Add office photos
Employer?
Claim Account for FREE

VMware Software

4.4
based on 1.1k Reviews
Filter interviews by

200+ Interview Questions and Answers

Updated 23 Oct 2024
Popular Designations
Q1. Given a string, find the next smallest palindrome

You are given a number 'N' in the form of a string 'S', your task is to find the smallest number strictly greater than the given number 'N' which is a palindrome...read more

Add your answer
Q2. Reverse the String

You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.

For example:

 If the given string is: STR = "abcde". You h...read more
View 3 more answers
Q3. Check Permutation

You have been given two strings 'STR1' and 'STR2'. You have to check whether the two strings are anagram to each other or not.

Note:
Two strings are said to be anagram if they contain the same ...read more
View 2 more answers
Q4. Search In Rotated Sorted Array

You have been given a sorted array/list ARR consisting of ‘N’ elements. You are also given an integer ‘K’.

Now the array is rotated at some pivot point unknown to you. For example,...read more

View 3 more answers
Discover null interview dos and don'ts from real experiences

Q5. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th ...

read more
Add your answer
Q6. Minimum Jumps

Bob lives with his wife in a city named Berland. Bob is a good husband, so he goes out with his wife every Friday to ‘Arcade’ mall.

‘Arcade’ is a very famous mall in Berland. It has a very unique t...read more

View 5 more answers
Are these interview questions helpful?
Q7. Pair Sum in BST.

You are given a Binary Search Tree (BST) and a target value ‘K’. Your task is to check if there exist two unique elements in the given BST such that their sum is equal to the given target ‘K’.

A...read more

View 5 more answers
Q8. Sort an array of 0s, 1s and 2s

You have been given an array/list ARR consisting of ‘N’ elements. Each element in the array is either 0, 1 or 2.

Now, your task is to sort this array/list in increasing order. For ...read more

View 4 more answers
Share interview questions and help millions of jobseekers 🌟
Q9. Search In Rotated Sorted Array

Aahad and Harshit always have fun by solving problems. Harshit took a sorted array and rotated it clockwise by an unknown amount. For example, he took a sorted array = [1, 2, 3, 4,...read more

View 3 more answers

Q10. Docker command to transfer an image from one machine to another without using docker registry

Ans.

Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.

  • Use the 'docker save' command to save the image as a tar file on the source machine

  • Transfer the tar file to the destination machine using any file transfer method (e.g., scp)

  • On the destination machine, use the 'docker load' command to load the image from the tar file

View 3 more answers
Q11. Common Elements In Three Sorted Arrays

You are given three arrays 'A', 'B' and 'C' of length 'N', 'M' and 'K' respectively. All the three arrays are sorted in non-decreasing order. Your task is to find all such ...read more

View 4 more answers
Q12. Reverse Linked List
Input Format :
The first line of input contains a single integer T, re...read more
View 3 more answers
Q13. DS Question

Which data structure you will use to implement the undo and redo operation in a system.

View 2 more answers

Q14. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...

read more
Add your answer
Q15. Reverse Number

Ninja is feeling very bored and wants to try something new. So, he decides to find the reverse of a given number. But he cannot do it on his own and needs your help.

Note:

If a number has trailing...read more
View 2 more answers
Q16. Reverse List In K Groups

You are given a linked list of 'N' nodes and an integer 'K'. You have to reverse the given linked list in groups of size K i.e if the list contains x nodes numbered from 1 to x, then yo...read more

View 3 more answers
Q17. Tower of Hanoi

You are given three rods (numbered 1 to 3), and ‘N’ disks initially placed on the first rod, one on top of each other in increasing order of size ( the largest disk is at the bottom). You are supp...read more

View 2 more answers
Q18. Build Min Heap

You are given an array 'ARR' of integers having 'N' elements. Your task is to convert the input array into a min-Binary Heap.

A min-Binary heap is a complete binary tree in which the value of each...read more

View 2 more answers
Q19. Reverse Stack Using Recursion

Reverse a given stack of integers using recursion.

Note:

You are not allowed to use any extra space other than the internal stack space used due to recursion. You are not allowed to...read more
View 2 more answers
Q20. Flip Bits

You are given an array of integers ARR[] of size N consisting of zeros and ones. You have to select a subset and flip bits of that subset. You have to return the count of maximum one’s that you can obt...read more

View 3 more answers

Q21. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...

read more
Add your answer
Q22. Segregate Odd-Even

There is a wedding ceremony at NinjaLand. The bride and groom want everybody to play a game and thus, they have blindfolded the attendees. The people from the bride’s side are holding odd numb...read more

View 3 more answers
Q23. Convert Sorted Array to BST

You have been given a sorted array of length ‘N’. You need to construct a balanced binary search tree from the array. If there can be more than one possible tree, then you can return ...read more

View 3 more answers
Q24. First and Last Position of an Element In Sorted Array

You have been given a sorted array/list ARR consisting of ‘N’ elements. You are also given an integer ‘K’.

Now, your task is to find the first and last occur...read more

View 3 more answers
Q25. Intersection Of Two Arrays

You are given two arrays 'A' and 'B' of size 'N' and 'M' respectively. Both these arrays are sorted in non-decreasing order. You have to find the intersection of these two arrays.

Inte...read more

View 3 more answers
Q26. Check If Preorder Traversal Is Valid

You are given an array 'ARR' of positive integers. Your task is to check whether the array 'ARR' is a valid Preorder Traversal of a Binary Search Tree.

A binary search tree (...read more

View 3 more answers
Q27. Remove Duplicates From Unsorted Linked List

You are given a linked list of N nodes. Your task is to remove the duplicate nodes from the linked list such that every element in the linked list occurs only once i.e...read more

View 3 more answers
Q28. Technical Question

How to copy Docker images from one host to another without using a repository?

Add your answer
Q29. Technical Question

How do you block specific IPs on your EC2 instance (AWS)?

Add your answer

Q30. What is the usecase which would require setup of distributed jenkins nodes

Ans.

Distributed Jenkins nodes are used to handle large-scale builds and improve performance.

  • Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.

  • Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.

  • Resource utilization: Distributed nodes allow for better utilization of resources...read more

View 1 answer

Q31. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...

read more
Add your answer
Q32. Technical Question

What does the load balancer do when an instance in AWS is deregistered?

Add your answer
Q33. Technical Question

How to debug a website template which is very slow?

Add your answer
Q34. Technical Question

What is the usecase which would require setup of distributed jenkins nodes?

Add your answer
Q35. Technical Question

What is Inversion of Control?

Add your answer
Q36. Technical Question

What are terraform modules ?

Add your answer
Q37. Technical Question

How would you debug apache nginx issues ?

Add your answer
Q38. Technical Question

How would you prevent a DDOS attack ?

Add your answer
Q39. Puzzle

There are eight identical-looking coins; one of these coins is counterfeit and is known to be lighter than the genuine coins. What is the minimum number of weighings needed to identify the fake coin with ...read more

Add your answer
Q40. Technical Question

What are the different states of Entity Instances?

Add your answer
Q41. OOPS Question

He asked me to design the bank architecture using the basic oops concept in any language

Add your answer
Q42. Technical Question

What is load average in Linux?

Add your answer

Q43. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...

read more
Add your answer
Q44. System Design Question

Design file searching functionality for windows/mac (indexing of file names).

Add your answer

Q45. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...

read more
Add your answer
Q46. Java Question

What are the advantages of design patterns in Java ?

Add your answer

Q47. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.

Ans.

Akamai request flow involves parsing rules in a hierarchical manner.

  • Akamai request flow involves multiple stages and rules.

  • When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.

  • During each stage, different rules are parsed and applied based on the configuration.

  • The hierarchy of rules determines the order in which they are evaluated and applied.

  • For example, caching rules may be evaluated before delivery rules.

  • Th...read more

Add your answer
Q48. Basic HR Question

1. Why VMware Software?
2. Where do you see yourself after 5 years?

Add your answer

Q49. How would you debug a website which is progressively slowing down

Ans.

To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.

  • Analyze server logs to identify any errors or bottlenecks

  • Check for memory leaks in the code

  • Optimize the code by removing unnecessary scripts and optimizing images

  • Use tools like Chrome DevTools to identify performance issues

  • Consider implementing a content delivery network (CDN) to improve website speed

Add your answer

Q50. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array

Add your answer

Q51. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?

Add your answer

Q52. What does a load balancer do when an instance in aws stops

Ans.

Load balancer routes traffic to other healthy instances

  • Load balancer detects the unhealthy instance

  • Stops sending traffic to that instance

  • Routes traffic to other healthy instances

  • Maintains high availability and scalability of the application

Add your answer

Q53. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?

Add your answer

Q54. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?

Add your answer

Q55. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?

Ans.

To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.

  • Add the new LUN to the storage array

  • Rescan the storage adapters in vSphere Client

  • Create a new datastore using the new LUN ID

  • Set the block size based on the volume size (e.g. 1MB for 500GB volume size)

Add your answer
Q56. Technical Question

What is the system call which creates a seperate connection?

Add your answer

Q57. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?

Add your answer

Q58. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?

Ans.

The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.

  • Ping the ESX server from the vSphere Client/vCenter to check network connectivity.

  • Check if the ESX server is reachable by using the vmkping command.

  • Verify if the ESX server's management services are running using the service mgmt-vmware status command.

  • Check the firewall settings on the ESX server to ensure necessary ports are open.

  • Restart the management agents on the ESX server using...read more

Add your answer

Q59. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?

Ans.

To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:

  • Find the middle element of the sorted skewed binary tree.

  • Make it the root of the new binary search tree.

  • Recursively repeat the process for the left and right halves of the original tree.

  • Attach the resulting subtrees as the left and right children of the root.

Add your answer

Q60. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000

Add your answer

Q61. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?

Add your answer

Q62. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?

Add your answer
Q63. Technical Question

What are the different advice types in Spring AOP?

Add your answer
Q64. Java Question

What is Java Executor Framework?

Add your answer
Q65. Technical Question

What are the benefits of Java Executor Framework?

Add your answer

Q66. What is the command used to restart SSH, NTP & Vmware Web access?

Ans.

The command to restart SSH, NTP, and VMware Web access is service.

  • To restart SSH, use the command: service ssh restart

  • To restart NTP, use the command: service ntp restart

  • To restart VMware Web access, use the command: service vmware-webaccess restart

Add your answer

Q67. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there ...

read more
Add your answer

Q68. Describe inodes and file descriptors. What is the use of swap

Ans.

Inodes are data structures that store information about files on a Unix/Linux file system. File descriptors are unique identifiers for open files. Swap is a space on a hard disk used as virtual memory.

  • Inodes contain metadata about files such as ownership, permissions, and timestamps.

  • File descriptors are used by the operating system to keep track of open files and to perform I/O operations on them.

  • Swap is used when the amount of physical memory (RAM) is insufficient to hold al...read more

Add your answer

Q69. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?

Add your answer
Q70. Puzzle

You will be given with a 3 Litres container & a 5 Litres Container. Measure exactly 7 Litres of water.

Add your answer
Q71. OS Question

What are the advantages and disadvantages of buddy system?

Add your answer
Q72. Technical Question

What is Dependency Injection?

Add your answer

Q73. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.

Add your answer

Q74. Is there a way to blacklist IPs in AWS

Ans.

Yes, AWS provides various methods to blacklist IPs.

  • Use AWS WAF to create rules to block specific IP addresses

  • Configure security groups to deny traffic from specific IP addresses

  • Utilize AWS Network ACLs to block traffic from specific IP addresses

View 1 answer
Q75. Technical Question

Difference between inode number and file descriptor?

Add your answer

Q76. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?

Add your answer

Q77. What is the default number of ports configured with the Virtual Switch?

Ans.

The default number of ports configured with the Virtual Switch is 8.

  • The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.

  • By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.

  • These ports can be assigned to different virtual machines or network adapters as needed.

  • Additional ports can be added or existing ports can be...read more

Add your answer

Q78. What are the relevant elements to be considered in ascertaining the Cost of creating a Quote by an IT Company

Ans.

The relevant elements to consider in ascertaining the cost of creating a quote by an IT company

  • Scope of the project

  • Complexity of the requirements

  • Labor costs

  • Technology and tools required

  • Timeframe for completion

  • Overhead expenses

  • Profit margin

  • Competitor pricing

  • Client's budget constraints

Add your answer

Q79. Why did VMware limit its beta of ESX Server 3.0 to so few?

Add your answer

Q80. Im not able to connect to the Service Console over the network. What could the issue be?

Add your answer
Q81. Technical Question

How to implement Java executor framework ?

Add your answer
Q82. OOPS Question

If you already have a memory, how will use that memory to allocate a new buffer?

Add your answer

Q83. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?

Add your answer

Q84. How to implement executor framework and it's benefits

Ans.

Executor framework is used to manage threads and execute tasks asynchronously.

  • Executor framework provides a way to manage threads and execute tasks asynchronously.

  • It provides a thread pool and a queue to manage tasks.

  • It helps in improving the performance of the application by reducing the overhead of creating and destroying threads.

  • It also provides a way to handle exceptions and errors in the tasks.

  • Example: Executors.newFixedThreadPool(10) creates a thread pool of 10 threads.

Add your answer

Q85. What do you do if you forget the root password of the Service Console?

Ans.

To reset the root password of the Service Console, you can follow these steps:

  • Restart the system and press 'e' at the GRUB menu to edit the boot configuration

  • Locate the line starting with 'linux' and append 'init=/bin/bash' at the end

  • Press 'Ctrl + X' to boot into single-user mode

  • Remount the root file system as read-write by running 'mount -o remount,rw /'

  • Reset the root password by running 'passwd root'

  • Reboot the system and login with the new root password

Add your answer

Q86. What are the files will be created while creating a VM and after powering on the VM?

Add your answer

Q87. How will you turn start / stop a VM through command prompt?

Add your answer

Q88. How will you check the network bandwidth utilization in an ESXS host through command prompt?

Add your answer

Q89. What is the most important aspect of deploying ESX Server and virtual machines?

Add your answer

Q90. Can I back up my entire virtual machine from the Service Console?

Add your answer

Q91. If I can't get a SAN, will local storage with a RAID device be sufficient?

Add your answer
Q92. Networking Question

What is the difference between TELNET and SSH?

Add your answer
Q93. Technical Question

What is a volatile variable ?

Add your answer

Q94. If the VMDK header file corrupt what will happen? How do you troubleshoot?

Add your answer

Q95. Explain about VCB? What it the minimum priority (*) to consolidate a machine?

Add your answer
Q96. OOPS Question

How to dynamically allocate a 2D array in C?

Add your answer

Q97. ISOs have been mentioned in several of the chapters. Why are they so important?

Ans.

ISOs are important because they provide a set of standards and guidelines for various industries.

  • ISOs ensure consistency and quality in products and services.

  • ISOs help organizations meet legal and regulatory requirements.

  • ISOs promote international trade by harmonizing standards across countries.

  • ISOs enhance customer confidence and trust in products and services.

  • ISOs facilitate interoperability and compatibility between different systems.

  • ISOs cover a wide range of areas such a...read more

Add your answer

Q98. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?

Add your answer

Q99. Have you ever patched the ESX host? What are the steps involved in that?

Add your answer

Q100. What will happen if I deploy systems management software on the ESX Server itself?

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 60 interviews in the last 1 year
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 646 Interview Questions
3.8
 • 477 Interview Questions
3.7
 • 362 Interview Questions
4.1
 • 261 Interview Questions
3.8
 • 209 Interview Questions
4.1
 • 152 Interview Questions
View all
Top VMware Software Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter