Stefanini
10+ Zita Telecom Interview Questions and Answers
Q1. What step you will taken after getting any system infected with virus?
After getting a system infected with a virus, the first step is to isolate the infected system from the network.
Isolate the infected system from the network to prevent further spread of the virus
Disconnect the infected system from the internet
Disable any network connections on the infected system
Notify the IT security team about the infection
Run a full system scan using an updated antivirus software
Quarantine and remove any identified malware or viruses
Restore the system from...read more
Q2. What is navigational attribute and time independent attribute.
Navigational attribute is used for navigation in a data model, while time independent attribute does not change over time.
Navigational attribute helps in navigating through different levels of data in a data model.
Time independent attribute remains constant and does not change over time.
Example: In a sales data model, 'Product Category' can be a navigational attribute to drill down from 'Product' to 'Category'. 'Customer Name' can be a time independent attribute as it does no...read more
Q3. What are the levels of Office 365 Administration?
The levels of Office 365 Administration include Global Administrator, Billing Administrator, User Management Administrator, etc.
Global Administrator has full control over all aspects of Office 365 administration
Billing Administrator manages the billing and subscription aspects of Office 365
User Management Administrator handles user accounts and permissions
Exchange Administrator manages Exchange Online
SharePoint Administrator handles SharePoint Online
Security Administrator man...read more
Q4. What is current ctc? How much you are expected ctc
Current CTC is X and expected CTC is Y
Current CTC is X amount per annum
Expected CTC is Y amount per annum
The expected CTC may vary based on the role, experience, and market conditions
Q5. Difference between Lsa vs lsa++ artitecture
LSA is a traditional architecture for data warehousing, while LSA++ is an enhanced version with additional layers and capabilities.
LSA (Layered Scalable Architecture) is a traditional approach to data warehousing, consisting of layers like Data Acquisition, Data Transformation, and Data Presentation.
LSA++ is an enhanced version of LSA, with additional layers such as Data Harmonization, Data Governance, and Data Consumption.
LSA++ provides more flexibility, scalability, and agi...read more
Q6. Explain OOP concepts
OOP stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.
OOP focuses on creating objects that contain data and methods to manipulate that data.
Encapsulation: Objects hide their internal state and require interaction through defined interfaces.
Inheritance: Objects can inherit attributes and methods from other objects.
Polymorphism: Objects can take on different forms or have multiple behaviors.
Abstraction: Objects simplify complex syste...read more
Q7. Brief career experiences DAAS experience and handling real time issues Azure Exposure
Experienced in DAAS and Azure, handling real-time issues
Managed Desktop as a Service (DAAS) solutions for multiple clients
Resolved real-time issues such as network outages and server failures
Implemented Azure cloud services for data storage and virtual machines
Troubleshooted and optimized Azure resources for performance and cost efficiency
Q8. Difference between sap bw and bw on hana
SAP BW is a traditional data warehouse solution, while BW on HANA is optimized for SAP HANA in-memory database.
SAP BW is a standalone data warehouse solution, while BW on HANA is integrated with SAP HANA in-memory database.
BW on HANA offers faster data processing and real-time analytics compared to SAP BW.
BW on HANA allows for advanced analytics and predictive modeling capabilities due to its integration with SAP HANA.
SAP BW requires separate hardware and software installatio...read more
Q9. Email analysis with email security gateway
Email analysis with email security gateway involves monitoring and analyzing email traffic for potential security threats.
Utilize email security gateway tools to monitor incoming and outgoing emails for malicious content
Analyze email headers, attachments, and content for signs of phishing attempts or malware
Set up rules and policies to automatically block suspicious emails or quarantine them for further investigation
Regularly review email security logs and reports to identify...read more
Q10. Mobileiron and its policies
MobileIron is a mobile device management (MDM) software that allows organizations to secure and manage mobile devices.
MobileIron provides policies for managing mobile devices such as password requirements, app restrictions, and device wipe capabilities.
Policies can be customized based on user roles and device ownership.
MobileIron also offers integration with other security solutions such as VPN and identity management.
Examples of policies include enforcing passcodes, restrict...read more
Q11. system slowness how to resolve
To resolve system slowness, check for hardware issues, optimize software, update drivers, and monitor resource usage.
Check for hardware issues such as low memory or CPU usage
Optimize software by removing unnecessary programs or services
Update drivers for hardware components
Monitor resource usage to identify bottlenecks
Q12. how to configure vpn
To configure a VPN, you need to set up a VPN server, create user accounts, configure client devices, and establish secure connections.
Set up a VPN server using software like OpenVPN or Windows Server
Create user accounts with unique credentials for accessing the VPN
Configure client devices to connect to the VPN server using the provided credentials
Establish secure connections by encrypting data transmitted over the VPN
Interview Process at Zita Telecom
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month