the array
For each element, check if k minus the element is already in the set
If found, return the pair of elements
Time complexity: O(n)
Q29. Are you CCNA or CCNP certified?
Q30. What is the responsibility of Scrum Master?
The Scrum Master is responsible for ensuring that the Scrum team follows the Scrum framework and practices.
Facilitating Scrum events and ceremonies
Removing impediments that hinder the team's progress
Coaching the team on Scrum principles and practices
Ensuring the team is self-organizing and cross-functional
Protecting the team from external distractions and disruptions
Q31. What values you can bring to the process?
I can bring strong problem-solving skills, attention to detail, and a proactive approach to the process.
Strong problem-solving skills to troubleshoot and resolve issues efficiently
Attention to detail to ensure accuracy and precision in system administration tasks
Proactive approach to anticipate potential problems and implement preventive measures
Ability to work well under pressure and prioritize tasks effectively
Experience in implementing automation tools to streamline proces...read more
Q32. Challenges faced in implementing salesforce project
Implementing Salesforce project can face challenges such as resistance to change, data migration issues, and user adoption.
Resistance to change from employees who are used to old systems
Data migration issues such as incomplete or inaccurate data
User adoption challenges due to lack of training or understanding of the new system
Integration issues with other systems
Customization challenges to meet specific business needs
Security and access control challenges
Cost and resource all...read more
Q33. How Agile will help in cloud projects
Agile methodology allows for flexibility and adaptability in cloud projects, leading to quicker delivery and improved collaboration.
Agile promotes iterative development, allowing for continuous feedback and improvements in cloud projects.
Agile encourages collaboration between cross-functional teams, leading to better communication and coordination in cloud projects.
Agile helps in managing changing requirements and priorities effectively in cloud projects.
Agile enables faster ...read more
Q34. If customer having any query how u solve????
I would listen to the customer's query carefully and provide them with a clear and concise solution.
Listen attentively to the customer's query
Ask clarifying questions to fully understand the issue
Provide a clear and concise solution
Ensure customer satisfaction before ending the call
Q35. What is your expected CTC?
Q36. What is BGP in detail?
Q37. What is the HSRP protocol?
Q38. What is the BGP confederation?
Q39. what's TCP/IP, explain packet flow, port numbers
TCP/IP is a set of protocols used for communication between devices on the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
Packet flow refers to the process of data being broken down into packets and transmitted across a network.
Port numbers are used to identify specific applications or services running on a device.
TCP/IP operates at the network and transport layers of the OSI model.
Examples of TCP/IP protocols include HTTP, FTP, and SMTP.
Q40. Give an example of Risk that RTE mitigates.
Q41. what is the expected CTC ?
The expected CTC (Cost to Company) is the salary package that the employer is willing to offer for the Solution Architect role.
The expected CTC depends on various factors such as the company's budget, the candidate's experience and skills, and the market rates for Solution Architects.
It is common for Solution Architects to have a higher CTC compared to other roles due to their specialized knowledge and responsibilities.
The expected CTC can be negotiated during the interview p...read more
Q42. What are the types of cloud
Types of cloud include public, private, hybrid, and community clouds.
Public cloud: Services are delivered over the internet and shared across multiple organizations (e.g. AWS, Microsoft Azure)
Private cloud: Services are maintained on a private network and dedicated to a single organization (e.g. VMware)
Hybrid cloud: Combination of public and private clouds, allowing data and applications to be shared between them
Community cloud: Shared infrastructure among several organizatio...read more
Q43. What does prepare phase do in asol cycle.
Prepare phase in ASOL cycle involves planning and defining the project scope.
Defines project scope and objectives
Identifies stakeholders and their requirements
Develops project plan and schedule
Assesses risks and constraints
Creates project charter and obtains approval
Q44. Difference of database clone process between cdb and noncdb databases
The process of cloning a database differs between cdb and noncdb databases.
In cdb databases, the clone process involves creating a new PDB by copying the existing PDB's metadata and data files.
In noncdb databases, the clone process involves creating a new database by copying the existing database's data files and redo logs.
CDB clones can be created using the DBMS_PDB package, while non-CDB clones can be created using RMAN or the DUPLICATE command.
CDB clones can be created as ...read more
Q45. Program to find smallest element in an array
Program to find smallest element in an array of strings
Iterate through the array and compare each element to find the smallest one
Use a variable to keep track of the smallest element found so far
Return the smallest element at the end
Q46. how you manage difficult customers
I listen to their concerns, empathize with them, and offer solutions to resolve their issues.
Listen actively to their concerns
Empathize with their situation
Offer solutions to resolve their issues
Remain calm and professional
Avoid taking their behavior personally
Q47. What is cloud migration
Cloud migration is the process of moving data, applications, and other business elements from an organization's on-premises infrastructure to the cloud.
Involves transferring data, applications, and workloads to a cloud environment
Can improve scalability, flexibility, and cost-efficiency
Requires careful planning, assessment of current infrastructure, and consideration of security measures
Examples include migrating from on-premises servers to cloud platforms like AWS, Azure, or...read more
Q48. Why Cyber Security is essential
Cyber security is essential to protect sensitive information, prevent cyber attacks, and maintain business continuity.
Cyber attacks can cause financial loss, reputational damage, and legal consequences.
Sensitive information such as personal data, financial records, and intellectual property must be protected.
Cyber security measures include firewalls, antivirus software, encryption, and employee training.
Business continuity planning ensures that operations can continue in the ...read more
Q49. What are path attributes of bgp ?
BGP path attributes are used to influence the path selection process in BGP.
Path attributes are used to determine the best path for a BGP route.
Some common path attributes include AS path, next hop, origin, local preference, and MED.
AS path attribute shows the path of autonomous systems that the route has traversed.
Next hop attribute indicates the IP address of the next router that should be used to reach the destination.
Origin attribute indicates the origin of the BGP route....read more
Q50. What AD value of ebgp ?
The AD value of ebgp is used to determine the best path for external BGP routes.
AD stands for Administrative Distance and is a value assigned to different routing protocols to determine the best path for a particular route.
The AD value for ebgp is 20 by default, which means it is preferred over other external routing protocols like OSPF or RIP.
However, the AD value can be manually adjusted to give preference to a different routing protocol if needed.
Q51. Ur convincing power to the customer??
My convincing power lies in understanding the customer's needs and providing them with personalized solutions.
Active listening to understand customer's needs
Empathizing with customer's situation
Providing personalized solutions
Highlighting benefits of the product/service
Addressing customer's concerns
Using persuasive language
Building rapport with the customer
Q52. Please name all SCRUM Ceremonies
SCRUM ceremonies are events that help the team to inspect and adapt their work.
Sprint Planning: Planning the work for the upcoming sprint
Daily Scrum: A daily meeting to inspect progress and plan for the day
Sprint Review: A review of the work completed during the sprint
Sprint Retrospective: A reflection on the previous sprint and planning for improvements
Backlog Refinement: A meeting to refine and prioritize the product backlog
Q53. What are Servlets
Servlets are Java classes that dynamically process requests and responses on a web server.
Servlets are server-side components used to create dynamic web applications.
They extend the functionality of web servers by generating dynamic content.
Servlets can handle HTTP requests, process data, and generate responses.
They are platform-independent and can be used with any web server that supports the Java Servlet API.
Servlets are commonly used for tasks like form processing, databas...read more
Q54. Why we use Javascript
Javascript is used for creating interactive web pages and web applications.
Javascript allows for dynamic content and user interaction on web pages.
It can be used for form validation, animations, and creating responsive designs.
Javascript is also used for building web applications, such as React and Angular.
It can be used for server-side scripting with Node.js.
Javascript is a versatile language that can be used for both front-end and back-end development.
Q55. synchronous and asynchronous architect
Synchronous and asynchronous architectures refer to different ways of handling communication and processing in software systems.
Synchronous architecture involves processes occurring in a sequential order, where each task must wait for the previous one to complete before starting.
Asynchronous architecture allows tasks to be executed independently, without waiting for each other to finish.
Synchronous communication is like making a phone call - you wait for the other person to r...read more
Q56. Explain DDOS attack and remidiation
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service
Attackers use botnets to generate massive traffic to the target server or network
DDOS attacks can be mitigated by using firewalls, load balancers, and intrusion prevention systems
Cloud-based DDOS protection services like Cloudflare and Akamai can also be used
Regularly updating software and...read more
Q57. What is C++ Java
C++ and Java are programming languages used for software development.
C++ is a high-performance language used for system programming, game development, and other performance-critical applications.
Java is an object-oriented language used for developing web applications, mobile apps, and enterprise software.
C++ is compiled, while Java is both compiled and interpreted.
C++ allows for direct memory manipulation, while Java has automatic memory management.
C++ is known for its speed ...read more
Q58. What is OSPF ?
OSPF (Open Shortest Path First) is a routing protocol used to exchange routing information within a single autonomous system.
OSPF is a link-state protocol that uses Dijkstra's algorithm to calculate the shortest path.
It supports variable-length subnet masks (VLSM) and classless inter-domain routing (CIDR).
OSPF routers exchange information about their directly connected networks and use this information to build a topology map of the network.
It is commonly used in large enterp...read more
Q59. SQL and NOSQL difference
SQL is a relational database management system, while NoSQL is a non-relational database management system.
SQL databases are table-based, while NoSQL databases are document, key-value, graph, or wide-column stores.
SQL databases use structured query language for defining and manipulating the data, while NoSQL databases use different query languages.
SQL databases are vertically scalable, while NoSQL databases are horizontally scalable.
SQL databases are good for complex queries ...read more
Q60. Working of NewRelic
NewRelic is a performance monitoring tool that helps in identifying and resolving issues in web applications.
NewRelic provides real-time insights into the performance of web applications.
It helps in identifying bottlenecks and optimizing the performance of the application.
NewRelic provides detailed metrics on server response time, throughput, error rates, and more.
It also offers features like alerting, tracing, and profiling to help in troubleshooting issues.
NewRelic supports...read more
More about working at Rackspace
Top HR Questions asked in Express Logistics
Interview Process at Express Logistics
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month