UnitedLex
20+ Accentiv' India Interview Questions and Answers
Q1. What is Organizational unit? What is the difference between shared mailbox and distribution list.
Organizational unit is a container for objects in Active Directory. Shared mailbox is a mailbox that multiple users can access. Distribution list is a group of email addresses.
Organizational unit is used to organize objects in Active Directory
Shared mailbox allows multiple users to access a single mailbox
Distribution list is a group of email addresses used to send emails to multiple recipients
Shared mailbox is accessed through a single email address while distribution list is...read more
Q2. What is VPN? How do you solve Vpn issues? Explain with scenarios?
VPN stands for Virtual Private Network. It is a secure connection between two or more devices over the internet.
VPN allows remote access to a private network over the internet
Common VPN issues include connection failures, slow speeds, and authentication problems
To solve VPN issues, troubleshoot the connection, check for software updates, and verify login credentials
For example, if a user is unable to connect to the VPN, check if the VPN server is up and running, and if the us...read more
Q3. Are you aware of other technologies used in barcode readers?
Yes, there are various technologies used in barcode readers.
Laser scanners: Use a laser beam to read barcodes.
CCD scanners: Use an array of tiny light sensors to capture barcode data.
Camera-based scanners: Use image processing techniques to read barcodes.
Pen-type scanners: Require the user to swipe the scanner across the barcode.
Mobile barcode scanners: Utilize the camera of a mobile device to scan barcodes.
Q4. How do you resolve vdi login and vdi slowness issues?
VDI login and slowness issues can be resolved by identifying the root cause and implementing appropriate solutions.
Check network connectivity and bandwidth
Ensure VDI infrastructure is properly configured and optimized
Monitor resource usage and adjust allocation as needed
Update VDI software and drivers
Implement caching and compression technologies
Consider implementing load balancing
Provide end-user training and support
Perform regular maintenance and updates
Q5. Make a number <4 and >3 using 3, 4 and a symbol/operator present on your calculator
To make a number <4 and >3 using 3, 4, and a symbol/operator on the calculator.
Use the division operator (/) to divide 4 by 3, resulting in a number greater than 3 and less than 4.
Alternatively, use the subtraction operator (-) to subtract 3 from 4, resulting in a number greater than 3 and less than 4.
Q6. What is the ping command to check latency in vdi?
The ping command to check latency in VDI is 'ping -t '.
Open Command Prompt or Terminal
Type 'ping -t
' Press Enter
Observe the latency results
Q7. Anything you know about azure and end point manager?
Azure is a cloud computing platform and Endpoint Manager is a device management solution by Microsoft.
Azure provides a wide range of cloud services including virtual machines, storage, and databases.
Endpoint Manager is a unified endpoint management solution that allows IT admins to manage and secure devices across multiple platforms.
Endpoint Manager includes features such as device configuration, application management, and security policies.
Azure and Endpoint Manager can be ...read more
Q8. Difference between incident and service request?
An incident is an unplanned interruption while a service request is a planned request for assistance or information.
Incidents are unexpected and can cause disruption to normal operations.
Service requests are planned and can be initiated by the user or the service provider.
Incidents require immediate attention and resolution while service requests can be prioritized based on their urgency and impact.
Examples of incidents include system crashes, network outages, and security br...read more
Q9. How do you modify and create DL?
To modify and create DL, use the appropriate tools and follow the necessary steps.
Use the Exchange Management Console or Exchange Management Shell to modify and create DL
Ensure that you have the necessary permissions to modify and create DL
Follow the steps outlined in the documentation to modify and create DL
Test the DL to ensure that it is working as expected
Q10. What is patching? Steps involved?
Patching is the process of updating software to fix vulnerabilities and bugs.
Identify the software that needs to be patched
Download the patch from the vendor's website
Test the patch in a non-production environment
Deploy the patch to production systems
Verify that the patch was successful
Q11. What you know about the outsourcing industry ?
Outsourcing industry involves contracting out business processes to external providers.
Outsourcing helps companies reduce costs by delegating tasks to specialized service providers.
It allows businesses to focus on core competencies while external vendors handle non-core activities.
Common outsourcing services include customer support, IT services, and manufacturing.
Offshore outsourcing involves contracting services to companies in other countries to take advantage of lower lab...read more
Q12. If you could bring any law into force what would it be and why?
I would bring a law to ensure equal pay for equal work regardless of gender.
The law would prohibit gender-based pay discrimination in all industries.
It would require employers to provide equal pay for employees who perform the same job with the same level of skill, effort, and responsibility.
This law would help to close the gender pay gap and promote gender equality in the workplace.
For example, in the United States, women earn only 82 cents for every dollar earned by men, an...read more
Q13. Do shared mailbox has owners?
Yes, shared mailboxes have owners.
Shared mailboxes are created and owned by an administrator or a group of users with administrative privileges.
The owner of a shared mailbox can add or remove users who have access to the mailbox.
The owner can also manage permissions and settings for the mailbox.
In some cases, the owner of a shared mailbox may delegate access to another user, who becomes a co-owner of the mailbox.
Q14. 2. Share the process being followed for manual extraction.
The process for manual extraction involves identifying the data source, selecting relevant data, and recording it manually.
Identify the data source
Select relevant data
Record data manually
Ensure accuracy and completeness
Verify data with source if necessary
Q15. What's your speed of coding document?
My speed of coding documents is around 60-70 words per minute.
I use typing software to improve my speed.
I prioritize accuracy over speed.
I proofread my work to ensure quality.
I am constantly looking for ways to improve my speed and efficiency.
Q16. Can you work on Excel
Yes, I am proficient in working on Excel.
I am skilled in creating spreadsheets, using formulas and functions, and analyzing data.
I have experience in creating charts and graphs to visually represent data.
I am familiar with advanced features such as pivot tables and macros.
I am able to work with large data sets and perform data analysis.
For example, I have used Excel to track sales data and create reports for my previous employer.
Q17. What is Dial in?
Dial in refers to the process of connecting to a remote computer or network via a telephone line.
It involves using a modem to establish a connection over a phone line.
Dial in is commonly used for remote access to a company's network or for accessing the internet.
It can also refer to the process of joining a conference call by dialing a phone number.
Dial in can be less secure than other methods of remote access, as phone lines can be vulnerable to interception.
Dial in has larg...read more
Q18. What should be the coding penal?
Coding penal should be clear, consistent, and enforceable to maintain code quality and standards.
Coding penal should be documented and easily accessible to all team members.
It should outline coding standards, best practices, and guidelines to follow.
Penalties for not following the coding penal should be clearly defined.
Regular code reviews can help enforce the coding penal and ensure compliance.
Examples of penalties could include rework, additional training, or performance ev...read more
Q19. Which good recent technology do you like ?
I like the recent advancements in virtual reality technology.
Virtual reality technology has made significant progress in recent years.
It has revolutionized various industries such as gaming, entertainment, and education.
The immersive experiences provided by virtual reality can transport users to different environments and enhance their learning or entertainment.
Companies like Oculus, HTC, and Sony have released high-quality VR headsets that offer realistic and immersive exper...read more
Q20. What is Incident Response, PII, PHI
Incident Response is a process of reacting to and managing a security breach. PII stands for Personally Identifiable Information. PHI stands for Protected Health Information.
Incident Response involves identifying, containing, eradicating, and recovering from security incidents.
PII refers to any information that can be used to identify a specific individual, such as name, address, social security number.
PHI includes any information in a medical record that can be used to ident...read more
Q21. What is LPO and what the company do?
LPO stands for Legal Process Outsourcing. It involves outsourcing legal work to external service providers.
LPO companies provide services such as legal research, document review, contract drafting, and litigation support.
Examples of LPO companies include Integreon, QuisLex, and Pangea3.
LPO helps law firms and legal departments reduce costs and increase efficiency by delegating non-core legal tasks.
Q22. What is PHI and PII?
PHI stands for Protected Health Information and includes any information in a medical record or other health information that can be used to identify an individual. PII stands for Personally Identifiable Information and includes any information that can be used to distinguish or trace an individual's identity.
PHI includes information such as name, address, birth date, Social Security number, medical records, and health insurance information.
PII includes information such as na...read more
Q23. What is five years roadmap
A five-year roadmap is a strategic plan outlining goals and objectives for the next five years.
Identify long-term goals and objectives
Break down goals into smaller milestones
Allocate resources and budget accordingly
Regularly review and adjust the roadmap based on progress
Communicate the roadmap to stakeholders for alignment
Q24. What is data breach?
A data breach is a security incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
Occurs when hackers gain unauthorized access to a company's database
Can result in theft of personal information such as credit card numbers or social security numbers
May lead to financial loss, identity theft, or reputational damage
Organizations must notify affected individuals and authorities about the breach
Q25. What is strength
Strength is the ability to overcome challenges and obstacles, both physically and mentally.
Physical strength is the ability to exert force and lift heavy objects.
Mental strength is the ability to stay resilient in the face of adversity.
Strength can also refer to emotional resilience and the ability to cope with difficult situations.
Examples include weightlifters showcasing their physical strength and individuals overcoming personal struggles to demonstrate mental strength.
Q26. Write a program for palindrome
A program to check if a given string is a palindrome or not.
Convert the string to lowercase to ignore case sensitivity
Use two pointers, one at the beginning and one at the end of the string
Compare the characters at both pointers and move them towards each other until they meet
If all characters match, the string is a palindrome
Q27. Projects on lean six sigma
Q28. Exposure in legal world
Q29. Projects in lean six sigma
Top HR Questions asked in Accentiv' India
Interview Process at Accentiv' India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month