Add office photos
Employer?
Claim Account for FREE

VMware Software

4.4
based on 1k Reviews
Video summary
Filter interviews by

100+ Ubisoft Entertainment Interview Questions and Answers

Updated 20 Jan 2025
Popular Designations

Q1. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th...

read more
Add your answer

Q2. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...

read more
Ans.

VMware HA allows for a maximum of 4 host failures within a cluster. If a 5th host fails, VMs may not restart depending on admission control settings.

  • Maximum allowed host failures within a HA cluster is 4

  • If a 5th host fails and admission control is enabled, some VMs may not restart due to resource constraints

  • If admission control is disabled, VMs will restart on any remaining host but may not be functional

  • Ensure enough port groups are configured on vSwitch for Virtual Machine p...read more

Add your answer

Q3. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...

read more
Ans.

Prerequisites for HA clusters in VMware environment

  • Virtual machines and configuration files must be on shared storage

  • Console network should have redundant network paths for reliable failure detection

  • Hosts in cluster must be part of a VMotion network for DRS with HA

Add your answer

Q4. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...

read more
Add your answer
Discover Ubisoft Entertainment interview dos and don'ts from real experiences

Q5. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...

read more
Ans.

Prerequisites for VMotion include network configuration, CPU compatibility, shared storage, and virtual switch restrictions.

  • ESX Servers must have VMkernel ports enabled for VMotion on the same network segment

  • ESX Servers must be managed by the same Virtual Center server

  • ESX Servers must have compatible CPUs

  • ESX Servers must have consistent networks and network labels

  • VMs must be stored on shared storage like iSCSI, FC SAN, or NAS/NFS

  • VMs cannot use local CD/floppy or internal-only...read more

Add your answer

Q6. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...

read more
Add your answer
Are these interview questions helpful?

Q7. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.

Ans.

Akamai request flow involves parsing rules in a hierarchical manner.

  • Akamai request flow involves multiple stages and rules.

  • When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.

  • During each stage, different rules are parsed and applied based on the configuration.

  • The hierarchy of rules determines the order in which they are evaluated and applied.

  • For example, caching rules may be evaluated before delivery rules.

  • Th...read more

Add your answer

Q8. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?

Ans.

The implemented method would be of the interface that is extended first in the class declaration.

  • In this case, since class A implements B and C, the implemented method m1 would be of interface B if B is extended first in the class declaration.

  • If C was extended first in the class declaration, then the implemented method m1 would be of interface C.

  • The order of interface extension determines which interface's method is implemented in the class.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array

Add your answer

Q10. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?

Ans.

Virtual machine processes may still be visible in the Service Console even when powered down.

  • Virtual machine processes may still be running in the background even when the virtual machine is powered down.

  • The ps command shows all processes running on the system, including those related to virtual machines.

  • Some processes may continue to run for maintenance or monitoring purposes even when the virtual machine is not actively running.

Add your answer

Q11. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?

Add your answer

Q12. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?

Ans.

To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.

  • Add the new LUN to the storage array

  • Rescan the storage adapters in vSphere Client

  • Create a new datastore using the new LUN ID

  • Set the block size based on the volume size (e.g. 1MB for 500GB volume size)

Add your answer

Q13. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?

Add your answer

Q14. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?

Ans.

The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.

  • Ping the ESX server from the vSphere Client/vCenter to check network connectivity.

  • Check if the ESX server is reachable by using the vmkping command.

  • Verify if the ESX server's management services are running using the service mgmt-vmware status command.

  • Check the firewall settings on the ESX server to ensure necessary ports are open.

  • Restart the management agents on the ESX server using...read more

Add your answer

Q15. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?

Ans.

To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:

  • Find the middle element of the sorted skewed binary tree.

  • Make it the root of the new binary search tree.

  • Recursively repeat the process for the left and right halves of the original tree.

  • Attach the resulting subtrees as the left and right children of the root.

Add your answer

Q16. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000

Add your answer

Q17. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?

Add your answer

Q18. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?

Add your answer

Q19. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there...

read more
Ans.

Function to print permutations of elements from arraylists with no duplicates.

  • Use recursion to generate all possible permutations by selecting one element from each arraylist at a time.

  • Keep track of used elements to avoid duplicates in the permutation sets.

  • Use a set data structure to store and check for duplicates efficiently.

Add your answer

Q20. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?

Ans.

Adding a new VLAN to a production network involves several steps and enabling it requires configuration changes.

  • Plan the new VLAN configuration including VLAN ID, subnet, and gateway.

  • Configure the switch or router to create the new VLAN.

  • Assign ports to the new VLAN as needed.

  • Enable routing between the new VLAN and other VLANs if required.

  • Test the new VLAN to ensure connectivity and functionality.

  • Examples: VLAN 20 with subnet 192.168.20.0/24 and gateway 192.168.20.1.

  • Examples: ...read more

Add your answer

Q21. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?

Ans.

Connecting ESX host through VC and vSphere involves different services and port numbers.

  • Connecting ESX host through VC involves vCenter Server which provides centralized management and monitoring.

  • Connecting ESX host through vSphere involves vCenter Server along with additional services like vSphere Client and vSphere Web Client.

  • Some of the services involved in connecting ESX host through VC and vSphere include vCenter Server, vSphere Client, vSphere Web Client, and ESXi host ...read more

Add your answer

Q22. What is the command used to restart SSH, NTP & Vmware Web access?

Ans.

The command to restart SSH, NTP, and VMware Web access is service.

  • To restart SSH, use the command: service ssh restart

  • To restart NTP, use the command: service ntp restart

  • To restart VMware Web access, use the command: service vmware-webaccess restart

Add your answer

Q23. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.

Ans.

Check if a Binary Tree formed from a Post order traversal array is a Binary Search Tree.

  • Start by constructing the Binary Tree from the given Post order traversal array.

  • Check if the Binary Tree satisfies the properties of a Binary Search Tree.

  • Use recursion to check if each node's value is within the correct range.

  • Example: Post order traversal array [1, 3, 2] forms a Binary Search Tree.

  • Example: Post order traversal array [3, 2, 1] does not form a Binary Search Tree.

Add your answer

Q24. What is the default number of ports configured with the Virtual Switch?

Ans.

The default number of ports configured with the Virtual Switch is 8.

  • The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.

  • By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.

  • These ports can be assigned to different virtual machines or network adapters as needed.

  • Additional ports can be added or existing ports can be...read more

Add your answer

Q25. Im not able to connect to the Service Console over the network. What could the issue be?

Ans.

Possible reasons for not being able to connect to the Service Console over the network.

  • Check network connectivity and ensure the correct IP address is being used.

  • Verify firewall settings to allow access to the Service Console.

  • Ensure the Service Console service is running properly.

  • Check for any network configuration issues or restrictions.

  • Restart the Service Console and try connecting again.

Add your answer

Q26. Why did VMware limit its beta of ESX Server 3.0 to so few?

Add your answer

Q27. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?

Add your answer

Q28. What do you do if you forget the root password of the Service Console?

Ans.

To reset the root password of the Service Console, you can follow these steps:

  • Restart the system and press 'e' at the GRUB menu to edit the boot configuration

  • Locate the line starting with 'linux' and append 'init=/bin/bash' at the end

  • Press 'Ctrl + X' to boot into single-user mode

  • Remount the root file system as read-write by running 'mount -o remount,rw /'

  • Reset the root password by running 'passwd root'

  • Reboot the system and login with the new root password

Add your answer

Q29. What are the files will be created while creating a VM and after powering on the VM?

Add your answer

Q30. How will you turn start / stop a VM through command prompt?

Add your answer

Q31. How will you check the network bandwidth utilization in an ESXS host through command prompt?

Add your answer

Q32. What is the most important aspect of deploying ESX Server and virtual machines?

Add your answer

Q33. Can I back up my entire virtual machine from the Service Console?

Add your answer

Q34. If I can't get a SAN, will local storage with a RAID device be sufficient?

Add your answer

Q35. Given a unsorted array. Create a balanced B tree. Whether it is possible to solve this problem algorithm in logarithmic complexity ?

Ans.

It is not possible to create a balanced B tree from an unsorted array in logarithmic complexity.

  • Creating a balanced B tree from an unsorted array requires sorting the array first, which has a complexity of O(n log n).

  • Balanced B tree construction typically has a complexity of O(n log n) or O(n) depending on the algorithm used.

  • Example: If we have an unsorted array [3, 1, 4, 1, 5, 9, 2, 6, 5], we would need to sort it first before constructing a balanced B tree.

Add your answer

Q36. If the VMDK header file corrupt what will happen? How do you troubleshoot?

Add your answer

Q37. Explain about VCB? What it the minimum priority (*) to consolidate a machine?

Add your answer

Q38. ISOs have been mentioned in several of the chapters. Why are they so important?

Ans.

ISOs are important because they provide a set of standards and guidelines for various industries.

  • ISOs ensure consistency and quality in products and services.

  • ISOs help organizations meet legal and regulatory requirements.

  • ISOs promote international trade by harmonizing standards across countries.

  • ISOs enhance customer confidence and trust in products and services.

  • ISOs facilitate interoperability and compatibility between different systems.

  • ISOs cover a wide range of areas such a...read more

Add your answer

Q39. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?

Add your answer

Q40. Have you ever patched the ESX host? What are the steps involved in that?

Add your answer

Q41. What will happen if I deploy systems management software on the ESX Server itself?

Add your answer

Q42. Which version of VMware ESX Server supports Boot from SAN?

Add your answer

Q43. What’s the difference between Top and ESXTOP command?

Add your answer

Q44. What is the difference between MVC and Factory pattern?

Add your answer

Q45. What software is qualified for use with VMware 2.5.1?

Add your answer

Q46. How Virtual Machine communicates to another servers in Network ?

Add your answer

Q47. What are the different components used in VMWare infrastructure?

View 3 more answers

Q48. Sample : what is the primary and secondary function of HCC appliance

Add your answer

Q49. Given two strings, write an efficient algorithm (in Java) to compare the two of them. Your algorithm should handle all cases

Ans.

An efficient algorithm in Java to compare two strings.

  • Use the equals() method to compare two strings for equality.

  • Consider using compareTo() method for comparing strings lexicographically.

  • Handle null strings separately to avoid NullPointerException.

  • Use equalsIgnoreCase() method for case-insensitive comparison.

Add your answer

Q50. Given +ve numbers in an array . Put the even nos to the left of the array and the odd to the right side of the array . Don't use extra array

Add your answer

Q51. If you already have a memory, how will use that memory to allocate a new buffer? (placement new)

Add your answer

Q52. Where are log files for VMware ESX Server written to?

Add your answer

Q53. What is the command used to restart SSH, NTP & Vmware Web access?

Ans.

The command to restart SSH, NTP, and VMware Web access is service.

  • To restart SSH, use the command 'service ssh restart'

  • To restart NTP, use the command 'service ntp restart'

  • To restart VMware Web access, use the command 'service vmware-webaccess restart'

Add your answer

Q54. What is the default number of ports configured with the Virtual Switch?

Add your answer

Q55. Delete every third element of an array until only one element is remaining. Tell the index of that remaining element in O(1) time complexity

Add your answer

Q56. What are the protocols that you know at MAC layer ?

Ans.

MAC layer protocols are used for communication between devices in a network.

  • Ethernet (IEEE 802.3)

  • Wi-Fi (IEEE 802.11)

  • Bluetooth (IEEE 802.15.1)

  • Token Ring (IEEE 802.5)

  • Zigbee (IEEE 802.15.4)

Add your answer

Q57. What is the most important best practice to follow?

Add your answer

Q58. How Virtual Machine communicates to another servers in Network ?

Ans.

Virtual machines communicate with other servers in a network through various networking protocols and technologies.

  • Virtual machines use network adapters to connect to the network.

  • They can communicate with other servers using IP addresses and domain names.

  • Virtual machines can send and receive data packets over the network using protocols like TCP/IP or UDP.

  • They can establish connections with other servers using protocols like HTTP, FTP, SSH, etc.

  • Virtual machines can also commu...read more

View 1 answer

Q59. Write a LinkedList implementation which accept binary number and another method to give oitput in decimal.

Add your answer

Q60. Delete the repeated elements in a singly linked list in O(n) time complexity without using extra space. Linked list contains elements in unsorted order(Sorting is not allowed)

Add your answer

Q61. Pros and Cons of Akamai client reputation

Ans.

Akamai client reputation has pros and cons in CDN services.

  • Pros: Improved security by blocking malicious clients, reduced network congestion, enhanced content delivery performance.

  • Cons: Potential false positives leading to blocking legitimate clients, reliance on reputation data accuracy, additional complexity in managing reputation rules.

  • Example: Akamai client reputation can help prevent DDoS attacks by blocking known malicious IP addresses, improving overall network securit...read more

Add your answer

Q62. Approach to troubleshoot slow connection problem

Ans.

To troubleshoot a slow connection problem, start by checking the network infrastructure, analyzing network traffic, and testing connectivity.

  • Check the network infrastructure for any hardware or software issues

  • Analyze network traffic using tools like Wireshark to identify any bottlenecks or anomalies

  • Test connectivity by pinging various network devices and checking for packet loss

  • Check for any bandwidth limitations or congestion on the network

  • Investigate the performance of DNS ...read more

Add your answer

Q63. Which system call is used to poll among fds? (select or epoll_wait)

Add your answer

Q64. What SANs are compatible with ESX Server?

Add your answer

Q65. What are the types of Ports groups in ESX/ESXi?

Add your answer

Q66. What are the protocols that you know in transport layer?

Ans.

Transport layer protocols facilitate the reliable transmission of data between network devices.

  • Transmission Control Protocol (TCP) is a connection-oriented protocol that ensures reliable delivery of data.

  • User Datagram Protocol (UDP) is a connectionless protocol that provides faster but less reliable transmission.

  • Internet Control Message Protocol (ICMP) is used for network error reporting and diagnostic functions.

  • Real-Time Transport Protocol (RTP) is commonly used for streamin...read more

Add your answer

Q67. How does FT works? Prerequisites? Port used?

Ans.

FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server.

  • FTP works by establishing a connection between a client and a server, allowing the client to upload or download files.

  • Prerequisites for using FTP include a client FTP software, a server with FTP capabilities, and valid credentials for accessing the server.

  • The default port used for FTP is 21, but it can be configured to use other ports for security reasons.

Add your answer

Q68. What is the use of Service Console port ?

Ans.

The Service Console port is used for managing and configuring the network settings of a device.

  • The Service Console port provides access to the device's management interface.

  • It allows administrators to remotely configure and monitor the device.

  • The port is typically used for tasks such as setting up network parameters, managing security settings, and troubleshooting.

  • It can also be used for firmware updates and accessing diagnostic tools.

  • Examples of devices with Service Console ...read more

Add your answer

Q69. What are the certified backup tools for ESX?

Add your answer

Q70. What is the use of Virtual Machine Port Group?

Add your answer

Q71. Given an array with repeated numbers, print the frequencies of each number

Add your answer

Q72. How Akamai CDN works?

Ans.

Akamai CDN is a distributed network that delivers web content efficiently by caching it on servers located closer to end users.

  • Akamai CDN uses a network of servers distributed globally to cache and deliver web content.

  • When a user requests content, Akamai's intelligent routing system directs the request to the nearest server.

  • The server delivers the cached content to the user, reducing latency and improving performance.

  • Akamai CDN also provides security features like DDoS protec...read more

Add your answer

Q73. Can ISOs be shared between ESX Servers?

Add your answer

Q74. What is the use of VMKernel Port ?

Add your answer

Q75. What is the use of Virtual Machine Port Group?

Add your answer

Q76. What is the difference between UDP and TCP?

Add your answer

Q77. What is the connection end point in TCP ?

Add your answer

Q78. What are the types of Ports groups in ESX/ESXi?

Add your answer

Q79. What do you mean by a sequential access file?

Add your answer

Q80. 1. Design sticky notes system 2. infinite scrollbar API for a customer

Add your answer

Q81. How does snap shot’s works?

Add your answer

Q82. Arp protocol and why it is used?

Ans.

ARP protocol is used to map IP addresses to MAC addresses on a local network.

  • ARP stands for Address Resolution Protocol.

  • It is used to resolve IP addresses to MAC addresses on a local network.

  • ARP is essential for communication between devices on the same network.

  • Example: When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address corresponding to the IP address.

Add your answer

Q83. Virtual base classes and why it is used?

Ans.

Virtual base classes are used in C++ to resolve the problem of multiple inheritance and diamond problem.

  • Virtual base classes are used when a class is derived from multiple classes and there is a possibility of multiple instances of a base class.

  • It helps in avoiding the ambiguity caused by multiple inheritance.

  • Virtual base classes are declared using the 'virtual' keyword in the base class declaration.

  • They are typically used in scenarios where a derived class needs to access a ...read more

Add your answer

Q84. Do you what is ESXI host and vcenter server?

Add your answer

Q85. Why is Vmotion so cool?

Ans.

Vmotion is cool because it allows live migration of virtual machines without downtime.

  • Vmotion enables seamless migration of virtual machines between physical servers.

  • It eliminates the need for planned downtime during server maintenance or upgrades.

  • Vmotion ensures high availability and continuous operation of virtualized environments.

  • It allows workload balancing and resource optimization across the infrastructure.

  • With Vmotion, virtual machines can be moved across different dat...read more

Add your answer

Q86. What is a hypervisor?

Ans.

A hypervisor is a software or hardware component that enables the virtualization of computer hardware.

  • A hypervisor allows multiple operating systems to run on a single physical machine.

  • It provides a layer of abstraction between the physical hardware and the virtual machines.

  • There are two types of hypervisors: Type 1 (bare-metal) and Type 2 (hosted).

  • Examples of hypervisors include VMware ESXi, Microsoft Hyper-V, and KVM.

Add your answer

Q87. What is Service Console?

Add your answer

Q88. What is the VMlibrary?

Add your answer

Q89. What is Center Agent?

Add your answer

Q90. Prerequisites VC, Update manager?

Ans.

Prerequisites for VC and Update Manager

  • VC (Virtual Center) requires a Windows Server OS and a supported database server

  • Update Manager requires vCenter Server and a Windows Server OS

  • Both require compatible hardware and software versions

Add your answer

Q91. How VDR works?

Add your answer

Q92. What is VMKernel ?

Ans.

VMKernel is a component of VMware ESXi that manages the virtualization layer and provides services for virtual machines.

  • VMKernel is responsible for managing the CPU, memory, storage, and networking resources of virtual machines.

  • It acts as a bridge between the hardware and the virtual machines, allowing them to run efficiently and securely.

  • VMKernel provides features like memory management, device drivers, virtual networking, and virtual storage.

  • It enables the hypervisor to sch...read more

Add your answer

Q93. Why virtual functions?

Ans.

Virtual functions allow for dynamic polymorphism and runtime binding in object-oriented programming.

  • Virtual functions enable the implementation of polymorphism, where a derived class can be treated as its base class.

  • They allow for late binding, meaning the appropriate function implementation is determined at runtime based on the actual object type.

  • Virtual functions provide a way to override base class methods in derived classes, allowing for customization and specialization.

  • T...read more

Add your answer

Q94. Coding Hacker rank

Add your answer

Q95. find out the duplicate elements from list.

Add your answer

Q96. 2-D dynamic array allocation syntax?

Ans.

2-D dynamic array allocation syntax involves using double pointers to allocate memory for an array of strings.

  • Use double pointers to allocate memory for rows and columns

  • Example: char **array = (char **)malloc(rows * sizeof(char *));

  • Allocate memory for each row: array[i] = (char *)malloc(columns * sizeof(char));

Add your answer

Q97. Reverse a string in place

Add your answer

Q98. Coding Hacker rank

Add your answer

Q99. What is LOD? Limitation of Tableau?

Add your answer

Q100. Explain zero based addressing

Ans.

Zero-based addressing is a method of numbering elements in a data structure or array, where the first element is assigned index 0.

  • In zero-based addressing, the first element of an array is accessed using index 0.

  • This means that the second element is accessed using index 1, the third element using index 2, and so on.

  • Zero-based addressing is commonly used in programming languages like C, C++, Java, and Python.

  • For example, in an array of integers [10, 20, 30], the element 10 is ...read more

View 1 answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Ubisoft Entertainment

based on 101 interviews
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 656 Interview Questions
4.0
 • 365 Interview Questions
4.1
 • 210 Interview Questions
3.6
 • 204 Interview Questions
4.2
 • 189 Interview Questions
4.2
 • 166 Interview Questions
View all
Top VMware Software Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter