VMware Software
100+ Ubisoft Entertainment Interview Questions and Answers
Q1. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th...
read moreQ2. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...
read moreVMware HA allows for a maximum of 4 host failures within a cluster. If a 5th host fails, VMs may not restart depending on admission control settings.
Maximum allowed host failures within a HA cluster is 4
If a 5th host fails and admission control is enabled, some VMs may not restart due to resource constraints
If admission control is disabled, VMs will restart on any remaining host but may not be functional
Ensure enough port groups are configured on vSwitch for Virtual Machine p...read more
Q3. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...
read morePrerequisites for HA clusters in VMware environment
Virtual machines and configuration files must be on shared storage
Console network should have redundant network paths for reliable failure detection
Hosts in cluster must be part of a VMotion network for DRS with HA
Q4. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...
read moreQ5. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...
read morePrerequisites for VMotion include network configuration, CPU compatibility, shared storage, and virtual switch restrictions.
ESX Servers must have VMkernel ports enabled for VMotion on the same network segment
ESX Servers must be managed by the same Virtual Center server
ESX Servers must have compatible CPUs
ESX Servers must have consistent networks and network labels
VMs must be stored on shared storage like iSCSI, FC SAN, or NAS/NFS
VMs cannot use local CD/floppy or internal-only...read more
Q6. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...
read moreQ7. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.
Akamai request flow involves parsing rules in a hierarchical manner.
Akamai request flow involves multiple stages and rules.
When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.
During each stage, different rules are parsed and applied based on the configuration.
The hierarchy of rules determines the order in which they are evaluated and applied.
For example, caching rules may be evaluated before delivery rules.
Th...read more
Q8. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?
The implemented method would be of the interface that is extended first in the class declaration.
In this case, since class A implements B and C, the implemented method m1 would be of interface B if B is extended first in the class declaration.
If C was extended first in the class declaration, then the implemented method m1 would be of interface C.
The order of interface extension determines which interface's method is implemented in the class.
Q9. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array
Q10. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?
Virtual machine processes may still be visible in the Service Console even when powered down.
Virtual machine processes may still be running in the background even when the virtual machine is powered down.
The ps command shows all processes running on the system, including those related to virtual machines.
Some processes may continue to run for maintenance or monitoring purposes even when the virtual machine is not actively running.
Q11. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?
Q12. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?
To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.
Add the new LUN to the storage array
Rescan the storage adapters in vSphere Client
Create a new datastore using the new LUN ID
Set the block size based on the volume size (e.g. 1MB for 500GB volume size)
Q13. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?
Q14. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?
The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.
Ping the ESX server from the vSphere Client/vCenter to check network connectivity.
Check if the ESX server is reachable by using the vmkping command.
Verify if the ESX server's management services are running using the service mgmt-vmware status command.
Check the firewall settings on the ESX server to ensure necessary ports are open.
Restart the management agents on the ESX server using...read more
Q15. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?
To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:
Find the middle element of the sorted skewed binary tree.
Make it the root of the new binary search tree.
Recursively repeat the process for the left and right halves of the original tree.
Attach the resulting subtrees as the left and right children of the root.
Q16. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000
Q17. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?
Q18. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?
Q19. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there...
read moreFunction to print permutations of elements from arraylists with no duplicates.
Use recursion to generate all possible permutations by selecting one element from each arraylist at a time.
Keep track of used elements to avoid duplicates in the permutation sets.
Use a set data structure to store and check for duplicates efficiently.
Q20. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?
Adding a new VLAN to a production network involves several steps and enabling it requires configuration changes.
Plan the new VLAN configuration including VLAN ID, subnet, and gateway.
Configure the switch or router to create the new VLAN.
Assign ports to the new VLAN as needed.
Enable routing between the new VLAN and other VLANs if required.
Test the new VLAN to ensure connectivity and functionality.
Examples: VLAN 20 with subnet 192.168.20.0/24 and gateway 192.168.20.1.
Examples: ...read more
Q21. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?
Connecting ESX host through VC and vSphere involves different services and port numbers.
Connecting ESX host through VC involves vCenter Server which provides centralized management and monitoring.
Connecting ESX host through vSphere involves vCenter Server along with additional services like vSphere Client and vSphere Web Client.
Some of the services involved in connecting ESX host through VC and vSphere include vCenter Server, vSphere Client, vSphere Web Client, and ESXi host ...read more
Q22. What is the command used to restart SSH, NTP & Vmware Web access?
The command to restart SSH, NTP, and VMware Web access is service.
To restart SSH, use the command: service ssh restart
To restart NTP, use the command: service ntp restart
To restart VMware Web access, use the command: service vmware-webaccess restart
Q23. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.
Check if a Binary Tree formed from a Post order traversal array is a Binary Search Tree.
Start by constructing the Binary Tree from the given Post order traversal array.
Check if the Binary Tree satisfies the properties of a Binary Search Tree.
Use recursion to check if each node's value is within the correct range.
Example: Post order traversal array [1, 3, 2] forms a Binary Search Tree.
Example: Post order traversal array [3, 2, 1] does not form a Binary Search Tree.
Q24. What is the default number of ports configured with the Virtual Switch?
The default number of ports configured with the Virtual Switch is 8.
The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.
By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.
These ports can be assigned to different virtual machines or network adapters as needed.
Additional ports can be added or existing ports can be...read more
Q25. Im not able to connect to the Service Console over the network. What could the issue be?
Possible reasons for not being able to connect to the Service Console over the network.
Check network connectivity and ensure the correct IP address is being used.
Verify firewall settings to allow access to the Service Console.
Ensure the Service Console service is running properly.
Check for any network configuration issues or restrictions.
Restart the Service Console and try connecting again.
Q26. Why did VMware limit its beta of ESX Server 3.0 to so few?
Q27. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?
Q28. What do you do if you forget the root password of the Service Console?
To reset the root password of the Service Console, you can follow these steps:
Restart the system and press 'e' at the GRUB menu to edit the boot configuration
Locate the line starting with 'linux' and append 'init=/bin/bash' at the end
Press 'Ctrl + X' to boot into single-user mode
Remount the root file system as read-write by running 'mount -o remount,rw /'
Reset the root password by running 'passwd root'
Reboot the system and login with the new root password
Q29. What are the files will be created while creating a VM and after powering on the VM?
Q30. How will you turn start / stop a VM through command prompt?
Q31. How will you check the network bandwidth utilization in an ESXS host through command prompt?
Q32. What is the most important aspect of deploying ESX Server and virtual machines?
Q33. Can I back up my entire virtual machine from the Service Console?
Q34. If I can't get a SAN, will local storage with a RAID device be sufficient?
Q35. Given a unsorted array. Create a balanced B tree. Whether it is possible to solve this problem algorithm in logarithmic complexity ?
It is not possible to create a balanced B tree from an unsorted array in logarithmic complexity.
Creating a balanced B tree from an unsorted array requires sorting the array first, which has a complexity of O(n log n).
Balanced B tree construction typically has a complexity of O(n log n) or O(n) depending on the algorithm used.
Example: If we have an unsorted array [3, 1, 4, 1, 5, 9, 2, 6, 5], we would need to sort it first before constructing a balanced B tree.
Q36. If the VMDK header file corrupt what will happen? How do you troubleshoot?
Q37. Explain about VCB? What it the minimum priority (*) to consolidate a machine?
Q38. ISOs have been mentioned in several of the chapters. Why are they so important?
ISOs are important because they provide a set of standards and guidelines for various industries.
ISOs ensure consistency and quality in products and services.
ISOs help organizations meet legal and regulatory requirements.
ISOs promote international trade by harmonizing standards across countries.
ISOs enhance customer confidence and trust in products and services.
ISOs facilitate interoperability and compatibility between different systems.
ISOs cover a wide range of areas such a...read more
Q39. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?
Q40. Have you ever patched the ESX host? What are the steps involved in that?
Q41. What will happen if I deploy systems management software on the ESX Server itself?
Q42. Which version of VMware ESX Server supports Boot from SAN?
Q43. What’s the difference between Top and ESXTOP command?
Q44. What is the difference between MVC and Factory pattern?
Q45. What software is qualified for use with VMware 2.5.1?
Q46. How Virtual Machine communicates to another servers in Network ?
Q47. What are the different components used in VMWare infrastructure?
Q48. Sample : what is the primary and secondary function of HCC appliance
Q49. Given two strings, write an efficient algorithm (in Java) to compare the two of them. Your algorithm should handle all cases
An efficient algorithm in Java to compare two strings.
Use the equals() method to compare two strings for equality.
Consider using compareTo() method for comparing strings lexicographically.
Handle null strings separately to avoid NullPointerException.
Use equalsIgnoreCase() method for case-insensitive comparison.
Q50. Given +ve numbers in an array . Put the even nos to the left of the array and the odd to the right side of the array . Don't use extra array
Q51. If you already have a memory, how will use that memory to allocate a new buffer? (placement new)
Q52. Where are log files for VMware ESX Server written to?
Q53. What is the command used to restart SSH, NTP & Vmware Web access?
The command to restart SSH, NTP, and VMware Web access is service.
To restart SSH, use the command 'service ssh restart'
To restart NTP, use the command 'service ntp restart'
To restart VMware Web access, use the command 'service vmware-webaccess restart'
Q54. What is the default number of ports configured with the Virtual Switch?
Q55. Delete every third element of an array until only one element is remaining. Tell the index of that remaining element in O(1) time complexity
Q56. What are the protocols that you know at MAC layer ?
MAC layer protocols are used for communication between devices in a network.
Ethernet (IEEE 802.3)
Wi-Fi (IEEE 802.11)
Bluetooth (IEEE 802.15.1)
Token Ring (IEEE 802.5)
Zigbee (IEEE 802.15.4)
Q57. What is the most important best practice to follow?
Q58. How Virtual Machine communicates to another servers in Network ?
Virtual machines communicate with other servers in a network through various networking protocols and technologies.
Virtual machines use network adapters to connect to the network.
They can communicate with other servers using IP addresses and domain names.
Virtual machines can send and receive data packets over the network using protocols like TCP/IP or UDP.
They can establish connections with other servers using protocols like HTTP, FTP, SSH, etc.
Virtual machines can also commu...read more
Q59. Write a LinkedList implementation which accept binary number and another method to give oitput in decimal.
Q60. Delete the repeated elements in a singly linked list in O(n) time complexity without using extra space. Linked list contains elements in unsorted order(Sorting is not allowed)
Q61. Pros and Cons of Akamai client reputation
Akamai client reputation has pros and cons in CDN services.
Pros: Improved security by blocking malicious clients, reduced network congestion, enhanced content delivery performance.
Cons: Potential false positives leading to blocking legitimate clients, reliance on reputation data accuracy, additional complexity in managing reputation rules.
Example: Akamai client reputation can help prevent DDoS attacks by blocking known malicious IP addresses, improving overall network securit...read more
Q62. Approach to troubleshoot slow connection problem
To troubleshoot a slow connection problem, start by checking the network infrastructure, analyzing network traffic, and testing connectivity.
Check the network infrastructure for any hardware or software issues
Analyze network traffic using tools like Wireshark to identify any bottlenecks or anomalies
Test connectivity by pinging various network devices and checking for packet loss
Check for any bandwidth limitations or congestion on the network
Investigate the performance of DNS ...read more
Q63. Which system call is used to poll among fds? (select or epoll_wait)
Q64. What SANs are compatible with ESX Server?
Q65. What are the types of Ports groups in ESX/ESXi?
Q66. What are the protocols that you know in transport layer?
Transport layer protocols facilitate the reliable transmission of data between network devices.
Transmission Control Protocol (TCP) is a connection-oriented protocol that ensures reliable delivery of data.
User Datagram Protocol (UDP) is a connectionless protocol that provides faster but less reliable transmission.
Internet Control Message Protocol (ICMP) is used for network error reporting and diagnostic functions.
Real-Time Transport Protocol (RTP) is commonly used for streamin...read more
Q67. How does FT works? Prerequisites? Port used?
FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server.
FTP works by establishing a connection between a client and a server, allowing the client to upload or download files.
Prerequisites for using FTP include a client FTP software, a server with FTP capabilities, and valid credentials for accessing the server.
The default port used for FTP is 21, but it can be configured to use other ports for security reasons.
Q68. What is the use of Service Console port ?
The Service Console port is used for managing and configuring the network settings of a device.
The Service Console port provides access to the device's management interface.
It allows administrators to remotely configure and monitor the device.
The port is typically used for tasks such as setting up network parameters, managing security settings, and troubleshooting.
It can also be used for firmware updates and accessing diagnostic tools.
Examples of devices with Service Console ...read more
Q69. What are the certified backup tools for ESX?
Q70. What is the use of Virtual Machine Port Group?
Q71. Given an array with repeated numbers, print the frequencies of each number
Q72. How Akamai CDN works?
Akamai CDN is a distributed network that delivers web content efficiently by caching it on servers located closer to end users.
Akamai CDN uses a network of servers distributed globally to cache and deliver web content.
When a user requests content, Akamai's intelligent routing system directs the request to the nearest server.
The server delivers the cached content to the user, reducing latency and improving performance.
Akamai CDN also provides security features like DDoS protec...read more
Q73. Can ISOs be shared between ESX Servers?
Q74. What is the use of VMKernel Port ?
Q75. What is the use of Virtual Machine Port Group?
Q76. What is the difference between UDP and TCP?
Q77. What is the connection end point in TCP ?
Q78. What are the types of Ports groups in ESX/ESXi?
Q79. What do you mean by a sequential access file?
Q80. 1. Design sticky notes system 2. infinite scrollbar API for a customer
Q81. How does snap shot’s works?
Q82. Arp protocol and why it is used?
ARP protocol is used to map IP addresses to MAC addresses on a local network.
ARP stands for Address Resolution Protocol.
It is used to resolve IP addresses to MAC addresses on a local network.
ARP is essential for communication between devices on the same network.
Example: When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address corresponding to the IP address.
Q83. Virtual base classes and why it is used?
Virtual base classes are used in C++ to resolve the problem of multiple inheritance and diamond problem.
Virtual base classes are used when a class is derived from multiple classes and there is a possibility of multiple instances of a base class.
It helps in avoiding the ambiguity caused by multiple inheritance.
Virtual base classes are declared using the 'virtual' keyword in the base class declaration.
They are typically used in scenarios where a derived class needs to access a ...read more
Q84. Do you what is ESXI host and vcenter server?
Q85. Why is Vmotion so cool?
Vmotion is cool because it allows live migration of virtual machines without downtime.
Vmotion enables seamless migration of virtual machines between physical servers.
It eliminates the need for planned downtime during server maintenance or upgrades.
Vmotion ensures high availability and continuous operation of virtualized environments.
It allows workload balancing and resource optimization across the infrastructure.
With Vmotion, virtual machines can be moved across different dat...read more
Q86. What is a hypervisor?
A hypervisor is a software or hardware component that enables the virtualization of computer hardware.
A hypervisor allows multiple operating systems to run on a single physical machine.
It provides a layer of abstraction between the physical hardware and the virtual machines.
There are two types of hypervisors: Type 1 (bare-metal) and Type 2 (hosted).
Examples of hypervisors include VMware ESXi, Microsoft Hyper-V, and KVM.
Q87. What is Service Console?
Q88. What is the VMlibrary?
Q89. What is Center Agent?
Q90. Prerequisites VC, Update manager?
Prerequisites for VC and Update Manager
VC (Virtual Center) requires a Windows Server OS and a supported database server
Update Manager requires vCenter Server and a Windows Server OS
Both require compatible hardware and software versions
Q91. How VDR works?
Q92. What is VMKernel ?
VMKernel is a component of VMware ESXi that manages the virtualization layer and provides services for virtual machines.
VMKernel is responsible for managing the CPU, memory, storage, and networking resources of virtual machines.
It acts as a bridge between the hardware and the virtual machines, allowing them to run efficiently and securely.
VMKernel provides features like memory management, device drivers, virtual networking, and virtual storage.
It enables the hypervisor to sch...read more
Q93. Why virtual functions?
Virtual functions allow for dynamic polymorphism and runtime binding in object-oriented programming.
Virtual functions enable the implementation of polymorphism, where a derived class can be treated as its base class.
They allow for late binding, meaning the appropriate function implementation is determined at runtime based on the actual object type.
Virtual functions provide a way to override base class methods in derived classes, allowing for customization and specialization.
T...read more
Q94. Coding Hacker rank
Q95. find out the duplicate elements from list.
Q96. 2-D dynamic array allocation syntax?
2-D dynamic array allocation syntax involves using double pointers to allocate memory for an array of strings.
Use double pointers to allocate memory for rows and columns
Example: char **array = (char **)malloc(rows * sizeof(char *));
Allocate memory for each row: array[i] = (char *)malloc(columns * sizeof(char));
Q97. Reverse a string in place
Q98. Coding Hacker rank
Q99. What is LOD? Limitation of Tableau?
Q100. Explain zero based addressing
Zero-based addressing is a method of numbering elements in a data structure or array, where the first element is assigned index 0.
In zero-based addressing, the first element of an array is accessed using index 0.
This means that the second element is accessed using index 1, the third element using index 2, and so on.
Zero-based addressing is commonly used in programming languages like C, C++, Java, and Python.
For example, in an array of integers [10, 20, 30], the element 10 is ...read more
Top HR Questions asked in Ubisoft Entertainment
Interview Process at Ubisoft Entertainment
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month