
Systems Plus

10+ Systems Plus Interview Questions and Answers
Q1. What storage arrays have you worked on?
I have worked on various storage arrays including EMC VNX, NetApp FAS, and Dell EMC Unity.
EMC VNX
NetApp FAS
Dell EMC Unity
Q2. How to perform a test activity on remote site
Performing a test activity on a remote site
Ensure proper communication channels are established
Define clear objectives and scope of the test
Select appropriate tools and equipment for the test
Conduct a pre-test site survey to identify potential issues
Execute the test plan and document results
Analyze the results and report findings to stakeholders
Q3. Replication types and basic task procedures.
Replication types include snapshot, transactional, and merge. Basic task procedures involve setting up publications and subscriptions.
Snapshot replication copies a snapshot of the entire database to the subscriber
Transactional replication copies only the changes made to the database since the last replication
Merge replication allows for bidirectional synchronization of data
Setting up publications involves selecting the objects to replicate and defining the replication type
Set...read more
Q4. Architecture of storages
Storages can be classified into three types: direct-attached, network-attached, and storage area networks.
Direct-attached storage (DAS) is directly connected to a server or computer, such as a hard drive or USB drive.
Network-attached storage (NAS) is a file-level storage connected to a network, allowing multiple users to access the same data simultaneously.
Storage area networks (SAN) are block-level storage connected to a network, providing high-speed access to data for serve...read more
Q5. What do you know about data annotation
Data annotation is the process of labeling data to make it understandable for machines.
Data annotation involves adding metadata to raw data.
It is used to train machine learning models.
Examples include labeling images with object names or sentiment analysis of text.
It can be done manually or with the help of tools like Labelbox or Amazon Mechanical Turk.
Q6. Steps to perform DR test? Process to migrate storage resources, inter-site and same site ? Steps to mitigate SAN issues? how to you identify slow draining devices ?
Steps for DR test, storage migration, SAN issue mitigation, and identifying slow draining devices.
DR test: Define scope, select test type, prepare test environment, execute test, evaluate results.
Storage migration: Plan migration, validate source and destination, perform migration, verify data integrity.
Inter-site migration: Use replication tools, verify data consistency, update DNS records.
Same site migration: Use storage vMotion, verify data integrity.
SAN issue mitigation: ...read more
Q7. How to generate reports in TestNG
Reports can be generated in TestNG using the built-in reporting feature or by using third-party plugins.
TestNG provides built-in HTML reports that can be generated after test execution
Custom reports can be generated using TestNG listeners and report generation APIs
Third-party plugins like ExtentReports and ReportNG can also be used for advanced reporting
Reports can be customized with logos, headers, footers, and other formatting options
Q8. What is insurance
Insurance is a contract between an individual and an insurance company to protect against financial loss.
Insurance provides financial protection against unexpected events
Individuals pay premiums to an insurance company in exchange for coverage
Types of insurance include health, auto, home, and life insurance
Insurance policies have terms and conditions that outline what is covered and what is not
Insurance companies use actuarial science to calculate risk and set premiums
Q9. what are various types of cyber attacks?
Cyber attacks can be classified into various types based on their methods and targets.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, email scams)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. brute force, dictionary attacks)
Q10. Any problem in update the solution
Updating solutions can sometimes lead to problems.
Updating solutions may cause compatibility issues with other software or hardware.
There may be unforeseen bugs or errors that arise after the update.
The update may require additional resources or training for users to properly utilize.
Testing and quality assurance are crucial to ensure a successful update.
Regular updates are necessary to ensure security and functionality.
Q11. Some examples of production support
Production support involves maintaining and troubleshooting software applications in a live environment.
Monitoring application performance and availability
Resolving technical issues and bugs reported by users
Implementing hotfixes and patches to address critical issues
Performing regular maintenance tasks to ensure system stability
Providing technical support to end users
Q12. Explain your framework. Explain BDD
BDD is a software development methodology that focuses on collaboration between developers, testers, and business stakeholders.
BDD stands for Behavior Driven Development
It emphasizes on defining the behavior of the system in plain English language
Uses Gherkin syntax to write scenarios in Given-When-Then format
Helps in improving communication and collaboration between teams
Tools like Cucumber and SpecFlow are used for BDD implementation
Q13. process to migrate storage nas resources
Migrating NAS resources involves planning, testing, and executing the migration process.
Identify the data to be migrated and the target storage system
Plan the migration process, including downtime and data transfer methods
Test the migration process in a non-production environment
Execute the migration process, monitor progress, and verify data integrity
Update any necessary configurations and test the new storage system
Q14. Complete azure ad
Azure AD is a cloud-based identity and access management service.
Provides single sign-on (SSO) to various cloud-based and on-premises applications
Offers multi-factor authentication (MFA) and conditional access policies
Integrates with other Microsoft services like Office 365 and Azure
Allows for user and group management, as well as device management
Q15. Different deoendency injection techniques
Dependency injection is a design pattern used to remove hard-coded dependencies and make components more modular and testable.
Constructor injection: Dependencies are provided through a class's constructor.
Setter injection: Dependencies are set through setter methods.
Interface injection: Dependencies are injected through an interface.
Spring framework in Java uses dependency injection to manage components.
Angular framework in JavaScript also utilizes dependency injection for ma...read more
Q16. How many tools used in previous org ?
I have used a variety of tools in my previous organization to support BI production.
ETL tools like Informatica and Talend
Monitoring tools like Splunk and Nagios
Ticketing tools like JIRA and ServiceNow
Q17. what are siem tools?
SIEM tools are security information and event management tools used to collect, analyze and correlate security events.
SIEM tools help in detecting and responding to security incidents
They collect data from various sources like firewalls, IDS/IPS, and endpoints
SIEM tools use correlation rules to identify potential security threats
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight
Q18. Explain event Loop
Event loop is a mechanism in JavaScript that allows for asynchronous operations to be executed in a non-blocking way.
Event loop is responsible for handling asynchronous operations in JavaScript.
It continuously checks the call stack and the callback queue to see if there are any tasks to be executed.
Tasks from the callback queue are moved to the call stack for execution when the call stack is empty.
Event loop ensures that JavaScript remains single-threaded and non-blocking.
Q19. Explain React Hooks
React Hooks are functions that let you use state and other React features without writing a class.
React Hooks were introduced in React 16.8.
They allow you to use state and other React features in functional components.
Some commonly used React Hooks are useState, useEffect, useContext, etc.
Hooks are more readable and easier to maintain compared to class components.
Top HR Questions asked in Systems Plus
Interview Process at Systems Plus

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

