Add office photos
Employer?
Claim Account for FREE

VMware Software

4.4
based on 1.1k Reviews
Filter interviews by

200+ iOPEX Technologies Interview Questions and Answers

Updated 20 Jan 2025
Popular Designations

Q1. Next Smallest Palindrome Problem Statement

Find the next smallest palindrome strictly greater than a given number 'N' represented as a string 'S'.

Explanation:

You are given a number in string format, and your ...read more

Add your answer

Q2. Check Permutation Problem Statement

Given two strings 'STR1' and 'STR2', determine if they are anagrams of each other.

Explanation:

Two strings are considered to be anagrams if they contain the same characters,...read more

Add your answer

Q3. Reverse the String Problem Statement

You are given a string STR which contains alphabets, numbers, and special characters. Your task is to reverse the string.

Example:

Input:
STR = "abcde"
Output:
"edcba"

Input...read more

View 2 more answers

Q4. Search In Rotated Sorted Array Problem Statement

Given a rotated sorted array ARR of size 'N' and an integer 'K', determine the index at which 'K' is present in the array.

Note:
1. If 'K' is not present in ARR,...read more
Add your answer
Discover iOPEX Technologies interview dos and don'ts from real experiences

Q5. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th...

read more
Add your answer

Q6. Minimum Jumps Problem Statement

Bob and his wife are in the famous 'Arcade' mall in the city of Berland. This mall has a unique way of moving between shops using trampolines. Each shop is laid out in a straight...read more

Add your answer
Are these interview questions helpful?

Q7. Pair Sum in Binary Search Tree

Given a Binary Search Tree (BST) and a target value 'K', determine if there exist two unique elements in the BST such that their sum equals the target 'K'.

Explanation:

A BST is a...read more

Add your answer

Q8. Problem: Sort an Array of 0s, 1s, and 2s

Given an array/list ARR consisting of integers where each element is either 0, 1, or 2, your task is to sort this array in increasing order.

Input:

The input starts with...read more
Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...

read more
Ans.

VMware HA allows for a maximum of 4 host failures within a cluster. If a 5th host fails, VMs may not restart depending on admission control settings.

  • Maximum allowed host failures within a HA cluster is 4

  • If a 5th host fails and admission control is enabled, some VMs may not restart due to resource constraints

  • If admission control is disabled, VMs will restart on any remaining host but may not be functional

  • Ensure enough port groups are configured on vSwitch for Virtual Machine p...read more

Add your answer

Q10. Problem: Search In Rotated Sorted Array

Given a sorted array that has been rotated clockwise by an unknown amount, you need to answer Q queries. Each query is represented by an integer Q[i], and you must determ...read more

Add your answer

Q11. Docker command to transfer an image from one machine to another without using docker registry

Ans.

Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.

  • Use the 'docker save' command to save the image as a tar file on the source machine

  • Transfer the tar file to the destination machine using any file transfer method (e.g., scp)

  • On the destination machine, use the 'docker load' command to load the image from the tar file

View 3 more answers

Q12. Common Elements in Three Sorted Arrays

Given three sorted arrays A, B, and C of lengths N, M, and K respectively, your task is to find all elements that are present in all three arrays.

Input:

The first line co...read more
Add your answer

Q13. Reverse Linked List Problem Statement

Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.

Input:

The first line of input is an integer T, rep...read more
Add your answer
Q14. Which data structure would you use to implement the undo and redo operation in a system?
View 2 more answers

Q15. Reverse List In K Groups Problem Statement

You are provided with a linked list having 'N' nodes and an integer 'K'. Your task is to reverse the linked list in groups of size K. If the list is numbered from 1 to...read more

Add your answer

Q16. Reverse Number Problem Statement

Ninja is exploring new challenges and desires to reverse a given number. Your task is to assist Ninja in reversing the number provided.

Note:

If a number has trailing zeros, the...read more

Add your answer

Q17. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...

read more
Ans.

Prerequisites for HA clusters in VMware environment

  • Virtual machines and configuration files must be on shared storage

  • Console network should have redundant network paths for reliable failure detection

  • Hosts in cluster must be part of a VMotion network for DRS with HA

Add your answer

Q18. Tower of Hanoi Problem Statement

You have three rods numbered from 1 to 3, and 'N' disks initially stacked on the first rod in increasing order of their sizes (largest disk at the bottom). Your task is to move ...read more

Add your answer

Q19. Convert Array to Min Heap Task

Given an array 'ARR' of integers with 'N' elements, you need to convert it into a min-binary heap.

A min-binary heap is a complete binary tree where each internal node's value is ...read more

Add your answer

Q20. Reverse Stack with Recursion

Reverse a given stack of integers using recursion. You must accomplish this without utilizing extra space beyond the internal stack space used by recursion. Additionally, you must r...read more

Add your answer

Q21. Flip Bits Problem Explanation

Given an array of integers ARR of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can be obta...read more

Add your answer

Q22. First and Last Position of an Element in a Sorted Array

Given a sorted array/list ARR consisting of ‘N’ elements, and an integer ‘K’, your task is to find the first and last occurrence of ‘K’ in ARR.

Explanatio...read more

Add your answer

Q23. Intersection of Two Arrays Problem Statement

Given two arrays A and B with sizes N and M respectively, both sorted in non-decreasing order, determine their intersection.

The intersection of two arrays includes ...read more

Add your answer

Q24. Segregate Odd-Even Problem Statement

In a wedding ceremony at NinjaLand, attendees are blindfolded. People from the bride’s side hold odd numbers, while people from the groom’s side hold even numbers. For the g...read more

Add your answer

Q25. Convert Sorted Array to BST Problem Statement

Given a sorted array of length N, your task is to construct a balanced binary search tree (BST) from the array. If multiple balanced BSTs are possible, you can retu...read more

Add your answer

Q26. Check If Preorder Traversal Is Valid

Determine whether a given array ARR of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).

A binary search tree (BST) is a tree structure where ea...read more

Add your answer

Q27. Remove Duplicates From Unsorted Linked List Problem Statement

You are provided with a linked list consisting of N nodes. Your task is to remove duplicate nodes such that each element occurs only once in the lin...read more

Add your answer
Q28. How can you copy Docker images from one host to another without using a repository?
Add your answer
Q29. How do you block specific IPs on your EC2 instance in AWS?
Add your answer

Q30. What is the usecase which would require setup of distributed jenkins nodes

Ans.

Distributed Jenkins nodes are used to handle large-scale builds and improve performance.

  • Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.

  • Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.

  • Resource utilization: Distributed nodes allow for better utilization of resources...read more

View 1 answer

Q31. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...

read more
Add your answer
Q32. What happens to the load balancer when an instance in AWS is deregistered?
Add your answer
Q33. How do you debug a website template that is very slow?
Add your answer
Q34. What is a use case that would require the setup of distributed Jenkins nodes?
Add your answer
Q35. What is Inversion of Control?
Add your answer
Q36. What are Terraform modules?
Add your answer
Q37. How would you debug issues with Apache and Nginx?
Add your answer
Q38. How would you prevent a DDoS attack?
Add your answer
Q39. What are the different states of entity instances?
Add your answer

Q40. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...

read more
Ans.

Prerequisites for VMotion include network configuration, CPU compatibility, shared storage, and virtual switch restrictions.

  • ESX Servers must have VMkernel ports enabled for VMotion on the same network segment

  • ESX Servers must be managed by the same Virtual Center server

  • ESX Servers must have compatible CPUs

  • ESX Servers must have consistent networks and network labels

  • VMs must be stored on shared storage like iSCSI, FC SAN, or NAS/NFS

  • VMs cannot use local CD/floppy or internal-only...read more

Add your answer
Q41. Can you design the bank architecture using basic OOP concepts in any programming language?
Add your answer
Q42. What is load average in Linux?
Add your answer

Q43. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...

read more
Add your answer
Q44. Design a file searching functionality for Windows and Mac that includes indexing of file names.
Add your answer
Q45. What are the advantages of design patterns in Java?
Add your answer

Q46. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.

Ans.

Akamai request flow involves parsing rules in a hierarchical manner.

  • Akamai request flow involves multiple stages and rules.

  • When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.

  • During each stage, different rules are parsed and applied based on the configuration.

  • The hierarchy of rules determines the order in which they are evaluated and applied.

  • For example, caching rules may be evaluated before delivery rules.

  • Th...read more

Add your answer

Q47. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?

Ans.

The implemented method would be of the interface that is extended first in the class declaration.

  • In this case, since class A implements B and C, the implemented method m1 would be of interface B if B is extended first in the class declaration.

  • If C was extended first in the class declaration, then the implemented method m1 would be of interface C.

  • The order of interface extension determines which interface's method is implemented in the class.

Add your answer

Q48. How would you debug a website which is progressively slowing down

Ans.

To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.

  • Analyze server logs to identify any errors or bottlenecks

  • Check for memory leaks in the code

  • Optimize the code by removing unnecessary scripts and optimizing images

  • Use tools like Chrome DevTools to identify performance issues

  • Consider implementing a content delivery network (CDN) to improve website speed

Add your answer

Q49. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array

Add your answer

Q50. What does a load balancer do when an instance in aws stops

Ans.

Load balancer routes traffic to other healthy instances

  • Load balancer detects the unhealthy instance

  • Stops sending traffic to that instance

  • Routes traffic to other healthy instances

  • Maintains high availability and scalability of the application

Add your answer

Q51. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?

Ans.

Virtual machine processes may still be visible in the Service Console even when powered down.

  • Virtual machine processes may still be running in the background even when the virtual machine is powered down.

  • The ps command shows all processes running on the system, including those related to virtual machines.

  • Some processes may continue to run for maintenance or monitoring purposes even when the virtual machine is not actively running.

Add your answer

Q52. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?

Add your answer

Q53. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?

Ans.

To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.

  • Add the new LUN to the storage array

  • Rescan the storage adapters in vSphere Client

  • Create a new datastore using the new LUN ID

  • Set the block size based on the volume size (e.g. 1MB for 500GB volume size)

Add your answer
Q54. What is the system call that creates a separate connection?
Add your answer

Q55. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?

Add your answer

Q56. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?

Ans.

The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.

  • Ping the ESX server from the vSphere Client/vCenter to check network connectivity.

  • Check if the ESX server is reachable by using the vmkping command.

  • Verify if the ESX server's management services are running using the service mgmt-vmware status command.

  • Check the firewall settings on the ESX server to ensure necessary ports are open.

  • Restart the management agents on the ESX server using...read more

Add your answer

Q57. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?

Ans.

To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:

  • Find the middle element of the sorted skewed binary tree.

  • Make it the root of the new binary search tree.

  • Recursively repeat the process for the left and right halves of the original tree.

  • Attach the resulting subtrees as the left and right children of the root.

Add your answer

Q58. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000

Add your answer

Q59. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?

Add your answer

Q60. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?

Add your answer
Q61. What are the different types of advice in Spring AOP?
Add your answer
Q62. What is the Java Executor Framework?
Add your answer
Q63. What are the benefits of the Java Executor Framework?
Add your answer

Q64. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there...

read more
Ans.

Function to print permutations of elements from arraylists with no duplicates.

  • Use recursion to generate all possible permutations by selecting one element from each arraylist at a time.

  • Keep track of used elements to avoid duplicates in the permutation sets.

  • Use a set data structure to store and check for duplicates efficiently.

Add your answer

Q65. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?

Ans.

Adding a new VLAN to a production network involves several steps and enabling it requires configuration changes.

  • Plan the new VLAN configuration including VLAN ID, subnet, and gateway.

  • Configure the switch or router to create the new VLAN.

  • Assign ports to the new VLAN as needed.

  • Enable routing between the new VLAN and other VLANs if required.

  • Test the new VLAN to ensure connectivity and functionality.

  • Examples: VLAN 20 with subnet 192.168.20.0/24 and gateway 192.168.20.1.

  • Examples: ...read more

Add your answer

Q66. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?

Ans.

Connecting ESX host through VC and vSphere involves different services and port numbers.

  • Connecting ESX host through VC involves vCenter Server which provides centralized management and monitoring.

  • Connecting ESX host through vSphere involves vCenter Server along with additional services like vSphere Client and vSphere Web Client.

  • Some of the services involved in connecting ESX host through VC and vSphere include vCenter Server, vSphere Client, vSphere Web Client, and ESXi host ...read more

Add your answer

Q67. What is the command used to restart SSH, NTP & Vmware Web access?

Ans.

The command to restart SSH, NTP, and VMware Web access is service.

  • To restart SSH, use the command: service ssh restart

  • To restart NTP, use the command: service ntp restart

  • To restart VMware Web access, use the command: service vmware-webaccess restart

Add your answer

Q68. Describe inodes and file descriptors. What is the use of swap

Ans.

Inodes are data structures that store information about files on a Unix/Linux file system. File descriptors are unique identifiers for open files. Swap is a space on a hard disk used as virtual memory.

  • Inodes contain metadata about files such as ownership, permissions, and timestamps.

  • File descriptors are used by the operating system to keep track of open files and to perform I/O operations on them.

  • Swap is used when the amount of physical memory (RAM) is insufficient to hold al...read more

Add your answer
Q69. What are the advantages and disadvantages of the buddy system?
Add your answer

Q70. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.

Ans.

Check if a Binary Tree formed from a Post order traversal array is a Binary Search Tree.

  • Start by constructing the Binary Tree from the given Post order traversal array.

  • Check if the Binary Tree satisfies the properties of a Binary Search Tree.

  • Use recursion to check if each node's value is within the correct range.

  • Example: Post order traversal array [1, 3, 2] forms a Binary Search Tree.

  • Example: Post order traversal array [3, 2, 1] does not form a Binary Search Tree.

Add your answer
Q71. What is dependency injection?
Add your answer

Q72. Is there a way to blacklist IPs in AWS

Ans.

Yes, AWS provides various methods to blacklist IPs.

  • Use AWS WAF to create rules to block specific IP addresses

  • Configure security groups to deny traffic from specific IP addresses

  • Utilize AWS Network ACLs to block traffic from specific IP addresses

View 1 answer
Q73. What is the difference between an inode number and a file descriptor?
Add your answer

Q74. What is the default number of ports configured with the Virtual Switch?

Ans.

The default number of ports configured with the Virtual Switch is 8.

  • The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.

  • By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.

  • These ports can be assigned to different virtual machines or network adapters as needed.

  • Additional ports can be added or existing ports can be...read more

Add your answer

Q75. What are the relevant elements to be considered in ascertaining the Cost of creating a Quote by an IT Company

Ans.

The relevant elements to consider in ascertaining the cost of creating a quote by an IT company

  • Scope of the project

  • Complexity of the requirements

  • Labor costs

  • Technology and tools required

  • Timeframe for completion

  • Overhead expenses

  • Profit margin

  • Competitor pricing

  • Client's budget constraints

Add your answer

Q76. Im not able to connect to the Service Console over the network. What could the issue be?

Ans.

Possible reasons for not being able to connect to the Service Console over the network.

  • Check network connectivity and ensure the correct IP address is being used.

  • Verify firewall settings to allow access to the Service Console.

  • Ensure the Service Console service is running properly.

  • Check for any network configuration issues or restrictions.

  • Restart the Service Console and try connecting again.

Add your answer

Q77. Why did VMware limit its beta of ESX Server 3.0 to so few?

Add your answer
Q78. How do you implement the Java Executor Framework?
Add your answer

Q79. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?

Add your answer

Q80. How to implement executor framework and it's benefits

Ans.

Executor framework is used to manage threads and execute tasks asynchronously.

  • Executor framework provides a way to manage threads and execute tasks asynchronously.

  • It provides a thread pool and a queue to manage tasks.

  • It helps in improving the performance of the application by reducing the overhead of creating and destroying threads.

  • It also provides a way to handle exceptions and errors in the tasks.

  • Example: Executors.newFixedThreadPool(10) creates a thread pool of 10 threads.

Add your answer

Q81. What do you do if you forget the root password of the Service Console?

Ans.

To reset the root password of the Service Console, you can follow these steps:

  • Restart the system and press 'e' at the GRUB menu to edit the boot configuration

  • Locate the line starting with 'linux' and append 'init=/bin/bash' at the end

  • Press 'Ctrl + X' to boot into single-user mode

  • Remount the root file system as read-write by running 'mount -o remount,rw /'

  • Reset the root password by running 'passwd root'

  • Reboot the system and login with the new root password

Add your answer

Q82. What are the files will be created while creating a VM and after powering on the VM?

Add your answer

Q83. How will you turn start / stop a VM through command prompt?

Add your answer

Q84. How will you check the network bandwidth utilization in an ESXS host through command prompt?

Add your answer

Q85. What is the most important aspect of deploying ESX Server and virtual machines?

Add your answer

Q86. Can I back up my entire virtual machine from the Service Console?

Add your answer

Q87. If I can't get a SAN, will local storage with a RAID device be sufficient?

Add your answer
Q88. What is the difference between TELNET and SSH?
Add your answer
Q89. What is a volatile variable?
Add your answer

Q90. Given a unsorted array. Create a balanced B tree. Whether it is possible to solve this problem algorithm in logarithmic complexity ?

Ans.

It is not possible to create a balanced B tree from an unsorted array in logarithmic complexity.

  • Creating a balanced B tree from an unsorted array requires sorting the array first, which has a complexity of O(n log n).

  • Balanced B tree construction typically has a complexity of O(n log n) or O(n) depending on the algorithm used.

  • Example: If we have an unsorted array [3, 1, 4, 1, 5, 9, 2, 6, 5], we would need to sort it first before constructing a balanced B tree.

Add your answer

Q91. If the VMDK header file corrupt what will happen? How do you troubleshoot?

Add your answer

Q92. Explain about VCB? What it the minimum priority (*) to consolidate a machine?

Add your answer
Q93. How do you dynamically allocate a 2D array in C?
Add your answer

Q94. ISOs have been mentioned in several of the chapters. Why are they so important?

Ans.

ISOs are important because they provide a set of standards and guidelines for various industries.

  • ISOs ensure consistency and quality in products and services.

  • ISOs help organizations meet legal and regulatory requirements.

  • ISOs promote international trade by harmonizing standards across countries.

  • ISOs enhance customer confidence and trust in products and services.

  • ISOs facilitate interoperability and compatibility between different systems.

  • ISOs cover a wide range of areas such a...read more

Add your answer

Q95. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?

Add your answer

Q96. Have you ever patched the ESX host? What are the steps involved in that?

Add your answer

Q97. What will happen if I deploy systems management software on the ESX Server itself?

Add your answer
Q98. Can you write an Ansible playbook to install Apache?
Add your answer

Q99. Which version of VMware ESX Server supports Boot from SAN?

Add your answer

Q100. Round1(Coding Round): There are n seats and m people are seated randomly. Write a program to get minimum number of hops between make them seated together.

Ans.

Given n seats and m people seated randomly, find the minimum number of hops to seat them together.

  • Find all possible contiguous groups of m seats

  • Calculate the number of hops required to move each group to the center seat of that group

  • Return the minimum number of hops required

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at iOPEX Technologies

based on 100 interviews
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 659 Interview Questions
4.2
 • 238 Interview Questions
3.6
 • 168 Interview Questions
3.8
 • 168 Interview Questions
View all
Top VMware Software Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter