Add office photos
Engaged Employer

Wipro

3.7
based on 52.5k Reviews
Video summary
Filter interviews by

50+ Tandhan Polyplast Interview Questions and Answers

Updated 15 Feb 2025
Popular Designations

Q1. 2. What is Cloud Technology. What is Microsoft Intune. If we can manage applications using MAM then why do we need MDM?

Ans.

Cloud technology is the delivery of computing services over the internet. Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) solution.

  • Cloud technology allows users to access data and applications from anywhere with an internet connection.

  • Microsoft Intune is a cloud-based solution that allows organizations to manage mobile devices and applications.

  • MAM allows organizations to manage and secure applications and data on mobile...read more

View 7 more answers

Q2. 7.A user has received a zip file in Outlook, which is a managed app. Will the user be able to open that zip file?

Ans.

It depends on the app's settings and the user's permissions.

  • If the managed app allows opening zip files and the user has permission to do so, then they can open it.

  • If the app does not allow opening zip files or the user does not have permission, then they cannot open it.

  • The user should check with their IT department or the app's documentation to determine if zip files are allowed.

  • If the zip file contains a potentially harmful file type, the app may block it from being opened.

View 2 more answers

Q3. If you have learn anew programing language for this job,what wil do ?

Ans.

I would take the initiative to learn the new programming language as quickly as possible.

  • Research the best resources for learning the language

  • Practice coding in the new language regularly

  • Seek guidance and mentorship from experienced programmers

  • Attend workshops and conferences to enhance knowledge

  • Apply the new language in real-world projects to gain experience

View 2 more answers

Q4. 3.What is the difference between Passcode and PIN?

Ans.

Passcode and PIN are both used for authentication, but they differ in their length and complexity.

  • A passcode is typically longer than a PIN and can include letters, numbers, and symbols.

  • A PIN is usually a 4-6 digit number.

  • Passcodes are generally considered more secure than PINs.

  • Examples of passcodes include the password for your email account or the code to unlock your phone.

  • Examples of PINs include the code to access your bank account or the PIN to unlock your SIM card.

View 2 more answers
Discover Tandhan Polyplast interview dos and don'ts from real experiences

Q5. 8.Can we differ an OS update for an iOS device using an MDM solution? If yes, how can we do so?

Ans.

Yes, we can differ an OS update for an iOS device using an MDM solution.

  • MDM solution allows administrators to control the update process

  • Administrators can choose to delay or skip updates for certain devices

  • This can be done by creating update policies and assigning them to specific devices or groups

  • For example, an organization may choose to delay updates for a few days to ensure compatibility with their internal apps

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspa...read more

Add your answer

Q6. 6.If a device is not enrolled through DEP, can I still block the screen capture feature on an iOS device

Ans.

Yes, it is possible to block screen capture feature on an iOS device even if it is not enrolled through DEP.

  • You can use a mobile device management (MDM) solution to block screen capture feature on iOS devices.

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspace ONE can help you enforce policies on iOS devices.

  • You can create a policy in your MDM solution to disable the screen capture feature on iOS devices.

  • This policy will apply to all iOS devices that are enrolled ...read more

Add your answer
Are these interview questions helpful?

Q7. What is the full form of SDLC?

Ans.

SDLC stands for Software Development Life Cycle.

  • SDLC is a process used by software development teams to design, develop, and test high-quality software.

  • It consists of several phases including planning, analysis, design, implementation, and maintenance.

  • Each phase has its own set of activities and deliverables that must be completed before moving on to the next phase.

  • SDLC helps ensure that software is developed on time, within budget, and meets the needs of the end-users.

  • Exampl...read more

View 2 more answers

Q8. 4.What is DEP/Apple Business Manager?

Ans.

DEP/Apple Business Manager is a device management solution for Apple devices.

  • DEP stands for Device Enrollment Program, which allows organizations to easily deploy and manage Apple devices.

  • Apple Business Manager is a web-based portal that allows IT administrators to manage devices, apps, and content.

  • With DEP/Apple Business Manager, IT administrators can automate device enrollment, configure settings, and distribute apps and content.

  • This solution is particularly useful for orga...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. 5.What is the benefit of using DEP?

Ans.

DEP provides security by preventing execution of malicious code in memory.

  • DEP stands for Data Execution Prevention.

  • It is a security feature in modern operating systems.

  • DEP prevents execution of code in memory regions marked as non-executable.

  • This helps prevent buffer overflow attacks and other types of malware.

  • DEP can be enabled for specific applications or for the entire system.

  • Examples of DEP-enabled applications include Microsoft Office and Internet Explorer.

Add your answer

Q10. What is netcool architecture and explain each component involve and data flow.?

Ans.

Netcool architecture is a system used for event management and monitoring. It consists of several components that work together to process and analyze data.

  • Netcool is a software suite developed by IBM for event management and monitoring.

  • The architecture includes various components such as probes, gateways, and databases.

  • Probes collect event data from different sources and send it to the Netcool system.

  • Gateways receive event data from probes and perform data normalization and ...read more

Add your answer

Q11. What will you do if vm machine is in hung state

Ans.

I will try to identify the cause of the hang and take appropriate action to resolve it.

  • Check if the VM is responding to pings or console access

  • Check the VM's resource utilization and logs for any errors

  • Try to gracefully shut down the VM using the hypervisor's management tools

  • If graceful shutdown fails, force power off the VM and restart it

  • Investigate the cause of the hang and take steps to prevent it from happening again

Add your answer

Q12. What you will do if client reports website is down

Ans.

I will immediately check the server and website logs to identify the issue and take necessary actions to resolve it.

  • Check server and website logs

  • Identify the issue

  • Take necessary actions to resolve it

  • Communicate with the client about the status and progress of the issue

  • Ensure preventive measures are in place to avoid similar issues in the future

Add your answer

Q13. What are the key responsibilities involved in Linux administration?

Ans.

Key responsibilities in Linux administration include managing user accounts, installing and updating software, monitoring system performance, and ensuring security.

  • Managing user accounts and permissions

  • Installing, configuring, and updating software packages

  • Monitoring system performance and troubleshooting issues

  • Ensuring system security by implementing firewalls, encryption, and regular updates

Add your answer

Q14. What are the best practices for optimizing a Linux server?

Ans.

Best practices for optimizing a Linux server include regular updates, monitoring performance, optimizing disk usage, and securing the server.

  • Regularly update the server's software and packages to ensure security and performance improvements.

  • Monitor server performance using tools like top, htop, or sar to identify bottlenecks and optimize resource usage.

  • Optimize disk usage by removing unnecessary files, using disk quotas, and implementing a backup strategy.

  • Secure the server by...read more

Add your answer

Q15. how to find out the computer problems

Ans.

Computer problems can be found by troubleshooting hardware, software, network, and security issues.

  • Check for error messages and logs

  • Test hardware components such as RAM, hard drive, and CPU

  • Scan for viruses and malware

  • Check network connectivity and settings

  • Update software and drivers

  • Consult user for any recent changes or issues

View 1 answer

Q16. Adding network printer into multiple computers at a time

Ans.

Use Group Policy to deploy printer to multiple computers simultaneously.

  • Create a shared printer on the network

  • Create a Group Policy Object (GPO) in Active Directory

  • Under Computer Configuration, go to Policies > Windows Settings > Deployed Printers

  • Add the shared printer and configure any necessary settings

  • Link the GPO to the appropriate Organizational Unit (OU) containing the computers

  • Restart the computers or run gpupdate /force to apply the GPO

Add your answer

Q17. Current version of windows. What is Operating system Diffrence between update and upgrade Dhcp, dns, troubleshooting. Lan, wan.

Ans.

The question covers topics related to Windows operating system, updates, upgrades, DHCP, DNS, LAN, and WAN.

  • Operating system is the software that manages computer hardware resources and provides common services for computer programs.

  • Update refers to making improvements or fixes to existing software, while upgrade involves replacing the current version with a newer one.

  • DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, while DNS (Domain Nam...read more

Add your answer

Q18. What is DNS. DHCP, IP ADDRESS, TROUBLESHOOTING, HARDWARE ISSUE

Ans.

DNS is a system that translates domain names to IP addresses. DHCP assigns IP addresses to devices on a network. IP address is a unique identifier for devices on a network. Troubleshooting involves identifying and resolving issues. Hardware issues refer to problems with physical components of a computer system.

  • DNS translates domain names to IP addresses (e.g. www.google.com to 172.217.3.206)

  • DHCP assigns IP addresses to devices on a network dynamically

  • IP address is a unique id...read more

Add your answer

Q19. What is difference between forward and reverse proxy?

Ans.

Forward proxy is used by client to access the internet, while reverse proxy is used by server to access the internet on behalf of clients.

  • Forward proxy is used by clients to access the internet indirectly.

  • Reverse proxy is used by servers to access the internet on behalf of clients.

  • Forward proxy hides the identity of the client, while reverse proxy hides the identity of the server.

  • Forward proxy is commonly used for security and privacy reasons, while reverse proxy is used for ...read more

Add your answer

Q20. How can one check the CPU and memory usage?

Ans.

CPU and memory usage can be checked using system monitoring tools and commands.

  • Use task manager or activity monitor to check CPU and memory usage in a graphical interface

  • Use command line tools like top, htop, or ps to check CPU and memory usage in a terminal

  • Check CPU usage with commands like 'top -o cpu' or 'htop'

  • Check memory usage with commands like 'free -m' or 'vmstat'

Add your answer

Q21. What is boundary groups in sccm. What is difference between package and application.

Ans.

Boundary groups in SCCM are used to define network locations for clients. Package is a legacy deployment method while application is modern.

  • Boundary groups are used to assign clients to specific distribution points based on their network location.

  • Boundary groups are used to optimize content distribution and reduce WAN traffic.

  • Packages are legacy deployment method that require manual installation and do not support dependencies or supersedence.

  • Applications are modern deploymen...read more

Add your answer

Q22. How to install the os in server

Ans.

To install an OS in a server, you need to boot from the installation media and follow the prompts to complete the installation.

  • Insert the installation media (CD, DVD, USB) into the server

  • Boot the server from the installation media

  • Follow the prompts to select language, time zone, and partition the hard drive

  • Enter the product key and create a user account

  • Wait for the installation to complete and reboot the server

Add your answer

Q23. Citrix workspace used cases and benifites

Ans.

Citrix Workspace provides secure access to applications and data from any device, anywhere.

  • Allows users to access their virtual desktops and applications from any device with an internet connection

  • Provides a unified interface for accessing all applications and data

  • Enhances security by centralizing data and applications in the data center

  • Improves productivity by allowing users to work from anywhere

  • Reduces IT costs by simplifying application management and reducing hardware req...read more

Add your answer

Q24. Name some popular operating system?

Ans.

Popular operating systems are used in computers, mobiles, and servers.

  • Windows - widely used in personal computers

  • macOS - used in Apple computers

  • Linux - popular in servers and open-source community

  • Android - widely used in mobile devices

  • iOS - used in Apple mobile devices

View 1 answer

Q25. What is IaaS? Do you have a knowledge in cloud?

Ans.

IaaS stands for Infrastructure as a Service. It is a cloud computing model where virtualized computing resources are provided over the internet.

  • IaaS allows users to rent IT infrastructure like servers, storage, and networking on a pay-as-you-go basis

  • Users can scale resources up or down based on their needs without investing in physical hardware

  • Examples of IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform

Add your answer

Q26. what are the commands used to take backup of VIO

Ans.

The commands used to take backup of VIO are mksysb and savevg.

  • mksysb - Creates a system backup image on VIO server

  • savevg - Saves a volume group backup on VIO server

Add your answer

Q27. What is Active Directory

Ans.

Active Directory is a Microsoft service that manages network resources and user accounts.

  • Centralized database for managing network resources and user accounts

  • Allows for single sign-on authentication

  • Can be used to manage access to resources across multiple domains

  • Can be integrated with other Microsoft services like Exchange and SharePoint

  • Uses a hierarchical structure of domains, trees, and forests

  • Can be managed through a GUI or command-line tools like PowerShell

Add your answer

Q28. How to configure network printer?

Ans.

To configure a network printer, you need to connect it to the network, install drivers, and set it up on each computer.

  • Connect the printer to the network using an Ethernet cable or Wi-Fi.

  • Install the printer drivers on each computer that will be using the printer.

  • Add the network printer on each computer by going to Control Panel > Devices and Printers > Add a printer.

  • Select the network printer from the list of available printers and follow the on-screen instructions to complet...read more

Add your answer

Q29. What purpose of device manager?

Ans.

Device Manager is a tool in Windows operating systems that allows users to view and manage hardware devices installed on their computer.

  • View and manage hardware devices

  • Update device drivers

  • Enable/disable devices

  • Troubleshoot device issues

  • View device properties

Add your answer

Q30. What do you understand by VPN ?

Ans.

VPN stands for Virtual Private Network, a secure connection that allows users to access a private network over a public network.

  • VPN creates a secure and encrypted connection over the internet.

  • It allows users to access resources on a private network from a remote location.

  • VPN can be used to protect data transmission and maintain privacy online.

  • Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost.

Add your answer

Q31. What is BSOD,what is network printer

Ans.

BSOD stands for Blue Screen of Death, a Windows error screen. A network printer is a printer connected to a network for multiple users to access.

  • BSOD is a Windows error screen that appears when the system encounters a critical error

  • It is often caused by hardware failures, driver issues, or software conflicts

  • Network printer is a printer connected to a network for multiple users to print documents

  • It allows users to send print jobs to the printer over the network

Add your answer

Q32. What is host entry ?

Ans.

A host entry is an entry in a computer's host file that maps a hostname to an IP address.

  • Host entries are used to override DNS resolution for specific hostnames.

  • They are commonly used for local development or testing purposes.

  • An example of a host entry is '127.0.0.1 localhost', which maps the hostname 'localhost' to the loopback IP address.

  • Host entries can also be used to block access to certain websites by mapping their hostname to an invalid IP address.

Add your answer

Q33. What is the role of DHCP.

Ans.

DHCP assigns IP addresses and network configuration to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It automates the process of assigning IP addresses to devices on a network.

  • DHCP also provides other network configuration information, such as subnet mask and default gateway.

  • DHCP reduces the administrative burden of manually assigning IP addresses to devices.

  • Example: When a new device joins a network, it sends a DHCP request and the DHCP server resp...read more

Add your answer

Q34. What is DNS and why we are using this

Ans.

DNS stands for Domain Name System, used to translate domain names to IP addresses.

  • DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).

  • It helps users access websites and other online services by providing a way to easily remember and access them.

  • DNS also helps in load balancing, redundancy, and security by allowing domain names to point to multiple IP addresses or servers.

  • DNS records include ...read more

Add your answer

Q35. What is vmware what is snapshot

Ans.

VMware is a virtualization software that allows multiple operating systems to run on a single physical machine. Snapshots are point-in-time copies of a virtual machine's disk file.

  • VMware is a virtualization software used to create and manage virtual machines

  • It allows multiple operating systems to run on a single physical machine

  • Snapshots are point-in-time copies of a virtual machine's disk file, capturing the VM's state at that moment

  • Snapshots can be used to revert a VM to a ...read more

Add your answer

Q36. What is dora process.

Ans.

DORA (Discovery, Optimization, and Risk Assessment) is a process used to manage scientific research data.

  • DORA helps researchers to manage their data effectively.

  • It involves discovering data, optimizing it for use, and assessing the risks associated with it.

  • DORA is important for ensuring the quality and integrity of research data.

  • It helps to ensure that data is properly documented, stored, and shared.

  • DORA can also help to identify potential risks and issues with data, such as ...read more

Add your answer

Q37. How to create disk partition?

Ans.

Disk partition can be created using disk management tools in operating systems like Windows or disk utility in Linux.

  • Use disk management tools like Disk Management in Windows or disk utility in Linux.

  • Select the disk you want to partition and right click to choose 'Shrink Volume' in Windows or 'Partition' in Linux.

  • Specify the size of the new partition and follow the on-screen instructions to complete the process.

Add your answer

Q38. How can you improve PC Speed ?

Ans.

To improve PC speed, you can upgrade hardware, optimize software, clean up disk space, disable startup programs, and run regular maintenance.

  • Upgrade hardware components such as RAM or SSD for faster performance

  • Optimize software by updating drivers and removing unnecessary programs

  • Clean up disk space by deleting temporary files and old documents

  • Disable startup programs that slow down boot time

  • Run regular maintenance tasks like disk defragmentation and system updates

Add your answer

Q39. Network flow of your environment

Ans.

The network flow of our environment is well-structured and optimized for efficient data transfer.

  • Our network is designed to prioritize traffic based on importance and minimize congestion.

  • We use VLANs to segment our network and improve security.

  • We have implemented Quality of Service (QoS) to ensure critical applications receive the necessary bandwidth.

  • We regularly monitor network performance and make adjustments as needed.

  • Examples of our network flow include: traffic from our ...read more

Add your answer

Q40. What is OS, what is dhcp

Ans.

OS stands for Operating System, it is the software that manages computer hardware resources. DHCP stands for Dynamic Host Configuration Protocol, it assigns IP addresses to devices on a network.

  • OS is the software that manages computer hardware resources

  • DHCP assigns IP addresses to devices on a network

  • OS examples: Windows, macOS, Linux

  • DHCP example: Router assigning IP addresses to devices connected to a network

Add your answer

Q41. What is ci/cd in jenkins?

Ans.

CI/CD in Jenkins stands for Continuous Integration/Continuous Deployment, a practice of automating the software delivery process.

  • CI/CD is a software development practice where code changes are automatically built, tested, and deployed.

  • Jenkins is a popular automation server that is commonly used for implementing CI/CD pipelines.

  • Continuous Integration involves automatically building and testing code changes as they are committed to the version control system.

  • Continuous Deployme...read more

Add your answer

Q42. Troubleshooting linux server issue

Ans.

Troubleshooting linux server issues involves identifying the root cause and implementing solutions.

  • Check system logs for errors or warnings

  • Verify network connectivity and firewall settings

  • Monitor system resources such as CPU and memory usage

  • Test services and applications to isolate the issue

  • Update software and patches to ensure system security

Add your answer

Q43. What does impact ?

Ans.

Impact refers to the effect or influence that something has on a system or situation.

  • Impact can be positive or negative.

  • It can be immediate or long-term.

  • Examples of impact include system downtime, data loss, increased productivity, improved efficiency, etc.

Add your answer

Q44. Best practice to get logs

Ans.

Best practice to get logs

  • Use a centralized logging system

  • Configure log rotation to avoid filling up disk space

  • Set log levels appropriately to reduce noise

  • Regularly review logs for anomalies and errors

  • Use tools like grep and awk to search and filter logs

Add your answer

Q45. How to manage VDI?

Ans.

VDI can be managed by monitoring performance, updating software, optimizing resources, and ensuring security.

  • Monitor performance regularly to identify any issues or bottlenecks.

  • Update VDI software and patches to ensure system stability and security.

  • Optimize resources by balancing workloads and adjusting configurations as needed.

  • Ensure security measures are in place, such as encryption, access controls, and regular backups.

  • Consider implementing automation tools for easier mana...read more

Add your answer

Q46. What is virtualization

Ans.

Virtualization is the process of creating a virtual version of a device or resource, such as a server, storage device, network or operating system.

  • Allows multiple virtual machines to run on a single physical machine

  • Increases efficiency by utilizing resources more effectively

  • Provides flexibility and scalability for IT infrastructure

  • Examples include VMware, Hyper-V, and VirtualBox

Add your answer

Q47. What is PST and ost

Ans.

PST and OST are file formats used by Microsoft Outlook to store email data.

  • PST stands for Personal Storage Table and is used to store email messages, contacts, calendar items, and other data locally on a user's computer.

  • OST stands for Offline Storage Table and is a local copy of a user's mailbox data stored on the Exchange server. It allows users to access their mailbox data even when offline.

  • PST files can be imported/exported, backed up, and archived by users.

  • OST files are a...read more

Add your answer

Q48. What is vsan and NSX

Ans.

VSAN is a software-defined storage solution by VMware, while NSX is a network virtualization platform.

  • VSAN stands for Virtual Storage Area Network and is used for creating shared storage for virtual machines.

  • NSX is a network virtualization platform that allows for the creation of virtual networks and security policies.

  • Both VSAN and NSX are part of VMware's software-defined data center strategy.

  • VSAN integrates with VMware vSphere for storage management, while NSX integrates wi...read more

Add your answer

Q49. What OU and GPO

Ans.

OU stands for Organizational Unit and GPO stands for Group Policy Object in Active Directory.

  • OU is a container within Active Directory that can hold users, groups, computers, and other OUs.

  • GPO is a collection of settings that define what a system will look like and how it will behave for a defined group of users or computers.

  • Examples: Sales OU, Marketing OU, Default Domain Policy GPO, Account Lockout Policy GPO.

Add your answer

Q50. Latest tools supported

Ans.

Some of the latest tools supported by System Administrators include Docker, Kubernetes, Ansible, Terraform, and Prometheus.

  • Docker

  • Kubernetes

  • Ansible

  • Terraform

  • Prometheus

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Tandhan Polyplast

based on 48 interviews
3 Interview rounds
Technical Round
HR Round - 1
HR Round - 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Administrator Interview Questions from Similar Companies

3.7
 • 20 Interview Questions
3.0
 • 17 Interview Questions
4.4
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter