VMware Software
200+ Interview Questions and Answers
You are given a number 'N' in the form of a string 'S', your task is to find the smallest number strictly greater than the given number 'N' which is a palindrome...read more
You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.
For example:
If the given string is: STR = "abcde". You h...read more
You have been given two strings 'STR1' and 'STR2'. You have to check whether the two strings are anagram to each other or not.
Note:
Two strings are said to be anagram if they contain the same ...read more
You have been given a sorted array/list ARR consisting of ‘N’ elements. You are also given an integer ‘K’.
Now the array is rotated at some pivot point unknown to you. For example,...read more
Q5. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th ...
read moreBob lives with his wife in a city named Berland. Bob is a good husband, so he goes out with his wife every Friday to ‘Arcade’ mall.
‘Arcade’ is a very famous mall in Berland. It has a very unique t...read more
You are given a Binary Search Tree (BST) and a target value ‘K’. Your task is to check if there exist two unique elements in the given BST such that their sum is equal to the given target ‘K’.
A...read more
You have been given an array/list ARR consisting of ‘N’ elements. Each element in the array is either 0, 1 or 2.
Now, your task is to sort this array/list in increasing order. For ...read more
Aahad and Harshit always have fun by solving problems. Harshit took a sorted array and rotated it clockwise by an unknown amount. For example, he took a sorted array = [1, 2, 3, 4,...read more
Q10. Docker command to transfer an image from one machine to another without using docker registry
Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.
Use the 'docker save' command to save the image as a tar file on the source machine
Transfer the tar file to the destination machine using any file transfer method (e.g., scp)
On the destination machine, use the 'docker load' command to load the image from the tar file
You are given three arrays 'A', 'B' and 'C' of length 'N', 'M' and 'K' respectively. All the three arrays are sorted in non-decreasing order. Your task is to find all such ...read more
You are given a Singly Linked List of integers. You need to reverse the Linked List by changing the links between nodes.
Input Format :
The first line of input contains a single integer T, re...read more
Which data structure you will use to implement the undo and redo operation in a system.
Q14. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...
read moreNinja is feeling very bored and wants to try something new. So, he decides to find the reverse of a given number. But he cannot do it on his own and needs your help.
Note:
If a number has trailing...read more
You are given a linked list of 'N' nodes and an integer 'K'. You have to reverse the given linked list in groups of size K i.e if the list contains x nodes numbered from 1 to x, then yo...read more
You are given three rods (numbered 1 to 3), and ‘N’ disks initially placed on the first rod, one on top of each other in increasing order of size ( the largest disk is at the bottom). You are supp...read more
You are given an array 'ARR' of integers having 'N' elements. Your task is to convert the input array into a min-Binary Heap.
A min-Binary heap is a complete binary tree in which the value of each...read more
Reverse a given stack of integers using recursion.
Note:
You are not allowed to use any extra space other than the internal stack space used due to recursion. You are not allowed to...read more
You are given an array of integers ARR[] of size N consisting of zeros and ones. You have to select a subset and flip bits of that subset. You have to return the count of maximum one’s that you can obt...read more
Q21. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...
read moreThere is a wedding ceremony at NinjaLand. The bride and groom want everybody to play a game and thus, they have blindfolded the attendees. The people from the bride’s side are holding odd numb...read more
You have been given a sorted array of length ‘N’. You need to construct a balanced binary search tree from the array. If there can be more than one possible tree, then you can return ...read more
You have been given a sorted array/list ARR consisting of ‘N’ elements. You are also given an integer ‘K’.
Now, your task is to find the first and last occur...read more
You are given two arrays 'A' and 'B' of size 'N' and 'M' respectively. Both these arrays are sorted in non-decreasing order. You have to find the intersection of these two arrays.
Inte...read more
You are given an array 'ARR' of positive integers. Your task is to check whether the array 'ARR' is a valid Preorder Traversal of a Binary Search Tree.
A binary search tree (...read more
You are given a linked list of N nodes. Your task is to remove the duplicate nodes from the linked list such that every element in the linked list occurs only once i.e...read more
How to copy Docker images from one host to another without using a repository?
How do you block specific IPs on your EC2 instance (AWS)?
Q30. What is the usecase which would require setup of distributed jenkins nodes
Distributed Jenkins nodes are used to handle large-scale builds and improve performance.
Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.
Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.
Resource utilization: Distributed nodes allow for better utilization of resources...read more
Q31. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...
read moreWhat does the load balancer do when an instance in AWS is deregistered?
How to debug a website template which is very slow?
What is the usecase which would require setup of distributed jenkins nodes?
What is Inversion of Control?
What are terraform modules ?
How would you debug apache nginx issues ?
How would you prevent a DDOS attack ?
There are eight identical-looking coins; one of these coins is counterfeit and is known to be lighter than the genuine coins. What is the minimum number of weighings needed to identify the fake coin with ...read more
What are the different states of Entity Instances?
He asked me to design the bank architecture using the basic oops concept in any language
What is load average in Linux?
Q43. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...
read moreDesign file searching functionality for windows/mac (indexing of file names).
Q45. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...
read moreWhat are the advantages of design patterns in Java ?
Q47. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.
Akamai request flow involves parsing rules in a hierarchical manner.
Akamai request flow involves multiple stages and rules.
When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.
During each stage, different rules are parsed and applied based on the configuration.
The hierarchy of rules determines the order in which they are evaluated and applied.
For example, caching rules may be evaluated before delivery rules.
Th...read more
1. Why VMware Software?
2. Where do you see yourself after 5 years?
Q49. How would you debug a website which is progressively slowing down
To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.
Analyze server logs to identify any errors or bottlenecks
Check for memory leaks in the code
Optimize the code by removing unnecessary scripts and optimizing images
Use tools like Chrome DevTools to identify performance issues
Consider implementing a content delivery network (CDN) to improve website speed
Q50. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array
Q51. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?
Q52. What does a load balancer do when an instance in aws stops
Load balancer routes traffic to other healthy instances
Load balancer detects the unhealthy instance
Stops sending traffic to that instance
Routes traffic to other healthy instances
Maintains high availability and scalability of the application
Q53. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?
Q54. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?
Q55. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?
To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.
Add the new LUN to the storage array
Rescan the storage adapters in vSphere Client
Create a new datastore using the new LUN ID
Set the block size based on the volume size (e.g. 1MB for 500GB volume size)
What is the system call which creates a seperate connection?
Q57. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?
Q58. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?
The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.
Ping the ESX server from the vSphere Client/vCenter to check network connectivity.
Check if the ESX server is reachable by using the vmkping command.
Verify if the ESX server's management services are running using the service mgmt-vmware status command.
Check the firewall settings on the ESX server to ensure necessary ports are open.
Restart the management agents on the ESX server using...read more
Q59. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?
To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:
Find the middle element of the sorted skewed binary tree.
Make it the root of the new binary search tree.
Recursively repeat the process for the left and right halves of the original tree.
Attach the resulting subtrees as the left and right children of the root.
Q60. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000
Q61. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?
Q62. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?
What are the different advice types in Spring AOP?
What are the benefits of Java Executor Framework?
Q66. What is the command used to restart SSH, NTP & Vmware Web access?
The command to restart SSH, NTP, and VMware Web access is service.
To restart SSH, use the command: service ssh restart
To restart NTP, use the command: service ntp restart
To restart VMware Web access, use the command: service vmware-webaccess restart
Q67. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there ...
read moreQ68. Describe inodes and file descriptors. What is the use of swap
Inodes are data structures that store information about files on a Unix/Linux file system. File descriptors are unique identifiers for open files. Swap is a space on a hard disk used as virtual memory.
Inodes contain metadata about files such as ownership, permissions, and timestamps.
File descriptors are used by the operating system to keep track of open files and to perform I/O operations on them.
Swap is used when the amount of physical memory (RAM) is insufficient to hold al...read more
Q69. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?
You will be given with a 3 Litres container & a 5 Litres Container. Measure exactly 7 Litres of water.
What are the advantages and disadvantages of buddy system?
What is Dependency Injection?
Q73. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.
Q74. Is there a way to blacklist IPs in AWS
Yes, AWS provides various methods to blacklist IPs.
Use AWS WAF to create rules to block specific IP addresses
Configure security groups to deny traffic from specific IP addresses
Utilize AWS Network ACLs to block traffic from specific IP addresses
Difference between inode number and file descriptor?
Q76. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?
Q77. What is the default number of ports configured with the Virtual Switch?
The default number of ports configured with the Virtual Switch is 8.
The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.
By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.
These ports can be assigned to different virtual machines or network adapters as needed.
Additional ports can be added or existing ports can be...read more
Q78. What are the relevant elements to be considered in ascertaining the Cost of creating a Quote by an IT Company
The relevant elements to consider in ascertaining the cost of creating a quote by an IT company
Scope of the project
Complexity of the requirements
Labor costs
Technology and tools required
Timeframe for completion
Overhead expenses
Profit margin
Competitor pricing
Client's budget constraints
Q79. Why did VMware limit its beta of ESX Server 3.0 to so few?
Q80. Im not able to connect to the Service Console over the network. What could the issue be?
How to implement Java executor framework ?
If you already have a memory, how will use that memory to allocate a new buffer?
Q83. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?
Q84. How to implement executor framework and it's benefits
Executor framework is used to manage threads and execute tasks asynchronously.
Executor framework provides a way to manage threads and execute tasks asynchronously.
It provides a thread pool and a queue to manage tasks.
It helps in improving the performance of the application by reducing the overhead of creating and destroying threads.
It also provides a way to handle exceptions and errors in the tasks.
Example: Executors.newFixedThreadPool(10) creates a thread pool of 10 threads.
Q85. What do you do if you forget the root password of the Service Console?
To reset the root password of the Service Console, you can follow these steps:
Restart the system and press 'e' at the GRUB menu to edit the boot configuration
Locate the line starting with 'linux' and append 'init=/bin/bash' at the end
Press 'Ctrl + X' to boot into single-user mode
Remount the root file system as read-write by running 'mount -o remount,rw /'
Reset the root password by running 'passwd root'
Reboot the system and login with the new root password
Q86. What are the files will be created while creating a VM and after powering on the VM?
Q87. How will you turn start / stop a VM through command prompt?
Q88. How will you check the network bandwidth utilization in an ESXS host through command prompt?
Q89. What is the most important aspect of deploying ESX Server and virtual machines?
Q90. Can I back up my entire virtual machine from the Service Console?
Q91. If I can't get a SAN, will local storage with a RAID device be sufficient?
What is the difference between TELNET and SSH?
What is a volatile variable ?
Q94. If the VMDK header file corrupt what will happen? How do you troubleshoot?
Q95. Explain about VCB? What it the minimum priority (*) to consolidate a machine?
How to dynamically allocate a 2D array in C?
Q97. ISOs have been mentioned in several of the chapters. Why are they so important?
ISOs are important because they provide a set of standards and guidelines for various industries.
ISOs ensure consistency and quality in products and services.
ISOs help organizations meet legal and regulatory requirements.
ISOs promote international trade by harmonizing standards across countries.
ISOs enhance customer confidence and trust in products and services.
ISOs facilitate interoperability and compatibility between different systems.
ISOs cover a wide range of areas such a...read more
Q98. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?
Q99. Have you ever patched the ESX host? What are the steps involved in that?
Q100. What will happen if I deploy systems management software on the ESX Server itself?
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month