Add office photos
Employer?
Claim Account for FREE

UnitedLex

3.1
based on 582 Reviews
Video summary
Filter interviews by

20+ Accentiv' India Interview Questions and Answers

Updated 23 Sep 2024

Q1. What is Organizational unit? What is the difference between shared mailbox and distribution list.

Ans.

Organizational unit is a container for objects in Active Directory. Shared mailbox is a mailbox that multiple users can access. Distribution list is a group of email addresses.

  • Organizational unit is used to organize objects in Active Directory

  • Shared mailbox allows multiple users to access a single mailbox

  • Distribution list is a group of email addresses used to send emails to multiple recipients

  • Shared mailbox is accessed through a single email address while distribution list is...read more

Add your answer

Q2. What is VPN? How do you solve Vpn issues? Explain with scenarios?

Ans.

VPN stands for Virtual Private Network. It is a secure connection between two or more devices over the internet.

  • VPN allows remote access to a private network over the internet

  • Common VPN issues include connection failures, slow speeds, and authentication problems

  • To solve VPN issues, troubleshoot the connection, check for software updates, and verify login credentials

  • For example, if a user is unable to connect to the VPN, check if the VPN server is up and running, and if the us...read more

Add your answer

Q3. Are you aware of other technologies used in barcode readers?

Ans.

Yes, there are various technologies used in barcode readers.

  • Laser scanners: Use a laser beam to read barcodes.

  • CCD scanners: Use an array of tiny light sensors to capture barcode data.

  • Camera-based scanners: Use image processing techniques to read barcodes.

  • Pen-type scanners: Require the user to swipe the scanner across the barcode.

  • Mobile barcode scanners: Utilize the camera of a mobile device to scan barcodes.

Add your answer

Q4. How do you resolve vdi login and vdi slowness issues?

Ans.

VDI login and slowness issues can be resolved by identifying the root cause and implementing appropriate solutions.

  • Check network connectivity and bandwidth

  • Ensure VDI infrastructure is properly configured and optimized

  • Monitor resource usage and adjust allocation as needed

  • Update VDI software and drivers

  • Implement caching and compression technologies

  • Consider implementing load balancing

  • Provide end-user training and support

  • Perform regular maintenance and updates

Add your answer
Discover Accentiv' India interview dos and don'ts from real experiences

Q5. Make a number <4 and >3 using 3, 4 and a symbol/operator present on your calculator

Ans.

To make a number <4 and >3 using 3, 4, and a symbol/operator on the calculator.

  • Use the division operator (/) to divide 4 by 3, resulting in a number greater than 3 and less than 4.

  • Alternatively, use the subtraction operator (-) to subtract 3 from 4, resulting in a number greater than 3 and less than 4.

Add your answer

Q6. What is the ping command to check latency in vdi?

Ans.

The ping command to check latency in VDI is 'ping -t '.

  • Open Command Prompt or Terminal

  • Type 'ping -t '

  • Press Enter

  • Observe the latency results

Add your answer
Are these interview questions helpful?

Q7. Anything you know about azure and end point manager?

Ans.

Azure is a cloud computing platform and Endpoint Manager is a device management solution by Microsoft.

  • Azure provides a wide range of cloud services including virtual machines, storage, and databases.

  • Endpoint Manager is a unified endpoint management solution that allows IT admins to manage and secure devices across multiple platforms.

  • Endpoint Manager includes features such as device configuration, application management, and security policies.

  • Azure and Endpoint Manager can be ...read more

Add your answer

Q8. Difference between incident and service request?

Ans.

An incident is an unplanned interruption while a service request is a planned request for assistance or information.

  • Incidents are unexpected and can cause disruption to normal operations.

  • Service requests are planned and can be initiated by the user or the service provider.

  • Incidents require immediate attention and resolution while service requests can be prioritized based on their urgency and impact.

  • Examples of incidents include system crashes, network outages, and security br...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How do you modify and create DL?

Ans.

To modify and create DL, use the appropriate tools and follow the necessary steps.

  • Use the Exchange Management Console or Exchange Management Shell to modify and create DL

  • Ensure that you have the necessary permissions to modify and create DL

  • Follow the steps outlined in the documentation to modify and create DL

  • Test the DL to ensure that it is working as expected

Add your answer

Q10. What is patching? Steps involved?

Ans.

Patching is the process of updating software to fix vulnerabilities and bugs.

  • Identify the software that needs to be patched

  • Download the patch from the vendor's website

  • Test the patch in a non-production environment

  • Deploy the patch to production systems

  • Verify that the patch was successful

Add your answer

Q11. What you know about the outsourcing industry ?

Ans.

Outsourcing industry involves contracting out business processes to external providers.

  • Outsourcing helps companies reduce costs by delegating tasks to specialized service providers.

  • It allows businesses to focus on core competencies while external vendors handle non-core activities.

  • Common outsourcing services include customer support, IT services, and manufacturing.

  • Offshore outsourcing involves contracting services to companies in other countries to take advantage of lower lab...read more

Add your answer

Q12. If you could bring any law into force what would it be and why?

Ans.

I would bring a law to ensure equal pay for equal work regardless of gender.

  • The law would prohibit gender-based pay discrimination in all industries.

  • It would require employers to provide equal pay for employees who perform the same job with the same level of skill, effort, and responsibility.

  • This law would help to close the gender pay gap and promote gender equality in the workplace.

  • For example, in the United States, women earn only 82 cents for every dollar earned by men, an...read more

Add your answer

Q13. Do shared mailbox has owners?

Ans.

Yes, shared mailboxes have owners.

  • Shared mailboxes are created and owned by an administrator or a group of users with administrative privileges.

  • The owner of a shared mailbox can add or remove users who have access to the mailbox.

  • The owner can also manage permissions and settings for the mailbox.

  • In some cases, the owner of a shared mailbox may delegate access to another user, who becomes a co-owner of the mailbox.

Add your answer

Q14. 2. Share the process being followed for manual extraction.

Ans.

The process for manual extraction involves identifying the data source, selecting relevant data, and recording it manually.

  • Identify the data source

  • Select relevant data

  • Record data manually

  • Ensure accuracy and completeness

  • Verify data with source if necessary

Add your answer

Q15. What's your speed of coding document?

Ans.

My speed of coding documents is around 60-70 words per minute.

  • I use typing software to improve my speed.

  • I prioritize accuracy over speed.

  • I proofread my work to ensure quality.

  • I am constantly looking for ways to improve my speed and efficiency.

Add your answer

Q16. Can you work on Excel

Ans.

Yes, I am proficient in working on Excel.

  • I am skilled in creating spreadsheets, using formulas and functions, and analyzing data.

  • I have experience in creating charts and graphs to visually represent data.

  • I am familiar with advanced features such as pivot tables and macros.

  • I am able to work with large data sets and perform data analysis.

  • For example, I have used Excel to track sales data and create reports for my previous employer.

Add your answer

Q17. What is Dial in?

Ans.

Dial in refers to the process of connecting to a remote computer or network via a telephone line.

  • It involves using a modem to establish a connection over a phone line.

  • Dial in is commonly used for remote access to a company's network or for accessing the internet.

  • It can also refer to the process of joining a conference call by dialing a phone number.

  • Dial in can be less secure than other methods of remote access, as phone lines can be vulnerable to interception.

  • Dial in has larg...read more

Add your answer

Q18. What should be the coding penal?

Ans.

Coding penal should be clear, consistent, and enforceable to maintain code quality and standards.

  • Coding penal should be documented and easily accessible to all team members.

  • It should outline coding standards, best practices, and guidelines to follow.

  • Penalties for not following the coding penal should be clearly defined.

  • Regular code reviews can help enforce the coding penal and ensure compliance.

  • Examples of penalties could include rework, additional training, or performance ev...read more

Add your answer

Q19. Which good recent technology do you like ?

Ans.

I like the recent advancements in virtual reality technology.

  • Virtual reality technology has made significant progress in recent years.

  • It has revolutionized various industries such as gaming, entertainment, and education.

  • The immersive experiences provided by virtual reality can transport users to different environments and enhance their learning or entertainment.

  • Companies like Oculus, HTC, and Sony have released high-quality VR headsets that offer realistic and immersive exper...read more

Add your answer

Q20. What is Incident Response, PII, PHI

Ans.

Incident Response is a process of reacting to and managing a security breach. PII stands for Personally Identifiable Information. PHI stands for Protected Health Information.

  • Incident Response involves identifying, containing, eradicating, and recovering from security incidents.

  • PII refers to any information that can be used to identify a specific individual, such as name, address, social security number.

  • PHI includes any information in a medical record that can be used to ident...read more

Add your answer

Q21. What is LPO and what the company do?

Ans.

LPO stands for Legal Process Outsourcing. It involves outsourcing legal work to external service providers.

  • LPO companies provide services such as legal research, document review, contract drafting, and litigation support.

  • Examples of LPO companies include Integreon, QuisLex, and Pangea3.

  • LPO helps law firms and legal departments reduce costs and increase efficiency by delegating non-core legal tasks.

Add your answer

Q22. What is PHI and PII?

Ans.

PHI stands for Protected Health Information and includes any information in a medical record or other health information that can be used to identify an individual. PII stands for Personally Identifiable Information and includes any information that can be used to distinguish or trace an individual's identity.

  • PHI includes information such as name, address, birth date, Social Security number, medical records, and health insurance information.

  • PII includes information such as na...read more

Add your answer

Q23. What is five years roadmap

Ans.

A five-year roadmap is a strategic plan outlining goals and objectives for the next five years.

  • Identify long-term goals and objectives

  • Break down goals into smaller milestones

  • Allocate resources and budget accordingly

  • Regularly review and adjust the roadmap based on progress

  • Communicate the roadmap to stakeholders for alignment

Add your answer

Q24. What is data breach?

Ans.

A data breach is a security incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.

  • Occurs when hackers gain unauthorized access to a company's database

  • Can result in theft of personal information such as credit card numbers or social security numbers

  • May lead to financial loss, identity theft, or reputational damage

  • Organizations must notify affected individuals and authorities about the breach

Add your answer

Q25. What is strength

Ans.

Strength is the ability to overcome challenges and obstacles, both physically and mentally.

  • Physical strength is the ability to exert force and lift heavy objects.

  • Mental strength is the ability to stay resilient in the face of adversity.

  • Strength can also refer to emotional resilience and the ability to cope with difficult situations.

  • Examples include weightlifters showcasing their physical strength and individuals overcoming personal struggles to demonstrate mental strength.

Add your answer

Q26. Write a program for palindrome

Ans.

A program to check if a given string is a palindrome or not.

  • Convert the string to lowercase to ignore case sensitivity

  • Use two pointers, one at the beginning and one at the end of the string

  • Compare the characters at both pointers and move them towards each other until they meet

  • If all characters match, the string is a palindrome

Add your answer

Q27. Projects on lean six sigma

Add your answer

Q28. Exposure in legal world

Add your answer

Q29. Projects in lean six sigma

Add your answer

More about working at UnitedLex

HQ - New York, New York, United States (USA)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Accentiv' India

based on 34 interviews
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 362 Interview Questions
3.5
 • 346 Interview Questions
3.9
 • 154 Interview Questions
3.5
 • 143 Interview Questions
3.7
 • 133 Interview Questions
View all
Top UnitedLex Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter