TCS
Viraj Profiles Interview Questions and Answers
Q1. Explain BGP, OSPF, DMZ , OSI, VLAN,VTP, Monitoring tool
BGP, OSPF, DMZ, OSI, VLAN, VTP, and Monitoring tools are key networking concepts and tools used in system administration.
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.
OSPF (Open Shortest Path First) is a link-state routing protocol used to determine the best path for data packets in a network.
DMZ (Demilitarized Zone) is a network segment that separates an internal network from an external ne...read more
Q2. Group policy , How to implement them
Group policies are implemented through Active Directory to manage user and computer settings in a network environment.
Create a new Group Policy Object (GPO) in Active Directory
Link the GPO to the appropriate Organizational Unit (OU)
Configure the settings within the GPO using Group Policy Management Console (GPMC)
Apply the GPO to the desired users or computers
Use Group Policy Preferences to deploy settings like mapped drivers, printers, etc.
Q3. What are main module in administration
Q4. What do you mean by VPN
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure and encrypted connection between the user's device and the private network
It helps in protecting sensitive data from unauthorized access
VPN can be used to access resources remotely, bypass geo-restrictions, and enhance privacy online
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost
Q5. What is the port number of udp
The port number of UDP is 17.
UDP uses port number 17 for communication.
UDP is a connectionless protocol, so it does not require a specific port number for each connection.
Port number 17 is commonly used for the Daytime Protocol.
UDP port numbers range from 0 to 65535.
Q6. What is https and http
HTTP is a protocol used for transferring data over the internet, while HTTPS is a secure version of HTTP that encrypts data.
HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet
HTTPS is a secure version of HTTP that uses encryption to protect data
HTTPS is commonly used for secure transactions such as online banking or shopping
HTTP operates on port 80, while HTTPS operates on port 443
Q7. What is system Administrator
A System Administrator manages and maintains computer systems, networks, and servers to ensure optimal performance and security.
Responsible for installing, configuring, and maintaining operating systems and software applications.
Monitors system performance and troubleshoots issues to ensure uptime and reliability.
Manages user accounts, permissions, and access controls to maintain security.
Performs regular backups and disaster recovery planning to protect data.
Updates and patc...read more
Q8. Describe about linux, Windows?
Linux and Windows are two popular operating systems used in computers.
Linux is open-source and free while Windows is proprietary and paid.
Linux is known for its stability, security, and flexibility while Windows is known for its user-friendliness and compatibility with most software.
Linux uses a command-line interface (CLI) while Windows uses a graphical user interface (GUI).
Linux is commonly used in servers and supercomputers while Windows is commonly used in personal comput...read more
More about working at TCS
Interview Process at Viraj Profiles
Top System Administrator Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month