Add office photos
Employer?
Claim Account for FREE

VMware Software

4.4
based on 1.1k Reviews
Filter interviews by

200+ Floyd Inc Interview Questions and Answers

Updated 20 Jan 2025
Popular Designations

Q1. Next Smallest Palindrome Problem Statement

Find the next smallest palindrome strictly greater than a given number 'N' represented as a string 'S'.

Explanation:

You are given a number in string format, and your ...read more

Ans.

Find the next smallest palindrome greater than a given number represented as a string.

  • Iterate from the middle of the number and mirror the left side to the right side to create a palindrome

  • If the resulting palindrome is greater than the input number, return it

  • Handle cases where the number has all 9s and requires a carry over to the left side

Add your answer

Q2. Reverse the String Problem Statement

You are given a string STR which contains alphabets, numbers, and special characters. Your task is to reverse the string.

Example:

Input:
STR = "abcde"
Output:
"edcba"

Input...read more

Ans.

Reverse a given string containing alphabets, numbers, and special characters.

  • Create a function that takes a string as input

  • Iterate through the string in reverse order and append each character to a new string

  • Return the reversed string

View 2 more answers

Q3. You are given a binary array with N elements: d[0], d[1], ... d[N - 1]. You can perform AT MOST one move on the array: choose any two integers [L, R], and flip all the elements between (and including) the L-th...

read more
Add your answer

Q4. Check Permutation Problem Statement

Given two strings 'STR1' and 'STR2', determine if they are anagrams of each other.

Explanation:

Two strings are considered to be anagrams if they contain the same characters,...read more

Ans.

Check if two strings are anagrams of each other by comparing their characters.

  • Create a character frequency map for both strings and compare them.

  • Sort both strings and compare if they are equal.

  • Use a hash set to store characters from one string and remove them while iterating through the other string.

  • Check if the character counts of both strings are equal.

  • Example: For input 'listen' and 'silent', the output should be true.

Add your answer
Discover Floyd Inc interview dos and don'ts from real experiences

Q5. Search In Rotated Sorted Array Problem Statement

Given a rotated sorted array ARR of size 'N' and an integer 'K', determine the index at which 'K' is present in the array.

Note:
1. If 'K' is not present in ARR,...read more
Ans.

Given a rotated sorted array, find the index of a given integer 'K'.

  • Perform binary search to find the pivot point where the array is rotated.

  • Based on the pivot point, apply binary search on the appropriate half of the array to find 'K'.

  • Handle cases where 'K' is not present in the array by returning -1.

  • Example: For ARR = [12, 15, 18, 2, 4] and K = 2, the index of K is 3.

Add your answer

Q6. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...

read more
Ans.

VMware HA allows for a maximum of 4 host failures within a cluster. If a 5th host fails, VMs may not restart depending on admission control settings.

  • Maximum allowed host failures within a HA cluster is 4

  • If a 5th host fails and admission control is enabled, some VMs may not restart due to resource constraints

  • If admission control is disabled, VMs will restart on any remaining host but may not be functional

  • Ensure enough port groups are configured on vSwitch for Virtual Machine p...read more

Add your answer
Are these interview questions helpful?
Q7. Which data structure would you use to implement the undo and redo operation in a system?
Ans.

Use a stack data structure for implementing undo and redo operations.

  • Stack data structure is ideal for implementing undo and redo operations as it follows Last In First Out (LIFO) principle.

  • Push the state of the system onto the stack when an action is performed, allowing for easy undo by popping the top element.

  • Redo operation can be implemented by keeping a separate stack for redo actions.

  • Example: In a text editor, each change in text can be pushed onto the stack for undo and...read more

View 2 more answers

Q8. Docker command to transfer an image from one machine to another without using docker registry

Ans.

Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.

  • Use the 'docker save' command to save the image as a tar file on the source machine

  • Transfer the tar file to the destination machine using any file transfer method (e.g., scp)

  • On the destination machine, use the 'docker load' command to load the image from the tar file

View 3 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. Minimum Jumps Problem Statement

Bob and his wife are in the famous 'Arcade' mall in the city of Berland. This mall has a unique way of moving between shops using trampolines. Each shop is laid out in a straight...read more

Ans.

Calculate minimum jumps required to reach the last shop using trampolines, or return -1 if impossible.

  • Iterate through the array of shops while keeping track of the maximum reachable shop from the current shop.

  • If at any point the maximum reachable shop is less than the current shop, return -1 as it's impossible to reach the last shop.

  • Return the number of jumps made to reach the last shop.

Add your answer

Q10. Pair Sum in Binary Search Tree

Given a Binary Search Tree (BST) and a target value 'K', determine if there exist two unique elements in the BST such that their sum equals the target 'K'.

Explanation:

A BST is a...read more

Ans.

Check if there exist two unique elements in a BST that sum up to a target value 'K'.

  • Traverse the BST in-order to get a sorted array of elements.

  • Use two pointers approach to find the pair sum in the sorted array.

  • Consider edge cases like duplicate elements or negative values.

  • Time complexity can be optimized to O(n) using a HashSet to store visited nodes.

Add your answer

Q11. Prerequisites for HA ? First, for clusters enabled for VMware HA, all virtual machines and their configuration files must reside on shared storage (Fibre Channel SAN, iSCSI SAN, or SAN iSCI NAS), because you ne...

read more
Ans.

Prerequisites for HA clusters in VMware environment

  • Virtual machines and configuration files must be on shared storage

  • Console network should have redundant network paths for reliable failure detection

  • Hosts in cluster must be part of a VMotion network for DRS with HA

Add your answer

Q12. Reverse Linked List Problem Statement

Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.

Input:

The first line of input is an integer T, rep...read more
Ans.

Reverse a singly linked list by altering the links between nodes.

  • Iterate through the linked list and reverse the links between nodes

  • Use three pointers to keep track of the current, previous, and next nodes

  • Update the links between nodes until the end of the list is reached

Add your answer

Q13. Problem: Sort an Array of 0s, 1s, and 2s

Given an array/list ARR consisting of integers where each element is either 0, 1, or 2, your task is to sort this array in increasing order.

Input:

The input starts with...read more
Ans.

Sort an array of 0s, 1s, and 2s in increasing order.

  • Use a three-pointer approach to partition the array into sections of 0s, 1s, and 2s.

  • Iterate through the array and swap elements based on their values.

  • Time complexity should be O(n) to meet the constraints.

Add your answer

Q14. Tower of Hanoi Problem Statement

You have three rods numbered from 1 to 3, and 'N' disks initially stacked on the first rod in increasing order of their sizes (largest disk at the bottom). Your task is to move ...read more

Ans.

Tower of Hanoi problem where 'N' disks need to be moved to another rod following specific rules in less than 2^N moves.

  • Implement a recursive function to move disks from one rod to another following the rules.

  • Use the concept of recursion and backtracking to solve the Tower of Hanoi problem efficiently.

  • Maintain a count of moves and track the movement of disks in a 2-D array/list.

  • Ensure that larger disks are not placed on top of smaller disks while moving.

  • Return the 2-D array/li...read more

Add your answer

Q15. Convert Array to Min Heap Task

Given an array 'ARR' of integers with 'N' elements, you need to convert it into a min-binary heap.

A min-binary heap is a complete binary tree where each internal node's value is ...read more

Ans.

Convert the given array into a min-binary heap by modifying the array elements.

  • Iterate through the array and heapify each node starting from the last non-leaf node to the root node.

  • For each node, compare it with its children and swap if necessary to satisfy the min-heap property.

  • Continue this process until the entire array is converted into a min-heap.

Add your answer

Q16. Problem: Search In Rotated Sorted Array

Given a sorted array that has been rotated clockwise by an unknown amount, you need to answer Q queries. Each query is represented by an integer Q[i], and you must determ...read more

Ans.

Search for integers in a rotated sorted array efficiently.

  • Use binary search to find the pivot point where the array is rotated.

  • Based on the pivot point, apply binary search on the appropriate half of the array.

  • Return the index of the integer if found, else return -1.

  • Time complexity should be O(logN) for each query.

Add your answer

Q17. Reverse List In K Groups Problem Statement

You are provided with a linked list having 'N' nodes and an integer 'K'. Your task is to reverse the linked list in groups of size K. If the list is numbered from 1 to...read more

Ans.

Reverse a linked list in groups of size K

  • Iterate through the linked list in groups of size K

  • Reverse each group of nodes

  • Handle cases where the last group may have fewer than K nodes

Add your answer

Q18. Reverse Stack with Recursion

Reverse a given stack of integers using recursion. You must accomplish this without utilizing extra space beyond the internal stack space used by recursion. Additionally, you must r...read more

Ans.

Reverse a given stack of integers using recursion without using extra space or loops.

  • Use recursion to pop all elements from the original stack and store them in function call stack

  • Once the stack is empty, push the elements back in reverse order using recursion

  • Use the top(), pop(), and push() methods to manipulate the stack

Add your answer

Q19. Common Elements in Three Sorted Arrays

Given three sorted arrays A, B, and C of lengths N, M, and K respectively, your task is to find all elements that are present in all three arrays.

Input:

The first line co...read more
Ans.

Find common elements in three sorted arrays and output them in order.

  • Iterate through all three arrays simultaneously using three pointers.

  • Compare elements at pointers and move pointers accordingly.

  • If elements are equal, add to result and move all pointers forward.

  • If elements are not equal, move pointer of smallest element forward.

Add your answer

Q20. Flip Bits Problem Explanation

Given an array of integers ARR of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can be obta...read more

Ans.

Given an array of 0s and 1s, find the maximum count of 1s by flipping a sub-array at most once.

  • Iterate through the array and keep track of the maximum count of 1s obtained by flipping a sub-array.

  • Consider flipping a sub-array from index i to j by changing 0s to 1s and vice versa.

  • Update the maximum count of 1s if the current count is greater.

  • Return the maximum count of 1s obtained after flipping a sub-array at most once.

Add your answer
Q21. How do you block specific IPs on your EC2 instance in AWS?
Ans.

You can block specific IPs on an EC2 instance in AWS by using security groups or network access control lists (NACLs).

  • Use security groups to block specific IPs by creating a new inbound rule with the IP address you want to block and setting the action to 'deny'.

  • Alternatively, you can use network access control lists (NACLs) to block specific IPs by adding a rule to deny traffic from the IP address you want to block.

  • Remember to prioritize the rules in the security group or NAC...read more

View 1 answer

Q22. Reverse Number Problem Statement

Ninja is exploring new challenges and desires to reverse a given number. Your task is to assist Ninja in reversing the number provided.

Note:

If a number has trailing zeros, the...read more

Ans.

Implement a function to reverse a given number, omitting trailing zeros.

  • Create a function that takes an integer as input and reverses it while omitting trailing zeros

  • Use modulo and division operations to extract digits and reverse the number

  • Handle cases where the reversed number has leading zeros by omitting them

  • Ensure the reversed number is within the constraints specified

Add your answer
Q23. Can you design the bank architecture using basic OOP concepts in any programming language?
Ans.

Yes, I can design the bank architecture using basic OOP concepts in any programming language.

  • Create classes for entities like Bank, Account, Customer, Transaction, etc.

  • Use inheritance to model relationships between entities (e.g. SavingsAccount and CheckingAccount inheriting from Account).

  • Implement encapsulation to hide internal details of classes and provide public interfaces for interaction.

  • Utilize polymorphism to allow different classes to be treated as instances of a comm...read more

Add your answer

Q24. Check If Preorder Traversal Is Valid

Determine whether a given array ARR of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).

A binary search tree (BST) is a tree structure where ea...read more

Ans.

Check if a given array of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).

  • Create a function that takes the array as input and checks if it satisfies the properties of a BST preorder traversal.

  • Iterate through the array and maintain a stack to keep track of the nodes in the BST.

  • Compare each element with the top of the stack to ensure it follows the BST property.

  • If the array is a valid preorder traversal of a BST, return 1; otherwise, return 0.

Add your answer

Q25. Remove Duplicates From Unsorted Linked List Problem Statement

You are provided with a linked list consisting of N nodes. Your task is to remove duplicate nodes such that each element occurs only once in the lin...read more

Ans.

Remove duplicates from an unsorted linked list while preserving the order of nodes.

  • Iterate through the linked list while keeping track of seen elements using a hash set.

  • If a duplicate element is encountered, skip it by adjusting the pointers.

  • Ensure the order of nodes is preserved by only keeping the first occurrence of each element.

Add your answer

Q26. First and Last Position of an Element in a Sorted Array

Given a sorted array/list ARR consisting of ‘N’ elements, and an integer ‘K’, your task is to find the first and last occurrence of ‘K’ in ARR.

Explanatio...read more

Ans.

Find the first and last occurrence of a given element in a sorted array.

  • Use binary search to find the first occurrence of the element.

  • Use binary search to find the last occurrence of the element.

  • Handle cases where the element is not present in the array.

Add your answer

Q27. Intersection of Two Arrays Problem Statement

Given two arrays A and B with sizes N and M respectively, both sorted in non-decreasing order, determine their intersection.

The intersection of two arrays includes ...read more

Ans.

The problem involves finding the intersection of two sorted arrays efficiently.

  • Use two pointers to iterate through both arrays simultaneously.

  • Compare elements at the pointers and move the pointers accordingly.

  • Handle cases where elements are equal or not equal to find the intersection.

  • Return the intersection as an array of common elements.

Add your answer

Q28. Segregate Odd-Even Problem Statement

In a wedding ceremony at NinjaLand, attendees are blindfolded. People from the bride’s side hold odd numbers, while people from the groom’s side hold even numbers. For the g...read more

Ans.

Rearrange a linked list such that odd numbers appear before even numbers while preserving the order of appearance.

  • Iterate through the linked list and maintain two separate lists for odd and even numbers.

  • Merge the two lists while preserving the order of appearance.

  • Ensure to handle edge cases like empty list or list with only odd or even numbers.

Add your answer

Q29. Convert Sorted Array to BST Problem Statement

Given a sorted array of length N, your task is to construct a balanced binary search tree (BST) from the array. If multiple balanced BSTs are possible, you can retu...read more

Ans.

Construct a balanced binary search tree from a sorted array.

  • Create a function that recursively constructs a balanced BST from a sorted array.

  • Use the middle element of the array as the root of the BST.

  • Recursively build the left and right subtrees using the elements to the left and right of the middle element.

  • Ensure that the left and right subtrees are also balanced BSTs.

  • Return 1 if the constructed tree is correct, otherwise return 0.

Add your answer
Q30. How can you copy Docker images from one host to another without using a repository?
Ans.

Docker images can be copied from one host to another using 'docker save' and 'docker load' commands.

  • Use 'docker save' command to save the image as a tar file on the source host

  • Transfer the tar file to the destination host using SCP or any other file transfer method

  • Use 'docker load' command on the destination host to load the image from the tar file

Add your answer

Q31. What is the usecase which would require setup of distributed jenkins nodes

Ans.

Distributed Jenkins nodes are used to handle large-scale builds and improve performance.

  • Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.

  • Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.

  • Resource utilization: Distributed nodes allow for better utilization of resources...read more

View 1 answer

Q32. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In worst case, how many iterations are needed to fi...

read more
Add your answer
Q33. What happens to the load balancer when an instance in AWS is deregistered?
Ans.

When an instance in AWS is deregistered, the load balancer stops sending traffic to that instance.

  • The load balancer detects the deregistration of the instance and stops routing traffic to it.

  • The load balancer redistributes the traffic to the remaining healthy instances.

  • The deregistered instance is no longer considered part of the load balancer's target group.

  • The load balancer health checks will mark the instance as unhealthy.

  • The load balancer will not send any new requests to...read more

Add your answer
Q34. How do you debug a website template that is very slow?
Ans.

To debug a slow website template, analyze performance metrics, check for inefficient code, optimize images and assets, and consider server-side improvements.

  • Analyze performance metrics using tools like Chrome DevTools or Lighthouse to identify bottlenecks.

  • Check for inefficient code such as unnecessary loops, redundant CSS rules, or large JavaScript files.

  • Optimize images and assets by compressing files, using lazy loading, or implementing a content delivery network (CDN).

  • Consi...read more

Add your answer
Q35. What is a use case that would require the setup of distributed Jenkins nodes?
Ans.

Setting up distributed Jenkins nodes is necessary for scaling Jenkins infrastructure and improving performance.

  • When there is a need to run a large number of jobs simultaneously

  • When jobs require different environments or configurations

  • When jobs need to be executed on different platforms or operating systems

  • When there is a need for high availability and fault tolerance

  • When there is a need to reduce build queue times and improve overall performance

Add your answer
Q36. What is the difference between an inode number and a file descriptor?
Ans.

Inode number is a unique identifier for a file in a filesystem, while a file descriptor is a reference to an open file.

  • Inode number is a metadata associated with a file, stored in the filesystem's inode table.

  • File descriptor is a reference to an open file in a process, represented by an integer.

  • Inode number remains constant for a file even if it is moved or renamed, while file descriptor changes with each open/close operation.

  • Example: In a Unix-like system, 'ls -i' command di...read more

Add your answer

Q37. Prerequisites for VMotion? Ans--> a)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment b)ESX Servers must be managed by the same Virtual Center server c)ESX M...

read more
Ans.

Prerequisites for VMotion include network configuration, CPU compatibility, shared storage, and virtual switch restrictions.

  • ESX Servers must have VMkernel ports enabled for VMotion on the same network segment

  • ESX Servers must be managed by the same Virtual Center server

  • ESX Servers must have compatible CPUs

  • ESX Servers must have consistent networks and network labels

  • VMs must be stored on shared storage like iSCSI, FC SAN, or NAS/NFS

  • VMs cannot use local CD/floppy or internal-only...read more

Add your answer

Q38. There are at most eight servers in a data center. Each server has got a capacity/memory limit. There can be at most 8 tasks that need to be scheduled on those servers. Each task requires certain capacity/memory...

read more
Add your answer
Q39. Can you write an Ansible playbook to install Apache?
Ans.

Yes, I can write an Ansible playbook to install Apache.

  • Use the 'apt' module to install Apache on Debian/Ubuntu systems

  • Use the 'yum' module to install Apache on Red Hat/CentOS systems

  • Ensure to start and enable the Apache service after installation

Add your answer
Q40. How would you debug issues with Apache and Nginx?
Ans.

To debug issues with Apache and Nginx, check error logs, configuration files, server status, and network connectivity.

  • Check error logs for any relevant error messages or warnings.

  • Review configuration files for any misconfigurations or typos.

  • Check server status to ensure services are running and responding correctly.

  • Verify network connectivity to ensure there are no network issues affecting communication.

  • Use tools like curl, telnet, or netcat to test connections and troublesho...read more

Add your answer

Q41. Akamai request flow. Hierarchy of rules being parsed when request comes to Akamai.

Ans.

Akamai request flow involves parsing rules in a hierarchical manner.

  • Akamai request flow involves multiple stages and rules.

  • When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.

  • During each stage, different rules are parsed and applied based on the configuration.

  • The hierarchy of rules determines the order in which they are evaluated and applied.

  • For example, caching rules may be evaluated before delivery rules.

  • Th...read more

Add your answer

Q42. There are two interfaces B and C each having the same method public m1() class A implements B and C If class A has to implement method m1, the implemented method would be of which interface?

Ans.

The implemented method would be of the interface that is extended first in the class declaration.

  • In this case, since class A implements B and C, the implemented method m1 would be of interface B if B is extended first in the class declaration.

  • If C was extended first in the class declaration, then the implemented method m1 would be of interface C.

  • The order of interface extension determines which interface's method is implemented in the class.

Add your answer

Q43. How would you debug a website which is progressively slowing down

Ans.

To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.

  • Analyze server logs to identify any errors or bottlenecks

  • Check for memory leaks in the code

  • Optimize the code by removing unnecessary scripts and optimizing images

  • Use tools like Chrome DevTools to identify performance issues

  • Consider implementing a content delivery network (CDN) to improve website speed

Add your answer
Q44. What is the difference between constructor injection and setter injection in dependency injection?
Ans.

Constructor injection passes dependencies through a class constructor, while setter injection uses setter methods.

  • Constructor injection is done by passing dependencies as parameters to the constructor.

  • Setter injection involves calling setter methods to set the dependencies after the object is created.

  • Constructor injection ensures that all required dependencies are provided at the time of object creation.

  • Setter injection allows for optional dependencies to be set after the obj...read more

Add your answer

Q45. There are 3 kinds of balls in a big array. Red, Green, Blue color balls. Arrange them in such a way that all the red balls to the left, Green balls in the middle and Blue balls to the right of the array

Add your answer
Q46. What are the different states of entity instances?
Ans.

Entity instances can be in new, managed, detached, or removed states.

  • New state: when an entity is first created but not yet associated with a persistence context.

  • Managed state: when an entity is being managed by a persistence context and any changes made to it will be tracked.

  • Detached state: when an entity was previously managed but is no longer associated with a persistence context.

  • Removed state: when an entity is marked for removal from the database.

Add your answer

Q47. What does a load balancer do when an instance in aws stops

Ans.

Load balancer routes traffic to other healthy instances

  • Load balancer detects the unhealthy instance

  • Stops sending traffic to that instance

  • Routes traffic to other healthy instances

  • Maintains high availability and scalability of the application

Add your answer

Q48. Why do I still see processes for my virtual machine when running the ps command on the Service Console even though my virtual machine is powered down?

Ans.

Virtual machine processes may still be visible in the Service Console even when powered down.

  • Virtual machine processes may still be running in the background even when the virtual machine is powered down.

  • The ps command shows all processes running on the system, including those related to virtual machines.

  • Some processes may continue to run for maintenance or monitoring purposes even when the virtual machine is not actively running.

Add your answer

Q49. Have you ever installed an ESX host? What are the pre and post conversion steps involved in that? What would be the portions listed? What would be the max size of it?

Add your answer

Q50. Storage team provided the new LUN ID to you? How will you configure the LUN in VC? What would be the block size (say for 500 GB volume size)?

Ans.

To configure the new LUN in VC, I will follow the given steps and set the block size based on the volume size.

  • Add the new LUN to the storage array

  • Rescan the storage adapters in vSphere Client

  • Create a new datastore using the new LUN ID

  • Set the block size based on the volume size (e.g. 1MB for 500GB volume size)

Add your answer
Q51. What are the advantages of design patterns in Java?
Ans.

Design patterns in Java provide reusable solutions to common problems, improving code quality and maintainability.

  • Promotes code reusability by providing proven solutions to common design problems

  • Improves code maintainability by following established best practices

  • Enhances code readability by providing a common language for developers to communicate design ideas

  • Helps in creating scalable and flexible software architecture

  • Examples include Singleton, Factory, Observer, and Strat...read more

Add your answer

Q52. When we click on the power button of our Laptop, what happens immediately and how the windows is loaded?

Add your answer

Q53. What are the basic commands to troubleshoot connectivity between vSphere Client /vCenter to ESX server?

Ans.

The basic commands to troubleshoot connectivity between vSphere Client/vCenter and ESX server.

  • Ping the ESX server from the vSphere Client/vCenter to check network connectivity.

  • Check if the ESX server is reachable by using the vmkping command.

  • Verify if the ESX server's management services are running using the service mgmt-vmware status command.

  • Check the firewall settings on the ESX server to ensure necessary ports are open.

  • Restart the management agents on the ESX server using...read more

Add your answer
Q54. Design a file searching functionality for Windows and Mac that includes indexing of file names.
Ans.

Design a file searching functionality with indexing for Windows and Mac.

  • Implement a search algorithm to quickly find files based on user input.

  • Create an index of file names to improve search speed.

  • Support both Windows and Mac operating systems.

  • Utilize system APIs for file access and indexing.

  • Provide a user-friendly interface for searching and browsing files.

  • Consider implementing filters for file type, size, and date modified.

Add your answer

Q55. You are given a sorted skewed binary tree. How can you create a binary search tree of minimum height from it?

Ans.

To create a binary search tree of minimum height from a sorted skewed binary tree, we can use the following approach:

  • Find the middle element of the sorted skewed binary tree.

  • Make it the root of the new binary search tree.

  • Recursively repeat the process for the left and right halves of the original tree.

  • Attach the resulting subtrees as the left and right children of the root.

Add your answer

Q56. How does VMotion works? What’s the port number used for it? ANS--> TCP port 8000

Add your answer

Q57. How will you generate a report for list of ESX, VM’s, RAM and CPU used in your Vsphere environment?

Add your answer

Q58. Is there a way to mount the vmfs volumes if they accidentally get unmounted without having to reboot?

Add your answer
Q59. How would you design a system for MakeMyTrip?
Ans.

Designing a system for MakeMyTrip

  • Utilize a microservices architecture to handle different functionalities like flight booking, hotel reservations, and holiday packages

  • Implement a robust backend system to handle high traffic and ensure scalability

  • Incorporate a user-friendly interface for easy navigation and booking process

  • Integrate payment gateways for secure transactions

  • Include features like personalized recommendations, loyalty programs, and customer support chatbots

  • Utilize ...read more

Add your answer
Q60. How would you prevent a DDoS attack?
Ans.

To prevent a DDoS attack, implement network security measures, use DDoS mitigation services, and monitor traffic patterns.

  • Implement network security measures such as firewalls, intrusion detection systems, and access control lists.

  • Use DDoS mitigation services from providers like Cloudflare or Akamai to filter out malicious traffic.

  • Monitor traffic patterns and set up alerts for unusual spikes in traffic that could indicate a DDoS attack.

  • Consider implementing rate limiting or C...read more

Add your answer
Q61. What is the difference between the MVC (Model-View-Controller) and MVT (Model-View-Template) design patterns?
Ans.

MVC focuses on separating concerns of an application into three components, while MVT is a variation used in Django framework.

  • MVC separates an application into Model (data), View (presentation), and Controller (logic) components.

  • MVT is used in Django framework where Model represents data, View represents presentation, and Template represents logic.

  • In MVC, the Controller handles user input and updates the Model and View accordingly.

  • In MVT, the Template handles user input and u...read more

Add your answer
Q62. What are the different types of advice in Spring AOP?
Ans.

Types of advice in Spring AOP include before, after, around, after-returning, and after-throwing.

  • Before advice: Executed before the method invocation.

  • After advice: Executed after the method invocation, regardless of its outcome.

  • Around advice: Wraps around the method invocation, allowing for custom behavior before and after.

  • After-returning advice: Executed after the method successfully returns a value.

  • After-throwing advice: Executed after the method throws an exception.

Add your answer
Q63. What are the benefits of the Java Executor Framework?
Ans.

The Java Executor Framework provides a way to manage and control the execution of tasks in a multithreaded environment.

  • Allows for easy management of thread pools, reducing overhead of creating new threads for each task.

  • Provides a way to schedule tasks for execution at a specific time or with a delay.

  • Supports task cancellation and interruption.

  • Facilitates handling of task dependencies and coordination between tasks.

  • Offers better control over thread execution, such as setting t...read more

Add your answer

Q64. Given a list of arraylists containing elements, write a function that prints out the permutations of of the elements such that, each of the permutation set contains only 1 element from each arraylist and there...

read more
Ans.

Function to print permutations of elements from arraylists with no duplicates.

  • Use recursion to generate all possible permutations by selecting one element from each arraylist at a time.

  • Keep track of used elements to avoid duplicates in the permutation sets.

  • Use a set data structure to store and check for duplicates efficiently.

Add your answer

Q65. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?

Ans.

Adding a new VLAN to a production network involves several steps and enabling it requires configuration changes.

  • Plan the new VLAN configuration including VLAN ID, subnet, and gateway.

  • Configure the switch or router to create the new VLAN.

  • Assign ports to the new VLAN as needed.

  • Enable routing between the new VLAN and other VLANs if required.

  • Test the new VLAN to ensure connectivity and functionality.

  • Examples: VLAN 20 with subnet 192.168.20.0/24 and gateway 192.168.20.1.

  • Examples: ...read more

Add your answer

Q66. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?

Ans.

Connecting ESX host through VC and vSphere involves different services and port numbers.

  • Connecting ESX host through VC involves vCenter Server which provides centralized management and monitoring.

  • Connecting ESX host through vSphere involves vCenter Server along with additional services like vSphere Client and vSphere Web Client.

  • Some of the services involved in connecting ESX host through VC and vSphere include vCenter Server, vSphere Client, vSphere Web Client, and ESXi host ...read more

Add your answer

Q67. What is the command used to restart SSH, NTP & Vmware Web access?

Ans.

The command to restart SSH, NTP, and VMware Web access is service.

  • To restart SSH, use the command: service ssh restart

  • To restart NTP, use the command: service ntp restart

  • To restart VMware Web access, use the command: service vmware-webaccess restart

Add your answer

Q68. Describe inodes and file descriptors. What is the use of swap

Ans.

Inodes are data structures that store information about files on a Unix/Linux file system. File descriptors are unique identifiers for open files. Swap is a space on a hard disk used as virtual memory.

  • Inodes contain metadata about files such as ownership, permissions, and timestamps.

  • File descriptors are used by the operating system to keep track of open files and to perform I/O operations on them.

  • Swap is used when the amount of physical memory (RAM) is insufficient to hold al...read more

Add your answer
Q69. What are the advantages and disadvantages of the buddy system?
Ans.

The buddy system has advantages like increased safety and support, but also drawbacks like dependency and lack of independence.

  • Advantages: increased safety, support, accountability, motivation

  • Disadvantages: dependency, lack of independence, potential for conflicts

  • Example: In a buddy system at work, colleagues can support each other in completing tasks and provide motivation to stay on track.

  • Example: However, relying too heavily on a buddy can lead to dependency and hinder ind...read more

Add your answer

Q70. An array which is a Post order traversal of a Binary Tree. Write a function to check if the Binary Tree formed from the array is a Binary Search Tree.

Ans.

Check if a Binary Tree formed from a Post order traversal array is a Binary Search Tree.

  • Start by constructing the Binary Tree from the given Post order traversal array.

  • Check if the Binary Tree satisfies the properties of a Binary Search Tree.

  • Use recursion to check if each node's value is within the correct range.

  • Example: Post order traversal array [1, 3, 2] forms a Binary Search Tree.

  • Example: Post order traversal array [3, 2, 1] does not form a Binary Search Tree.

Add your answer

Q71. Is there a way to blacklist IPs in AWS

Ans.

Yes, AWS provides various methods to blacklist IPs.

  • Use AWS WAF to create rules to block specific IP addresses

  • Configure security groups to deny traffic from specific IP addresses

  • Utilize AWS Network ACLs to block traffic from specific IP addresses

View 1 answer

Q72. What is the default number of ports configured with the Virtual Switch?

Ans.

The default number of ports configured with the Virtual Switch is 8.

  • The Virtual Switch is a software-based network switch that allows virtual machines to communicate with each other and with the host system.

  • By default, the Virtual Switch is configured with 8 ports, which can be used to connect virtual machines and other network devices.

  • These ports can be assigned to different virtual machines or network adapters as needed.

  • Additional ports can be added or existing ports can be...read more

Add your answer

Q73. What are the relevant elements to be considered in ascertaining the Cost of creating a Quote by an IT Company

Ans.

The relevant elements to consider in ascertaining the cost of creating a quote by an IT company

  • Scope of the project

  • Complexity of the requirements

  • Labor costs

  • Technology and tools required

  • Timeframe for completion

  • Overhead expenses

  • Profit margin

  • Competitor pricing

  • Client's budget constraints

Add your answer
Q74. What is the system call that creates a separate connection?
Ans.

The system call that creates a separate connection is fork()

  • fork() is a system call in Unix-like operating systems that creates a new process by duplicating the existing process

  • The new process created by fork() is called the child process, while the original process is called the parent process

  • fork() is commonly used in network programming to create separate connections for handling multiple clients

Add your answer

Q75. Im not able to connect to the Service Console over the network. What could the issue be?

Ans.

Possible reasons for not being able to connect to the Service Console over the network.

  • Check network connectivity and ensure the correct IP address is being used.

  • Verify firewall settings to allow access to the Service Console.

  • Ensure the Service Console service is running properly.

  • Check for any network configuration issues or restrictions.

  • Restart the Service Console and try connecting again.

Add your answer

Q76. Why did VMware limit its beta of ESX Server 3.0 to so few?

Add your answer
Q77. What is overloading in the context of Object-Oriented Programming (OOP)?
Ans.

Overloading in OOP is the ability to define multiple methods with the same name but different parameters.

  • Overloading allows multiple methods with the same name but different parameters to coexist in a class.

  • The compiler determines which method to call based on the number and type of arguments passed.

  • Example: having multiple constructors in a class with different parameter lists.

Add your answer
Q78. What are the stages in the Software Development Life Cycle?
Ans.

The stages in the Software Development Life Cycle include planning, design, development, testing, deployment, and maintenance.

  • 1. Planning: Define project scope, requirements, and timelines.

  • 2. Design: Create architecture, UI/UX, and database design.

  • 3. Development: Write code based on design specifications.

  • 4. Testing: Verify functionality, performance, and security.

  • 5. Deployment: Release the software to users or clients.

  • 6. Maintenance: Fix bugs, add new features, and update sof...read more

Add your answer

Q79. How do DRS works? Which technology used? What are the priority counts to migrate the VM’s?

Add your answer

Q80. What do you do if you forget the root password of the Service Console?

Ans.

To reset the root password of the Service Console, you can follow these steps:

  • Restart the system and press 'e' at the GRUB menu to edit the boot configuration

  • Locate the line starting with 'linux' and append 'init=/bin/bash' at the end

  • Press 'Ctrl + X' to boot into single-user mode

  • Remount the root file system as read-write by running 'mount -o remount,rw /'

  • Reset the root password by running 'passwd root'

  • Reboot the system and login with the new root password

Add your answer

Q81. How to implement executor framework and it's benefits

Ans.

Executor framework is used to manage threads and execute tasks asynchronously.

  • Executor framework provides a way to manage threads and execute tasks asynchronously.

  • It provides a thread pool and a queue to manage tasks.

  • It helps in improving the performance of the application by reducing the overhead of creating and destroying threads.

  • It also provides a way to handle exceptions and errors in the tasks.

  • Example: Executors.newFixedThreadPool(10) creates a thread pool of 10 threads.

Add your answer

Q82. What are the files will be created while creating a VM and after powering on the VM?

Add your answer

Q83. How will you turn start / stop a VM through command prompt?

Add your answer

Q84. How will you check the network bandwidth utilization in an ESXS host through command prompt?

Add your answer

Q85. What is the most important aspect of deploying ESX Server and virtual machines?

Add your answer

Q86. Can I back up my entire virtual machine from the Service Console?

Add your answer

Q87. If I can't get a SAN, will local storage with a RAID device be sufficient?

Add your answer
Q88. Can you explain the concept of multithreading in Java?
Ans.

Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.

  • Multithreading allows multiple threads to run concurrently within a single process.

  • Threads share the same memory space, allowing for efficient communication and data sharing.

  • Java provides built-in support for multithreading through the Thread class and Runnable interface.

  • Example: Creating a new thread using Thread class or implementing Runnable interface and passin...read more

Add your answer
Q89. What is the difference between paging and swapping in operating systems?
Ans.

Paging is a memory management scheme that allows the operating system to store and retrieve data from secondary storage in fixed-size blocks, while swapping involves moving entire processes between main memory and disk.

  • Paging involves dividing physical memory into fixed-size blocks called pages, while swapping involves moving entire processes between main memory and disk.

  • Paging allows for more efficient use of physical memory by storing parts of a process in different pages, ...read more

Add your answer

Q90. Given a unsorted array. Create a balanced B tree. Whether it is possible to solve this problem algorithm in logarithmic complexity ?

Ans.

It is not possible to create a balanced B tree from an unsorted array in logarithmic complexity.

  • Creating a balanced B tree from an unsorted array requires sorting the array first, which has a complexity of O(n log n).

  • Balanced B tree construction typically has a complexity of O(n log n) or O(n) depending on the algorithm used.

  • Example: If we have an unsorted array [3, 1, 4, 1, 5, 9, 2, 6, 5], we would need to sort it first before constructing a balanced B tree.

Add your answer

Q91. If the VMDK header file corrupt what will happen? How do you troubleshoot?

Add your answer

Q92. Explain about VCB? What it the minimum priority (*) to consolidate a machine?

Add your answer

Q93. ISOs have been mentioned in several of the chapters. Why are they so important?

Ans.

ISOs are important because they provide a set of standards and guidelines for various industries.

  • ISOs ensure consistency and quality in products and services.

  • ISOs help organizations meet legal and regulatory requirements.

  • ISOs promote international trade by harmonizing standards across countries.

  • ISOs enhance customer confidence and trust in products and services.

  • ISOs facilitate interoperability and compatibility between different systems.

  • ISOs cover a wide range of areas such a...read more

Add your answer

Q94. Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ?

Add your answer

Q95. Have you ever patched the ESX host? What are the steps involved in that?

Add your answer

Q96. What will happen if I deploy systems management software on the ESX Server itself?

Add your answer

Q97. Which version of VMware ESX Server supports Boot from SAN?

Add your answer
Q98. Can you provide an example of a deadlock in operating systems?
Ans.

A deadlock in operating systems occurs when two or more processes are unable to proceed because each is waiting for the other to release a resource.

  • Deadlock involves a circular wait, where each process is waiting for a resource held by another process in the cycle.

  • Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.

  • Example: Process A holds Resource 1 and waits for Resource 2, while Process B holds Resource 2 and waits f...read more

Add your answer
Q99. Can you explain the prototype scope in Spring?
Ans.

Prototype scope in Spring creates a new instance of the bean every time it is requested.

  • Prototype scope is used when a new instance of the bean is required for each request.

  • It is not thread-safe, as a new instance is created for each request.

  • Example: If a bean is defined with prototype scope, a new instance will be created every time it is injected or requested.

Add your answer
Q100. How do you implement the Java Executor Framework?
Ans.

The Java Executor Framework provides a way to manage and execute tasks asynchronously in Java applications.

  • Create an instance of ExecutorService using Executors class

  • Submit tasks for execution using execute() or submit() methods

  • Handle the results of the tasks using Future objects

  • Shutdown the ExecutorService when tasks are completed using shutdown() method

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Floyd Inc

based on 101 interviews
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 1.8k Interview Questions
3.8
 • 403 Interview Questions
3.4
 • 278 Interview Questions
3.6
 • 168 Interview Questions
3.3
 • 150 Interview Questions
4.2
 • 145 Interview Questions
View all
Top VMware Software Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter