UnitedLex
20+ Credence Resource Management Interview Questions and Answers
Q1. What is Organizational unit? What is the difference between shared mailbox and distribution list.
Organizational unit is a container for objects in Active Directory. Shared mailbox is a mailbox that multiple users can access. Distribution list is a group of email addresses.
Organizational unit is used to organize objects in Active Directory
Shared mailbox allows multiple users to access a single mailbox
Distribution list is a group of email addresses used to send emails to multiple recipients
Shared mailbox is accessed through a single email address while distribution list is...read more
Q2. What is VPN? How do you solve Vpn issues? Explain with scenarios?
VPN stands for Virtual Private Network. It is a secure connection between two or more devices over the internet.
VPN allows remote access to a private network over the internet
Common VPN issues include connection failures, slow speeds, and authentication problems
To solve VPN issues, troubleshoot the connection, check for software updates, and verify login credentials
For example, if a user is unable to connect to the VPN, check if the VPN server is up and running, and if the us...read more
Q3. How do you resolve vdi login and vdi slowness issues?
VDI login and slowness issues can be resolved by identifying the root cause and implementing appropriate solutions.
Check network connectivity and bandwidth
Ensure VDI infrastructure is properly configured and optimized
Monitor resource usage and adjust allocation as needed
Update VDI software and drivers
Implement caching and compression technologies
Consider implementing load balancing
Provide end-user training and support
Perform regular maintenance and updates
Q4. What is the ping command to check latency in vdi?
The ping command to check latency in VDI is 'ping -t
Open Command Prompt or Terminal
Type 'ping -t
' Press Enter
Observe the latency results
Q5. Anything you know about azure and end point manager?
Azure is a cloud computing platform and Endpoint Manager is a device management solution by Microsoft.
Azure provides a wide range of cloud services including virtual machines, storage, and databases.
Endpoint Manager is a unified endpoint management solution that allows IT admins to manage and secure devices across multiple platforms.
Endpoint Manager includes features such as device configuration, application management, and security policies.
Azure and Endpoint Manager can be ...read more
Q6. Difference between incident and service request?
An incident is an unplanned interruption while a service request is a planned request for assistance or information.
Incidents are unexpected and can cause disruption to normal operations.
Service requests are planned and can be initiated by the user or the service provider.
Incidents require immediate attention and resolution while service requests can be prioritized based on their urgency and impact.
Examples of incidents include system crashes, network outages, and security br...read more
Q7. How do you modify and create DL?
To modify and create DL, use the appropriate tools and follow the necessary steps.
Use the Exchange Management Console or Exchange Management Shell to modify and create DL
Ensure that you have the necessary permissions to modify and create DL
Follow the steps outlined in the documentation to modify and create DL
Test the DL to ensure that it is working as expected
Q8. What is patching? Steps involved?
Patching is the process of updating software to fix vulnerabilities and bugs.
Identify the software that needs to be patched
Download the patch from the vendor's website
Test the patch in a non-production environment
Deploy the patch to production systems
Verify that the patch was successful
Q9. Do shared mailbox has owners?
Yes, shared mailboxes have owners.
Shared mailboxes are created and owned by an administrator or a group of users with administrative privileges.
The owner of a shared mailbox can add or remove users who have access to the mailbox.
The owner can also manage permissions and settings for the mailbox.
In some cases, the owner of a shared mailbox may delegate access to another user, who becomes a co-owner of the mailbox.
Q10. What you know about the outsourcing industry ?
Outsourcing industry involves contracting out business processes to external providers.
Outsourcing helps companies reduce costs by delegating tasks to specialized service providers.
It allows businesses to focus on core competencies while external vendors handle non-core activities.
Common outsourcing services include customer support, IT services, and manufacturing.
Offshore outsourcing involves contracting services to companies in other countries to take advantage of lower lab...read more
Q11. What is Dial in?
Dial in refers to the process of connecting to a remote computer or network via a telephone line.
It involves using a modem to establish a connection over a phone line.
Dial in is commonly used for remote access to a company's network or for accessing the internet.
It can also refer to the process of joining a conference call by dialing a phone number.
Dial in can be less secure than other methods of remote access, as phone lines can be vulnerable to interception.
Dial in has larg...read more
Q12. Can you work on Excel
Yes, I am proficient in working on Excel.
I am skilled in creating spreadsheets, using formulas and functions, and analyzing data.
I have experience in creating charts and graphs to visually represent data.
I am familiar with advanced features such as pivot tables and macros.
I am able to work with large data sets and perform data analysis.
For example, I have used Excel to track sales data and create reports for my previous employer.
Q13. If you could bring any law into force what would it be and why?
I would bring a law to ensure equal pay for equal work regardless of gender.
The law would prohibit gender-based pay discrimination in all industries.
It would require employers to provide equal pay for employees who perform the same job with the same level of skill, effort, and responsibility.
This law would help to close the gender pay gap and promote gender equality in the workplace.
For example, in the United States, women earn only 82 cents for every dollar earned by men, an...read more
Q14. What should be the coding penal?
Coding penal should be clear, consistent, and enforceable to maintain code quality and standards.
Coding penal should be documented and easily accessible to all team members.
It should outline coding standards, best practices, and guidelines to follow.
Penalties for not following the coding penal should be clearly defined.
Regular code reviews can help enforce the coding penal and ensure compliance.
Examples of penalties could include rework, additional training, or performance ev...read more
Q15. What is Incident Response, PII, PHI
Incident Response is a process of reacting to and managing a security breach. PII stands for Personally Identifiable Information. PHI stands for Protected Health Information.
Incident Response involves identifying, containing, eradicating, and recovering from security incidents.
PII refers to any information that can be used to identify a specific individual, such as name, address, social security number.
PHI includes any information in a medical record that can be used to ident...read more
Q16. What is PHI and PII?
PHI stands for Protected Health Information and includes any information in a medical record or other health information that can be used to identify an individual. PII stands for Personally Identifiable Information and includes any information that can be used to distinguish or trace an individual's identity.
PHI includes information such as name, address, birth date, Social Security number, medical records, and health insurance information.
PII includes information such as na...read more
Q17. Write a program for palindrome
A program to check if a given string is a palindrome or not.
Convert the string to lowercase to ignore case sensitivity
Use two pointers, one at the beginning and one at the end of the string
Compare the characters at both pointers and move them towards each other until they meet
If all characters match, the string is a palindrome
Q18. Projects on lean six sigma
Q19. Exposure in legal world
Q20. Projects in lean six sigma
Top HR Questions asked in Credence Resource Management
Interview Process at Credence Resource Management
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month