Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Thoughtsol Infotech Team. If you also belong to the team, you can get access from here

Thoughtsol Infotech Verified Tick

Compare button icon Compare button icon Compare
4.6

based on 235 Reviews

Filter interviews by

Thoughtsol Infotech Interview Questions, Process, and Tips

Updated 20 Dec 2024

Top Thoughtsol Infotech Interview Questions and Answers

View all 33 questions

Thoughtsol Infotech Interview Experiences

Popular Designations

12 interviews found

NOC Engineer Interview Questions & Answers

user image Anonymous

posted on 11 Dec 2021

I applied via Referral and was interviewed in Nov 2021. There was 1 interview round.

Interview Questionnaire 

27 Questions

  • Q1. What is DNS and what is DNS process?
  • Ans. 

    DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.

    • DNS is used to resolve domain names to IP addresses.

    • It works by querying DNS servers to find the IP address associated with a domain name.

    • The DNS process involves recursive and iterative queries.

    • DNS caching is used to improve performance and reduce network traffic.

    • DNS records like A, CNAME, MX, etc., store inf...

  • Answered by AI
  • Q2. What is DHCP and what is DHCP process?
  • Ans. 

    DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that enables devices to obtain IP addresses automatically.

    • DHCP is used to assign IP addresses to devices on a network.

    • The DHCP process involves four steps: discovery, offer, request, and acknowledgement.

    • During the discovery phase, a device sends a broadcast message to find a DHCP server.

    • The DHCP server responds with an offer, providing an ava...

  • Answered by AI
  • Q3. What is Network Architecture?
  • Ans. 

    Network architecture refers to the design and layout of a computer network.

    • It includes the physical components of the network such as routers, switches, and cables.

    • It also includes the logical components such as protocols and network topologies.

    • The architecture should be designed to meet the needs of the organization and provide efficient and secure communication.

    • Examples of network architectures include client-server,...

  • Answered by AI
  • Q4. What is Raid?
  • Ans. 

    RAID stands for Redundant Array of Independent Disks. It is a data storage technology that combines multiple physical disk drives into a single logical unit.

    • RAID provides improved performance, fault tolerance, and data protection.

    • There are different RAID levels, each with its own advantages and disadvantages.

    • RAID 0 offers improved performance but no redundancy, while RAID 1 provides redundancy but no performance improv...

  • Answered by AI
  • Q5. What is Routing Protocols?
  • Ans. 

    Routing protocols are sets of rules that determine how routers communicate with each other to forward data packets across networks.

    • Routing protocols are used to exchange routing information between routers.

    • They help routers to build and maintain routing tables.

    • There are two types of routing protocols: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs).

    • Examples of IGPs include OSPF and EIGRP, while

  • Answered by AI
  • Q6. Difference between Rip, Ospf,Eigrp and BGP.
  • Ans. 

    RIP, OSPF, EIGRP, and BGP are all routing protocols used in networking.

    • RIP is a distance-vector protocol that uses hop count as its metric.

    • OSPF is a link-state protocol that uses cost as its metric.

    • EIGRP is a hybrid protocol that uses both distance-vector and link-state characteristics.

    • BGP is an exterior gateway protocol used for routing between different autonomous systems.

    • RIP and OSPF are used within a single autonom...

  • Answered by AI
  • Q7. Define OSI model.
  • Ans. 

    OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

    • OSI stands for Open Systems Interconnection.

    • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has a specific function and communicates with adjacent layers.

    • Example: HTTP operates at the Application layer, while TCP operates a...

  • Answered by AI
  • Q8. Define TCP/IP model.
  • Ans. 

    TCP/IP model is a networking protocol that defines how data is transmitted over the internet.

    • TCP/IP model has four layers: application, transport, internet, and network access.

    • Each layer has its own set of protocols and functions.

    • The application layer is responsible for user interaction, while the network access layer deals with physical data transmission.

    • TCP/IP model is used for communication between devices on the in...

  • Answered by AI
  • Q9. What is the role of data link layer?
  • Ans. 

    Data link layer is responsible for transferring data between adjacent network nodes and detecting errors in transmission.

    • Data link layer is the second layer of the OSI model.

    • It provides a reliable link between two devices over a physical layer.

    • It is responsible for framing, error detection and correction, flow control, and access control.

    • Examples of data link layer protocols include Ethernet, Wi-Fi, and PPP.

    • Data link l

  • Answered by AI
  • Q10. How to configure OUTLOOK?
  • Ans. 

    Configuring Outlook involves setting up email accounts, server settings, and security options.

    • Open Outlook and click on File

    • Click on Add Account and enter your email address

    • Enter your password and follow the prompts to complete setup

    • Configure server settings such as incoming and outgoing mail servers

    • Set up security options such as encryption and authentication

    • Test the account to ensure it is working properly

  • Answered by AI
  • Q11. What is OST and PST?
  • Ans. 

    OST and PST are file extensions used by Microsoft Outlook to store email data.

    • OST stands for Offline Storage Table and is used for storing email data when Outlook is in offline mode.

    • PST stands for Personal Storage Table and is used for storing email data on the user's computer.

    • OST files are created automatically when Outlook is configured to use Cached Exchange Mode.

    • PST files can be created manually by the user to stor...

  • Answered by AI
  • Q12. Difference between Router and Switch and Hub.
  • Ans. 

    Routers connect different networks, switches connect devices within a network, and hubs connect devices to a network.

    • Routers operate at the network layer and use IP addresses to forward packets between networks.

    • Switches operate at the data link layer and use MAC addresses to forward frames within a network.

    • Hubs operate at the physical layer and simply broadcast data to all connected devices.

    • Routers can provide security...

  • Answered by AI
  • Q13. What is Operating System (os)?
  • Ans. 

    An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs.

    • OS acts as an interface between the user and the computer hardware.

    • It manages the computer's memory and processes.

    • Examples of OS include Windows, macOS, Linux, Android, and iOS.

  • Answered by AI
  • Q14. Waht is Active Directory (AD)?
  • Ans. 

    Active Directory (AD) is a Microsoft service that manages network resources and user accounts.

    • AD is used to authenticate and authorize users and computers in a Windows domain network.

    • It stores information about users, groups, computers, and other network resources.

    • AD enables administrators to manage network resources from a central location.

    • It provides a hierarchical structure for organizing network resources.

    • AD can be...

  • Answered by AI
  • Q15. Difference between SSH and Telnet?
  • Ans. 

    SSH is a secure protocol for remote access while Telnet is an unsecured protocol.

    • SSH encrypts data while Telnet sends data in plain text.

    • SSH uses public-key cryptography while Telnet uses username and password authentication.

    • SSH is more secure and recommended over Telnet.

    • SSH uses port 22 while Telnet uses port 23.

    • SSH is used for remote access to servers while Telnet is mostly used for testing network connectivity.

  • Answered by AI
  • Q16. Difference between HDD and SSD.
  • Ans. 

    HDD is a traditional spinning hard drive, while SSD is a newer, faster type of drive that uses flash memory.

    • HDD uses spinning disks to read/write data, while SSD uses flash memory chips.

    • SSD is faster and more reliable than HDD.

    • SSD is more expensive than HDD.

    • SSD consumes less power than HDD.

    • SSD has no moving parts, making it less prone to physical damage.

    • HDD has larger storage capacity than SSD.

    • SSD is commonly used in l...

  • Answered by AI
  • Q17. Difference between WDS and MDT.
  • Ans. 

    WDS is a Windows Deployment Services used for network-based installation of Windows OS. MDT is a Microsoft Deployment Toolkit used for customizing and automating Windows OS deployment.

    • WDS is used for network-based installation of Windows OS

    • MDT is used for customizing and automating Windows OS deployment

    • WDS is a component of Windows Server

    • MDT is a standalone tool that can be used with WDS or other deployment tools

  • Answered by AI
  • Q18. What is Topology? And its types.
  • Ans. 

    Topology refers to the arrangement of nodes and connections in a network. Types include bus, star, ring, mesh, and hybrid.

    • Topology defines the physical or logical layout of a network.

    • Bus topology connects all devices to a single cable.

    • Star topology connects devices to a central hub or switch.

    • Ring topology connects devices in a circular loop.

    • Mesh topology connects devices with multiple redundant paths.

    • Hybrid topology co...

  • Answered by AI
  • Q19. How to share Printer in Network?
  • Ans. 

    To share a printer in a network, you need to set up printer sharing and configure the necessary settings.

    • Connect the printer to a computer that will act as the print server

    • Enable printer sharing on the computer

    • Configure the printer settings on the print server

    • Add the shared printer to other computers on the network

    • Test the printer to ensure it is working properly

  • Answered by AI
  • Q20. How to access others computer on our PC? Which tools is used to access within single network?
  • Ans. 

    To access others' computers on our PC within a single network, we can use remote desktop tools like Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC).

    • Remote Desktop Protocol (RDP) allows accessing Windows-based computers remotely.

    • Virtual Network Computing (VNC) enables remote access to computers running various operating systems.

    • Both RDP and VNC require the target computer to have the necessary software ...

  • Answered by AI
  • Q21. Name of latest Router And Switch which is used in market?
  • Ans. 

    The latest router and switch used in the market are Cisco Catalyst 9000 Series switches and Cisco ASR 9000 Series routers.

    • Cisco Catalyst 9000 Series switches are known for their advanced security features and programmability.

    • They offer high performance and scalability for enterprise networks.

    • Cisco ASR 9000 Series routers provide high-density, high-performance routing and are suitable for service provider networks.

    • They ...

  • Answered by AI
  • Q22. How to configure Router and Switch?
  • Ans. 

    Configuring routers and switches involves setting up network protocols, IP addresses, VLANs, and security features.

    • Access the router/switch CLI through console or SSH.

    • Configure basic settings like hostname, domain name, and passwords.

    • Set up IP addresses and subnet masks on interfaces.

    • Enable routing protocols like OSPF or BGP for routers.

    • Create VLANs and assign ports to them on switches.

    • Implement security features like ...

  • Answered by AI
  • Q23. What is VLAN?What is it's use?
  • Ans. 

    VLAN stands for Virtual Local Area Network. It is used to logically segment a network into smaller broadcast domains.

    • VLANs are created by configuring network switches.

    • Devices in the same VLAN can communicate with each other as if they are on the same physical network.

    • VLANs can improve network performance and security by reducing broadcast traffic and isolating network traffic.

    • VLANs can be used to group devices by depar...

  • Answered by AI
  • Q24. What is NAT/ PAT? What is it's use?
  • Ans. 

    NAT/PAT stands for Network Address Translation/Port Address Translation. It is used to translate private IP addresses to public IP addresses and vice versa.

    • NAT/PAT is used to conserve public IP addresses by allowing multiple devices to share a single public IP address.

    • It provides security by hiding the internal IP addresses of a network from the external network.

    • NAT translates the private IP addresses of devices in a l...

  • Answered by AI
  • Q25. What is IP? And tell me it's type?
  • Ans. 

    IP stands for Internet Protocol. It is a set of rules that governs the format of data sent over the internet.

    • IP is responsible for routing data packets between devices on a network.

    • There are two versions of IP: IPv4 and IPv6.

    • IPv4 uses 32-bit addresses and can support up to 4.3 billion unique addresses.

    • IPv6 uses 128-bit addresses and can support an almost infinite number of unique addresses.

    • IP is a layer 3 protocol in t...

  • Answered by AI
  • Q26. What is the difference between color coding of 568A and 568B ?
  • Ans. 

    The difference between color coding of 568A and 568B is the arrangement of the wire pairs in the Ethernet cable.

    • 568A uses a different order for the green and orange wire pairs compared to 568B.

    • 568A: white-green, green, white-orange, blue, white-blue, orange, white-brown, brown

    • 568B: white-orange, orange, white-green, blue, white-blue, green, white-brown, brown

    • Both standards are used for Ethernet connections, but 568B is...

  • Answered by AI
  • Q27. What is the use of straight cable and cross cable?
  • Ans. 

    Straight cables are used to connect different types of devices, while cross cables are used to connect similar devices.

    • Straight cables are used to connect a computer to a switch, router, or hub.

    • Cross cables are used to connect two computers directly or to connect two switches or hubs together.

    • Straight cables have the same wiring sequence on both ends, while cross cables have a different wiring sequence on each end.

    • Stra...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confidence and also have a free mind. Don't afraid which interviewee. Also be always ready for interview.

Skills evaluated in this interview

Top Thoughtsol Infotech NOC Engineer Interview Questions and Answers

Q1. How to access others computer on our PC? Which tools is used to access within single network?
View answer (8)

NOC Engineer Interview Questions asked at other Companies

Q1. How to access others computer on our PC? Which tools is used to access within single network?
View answer (8)

Interview Questionnaire 

1 Question

  • Q1. How many user account can we create in Windows server 2012 R2
  • Ans. 

    The maximum number of user accounts that can be created in Windows Server 2012 R2 depends on the edition and licensing.

    • The Standard edition of Windows Server 2012 R2 supports up to 2,048 user accounts.

    • The Datacenter edition of Windows Server 2012 R2 supports unlimited user accounts.

    • The Essentials edition of Windows Server 2012 R2 supports up to 25 user accounts.

    • The number of user accounts can also be limited by the ava...

  • Answered by AI

Skills evaluated in this interview

Desktop Support Engineer Interview Questions asked at other Companies

Q1. What is APIPA? WHAT IS SUBNETMASK? DIFFERENCE BETWEEB IPv4 and IPv6. How many types of os installation? What is BIOS AND what is use of CMOS BATTARY? WHST IS HDD and how many types of HDD? How to shot SMPS AND HOW TO UPDRADE RAM? DIFFERENCE... read more
View answer (3)

Jobs at Thoughtsol Infotech

View all

Thoughtsol Infotech Interview FAQs

How many rounds are there in Thoughtsol Infotech interview?
Thoughtsol Infotech interview process usually has 2-3 rounds. The most common rounds in the Thoughtsol Infotech interview process are Technical, HR and One-on-one Round.
How to prepare for Thoughtsol Infotech interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Thoughtsol Infotech. The most common topics and skills that interviewers at Thoughtsol Infotech expect are Desktop Support, Troubleshooting, Networking, Linux and Windows.
What are the top questions asked in Thoughtsol Infotech interview?

Some of the top questions asked at the Thoughtsol Infotech interview -

  1. How to access others computer on our PC? Which tools is used to access within s...read more
  2. Name of latest Router And Switch which is used in mark...read more
  3. What is the difference between color coding of 568A and 568...read more
How long is the Thoughtsol Infotech interview process?

The duration of Thoughtsol Infotech interview process can vary, but typically it takes about less than 2 weeks to complete.

Tell us how to improve this page.

Thoughtsol Infotech Interview Process

based on 7 interviews in last 1 year

Interview experience

4.7
  
Excellent
View more

People are getting interviews through

based on 7 Thoughtsol Infotech interviews
Referral
WalkIn
Company Website
43%
29%
14%
14% candidates got the interview through other sources.
Moderate Confidence
?
Moderate Confidence means the data is based on a sufficient number of responses received from the candidates

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.2k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
LTIMindtree Interview Questions
3.9
 • 2.9k Interviews
Mphasis Interview Questions
3.4
 • 785 Interviews
View all

Thoughtsol Infotech Reviews and Ratings

based on 235 reviews

4.6/5

Rating in categories

4.3

Skill development

4.4

Work-Life balance

4.3

Salary & Benefits

4.3

Job Security

4.5

Company culture

4.2

Promotions/Appraisal

4.4

Work Satisfaction

Explore 235 Reviews and Ratings
Graphic Designer

Noida,

Gurgaon / Gurugram

+1

1-5 Yrs

Not Disclosed

Explore more jobs
Desktop Support Engineer
50 salaries
unlock blur

₹1.5 L/yr - ₹4 L/yr

Cloud Engineer
27 salaries
unlock blur

₹2.2 L/yr - ₹7.7 L/yr

Network Engineer
11 salaries
unlock blur

₹2.5 L/yr - ₹7.5 L/yr

Business Development Manager
11 salaries
unlock blur

₹3.6 L/yr - ₹8 L/yr

Deskside Support Engineer
8 salaries
unlock blur

₹2.2 L/yr - ₹2.5 L/yr

Explore more salaries
Compare Thoughtsol Infotech with

Infosys

3.7
Compare

TCS

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview