Add office photos
Engaged Employer

Wipro

3.7
based on 47.3k Reviews
Filter interviews by

30+ Interview Questions and Answers

Updated 23 Nov 2024
Popular Designations

Q1. 2. What is Cloud Technology. What is Microsoft Intune. If we can manage applications using MAM then why do we need MDM?

Ans.

Cloud technology is the delivery of computing services over the internet. Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) solution.

  • Cloud technology allows users to access data and applications from anywhere with an internet connection.

  • Microsoft Intune is a cloud-based solution that allows organizations to manage mobile devices and applications.

  • MAM allows organizations to manage and secure applications and data on mobile...read more

View 7 more answers

Q2. 7.A user has received a zip file in Outlook, which is a managed app. Will the user be able to open that zip file?

Ans.

It depends on the app's settings and the user's permissions.

  • If the managed app allows opening zip files and the user has permission to do so, then they can open it.

  • If the app does not allow opening zip files or the user does not have permission, then they cannot open it.

  • The user should check with their IT department or the app's documentation to determine if zip files are allowed.

  • If the zip file contains a potentially harmful file type, the app may block it from being opened.

View 2 more answers

Q3. If you have learn anew programing language for this job,what wil do ?

Ans.

I would take the initiative to learn the new programming language as quickly as possible.

  • Research the best resources for learning the language

  • Practice coding in the new language regularly

  • Seek guidance and mentorship from experienced programmers

  • Attend workshops and conferences to enhance knowledge

  • Apply the new language in real-world projects to gain experience

View 2 more answers

Q4. 3.What is the difference between Passcode and PIN?

Ans.

Passcode and PIN are both used for authentication, but they differ in their length and complexity.

  • A passcode is typically longer than a PIN and can include letters, numbers, and symbols.

  • A PIN is usually a 4-6 digit number.

  • Passcodes are generally considered more secure than PINs.

  • Examples of passcodes include the password for your email account or the code to unlock your phone.

  • Examples of PINs include the code to access your bank account or the PIN to unlock your SIM card.

View 2 more answers
Discover null interview dos and don'ts from real experiences

Q5. 8.Can we differ an OS update for an iOS device using an MDM solution? If yes, how can we do so?

Ans.

Yes, we can differ an OS update for an iOS device using an MDM solution.

  • MDM solution allows administrators to control the update process

  • Administrators can choose to delay or skip updates for certain devices

  • This can be done by creating update policies and assigning them to specific devices or groups

  • For example, an organization may choose to delay updates for a few days to ensure compatibility with their internal apps

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspa...read more

Add your answer

Q6. 6.If a device is not enrolled through DEP, can I still block the screen capture feature on an iOS device

Ans.

Yes, it is possible to block screen capture feature on an iOS device even if it is not enrolled through DEP.

  • You can use a mobile device management (MDM) solution to block screen capture feature on iOS devices.

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspace ONE can help you enforce policies on iOS devices.

  • You can create a policy in your MDM solution to disable the screen capture feature on iOS devices.

  • This policy will apply to all iOS devices that are enrolled ...read more

Add your answer
Are these interview questions helpful?

Q7. What is the full form of SDLC?

Ans.

SDLC stands for Software Development Life Cycle.

  • SDLC is a process used by software development teams to design, develop, and test high-quality software.

  • It consists of several phases including planning, analysis, design, implementation, and maintenance.

  • Each phase has its own set of activities and deliverables that must be completed before moving on to the next phase.

  • SDLC helps ensure that software is developed on time, within budget, and meets the needs of the end-users.

  • Exampl...read more

View 2 more answers

Q8. 4.What is DEP/Apple Business Manager?

Ans.

DEP/Apple Business Manager is a device management solution for Apple devices.

  • DEP stands for Device Enrollment Program, which allows organizations to easily deploy and manage Apple devices.

  • Apple Business Manager is a web-based portal that allows IT administrators to manage devices, apps, and content.

  • With DEP/Apple Business Manager, IT administrators can automate device enrollment, configure settings, and distribute apps and content.

  • This solution is particularly useful for orga...read more

Add your answer
Share interview questions and help millions of jobseekers šŸŒŸ

Q9. 5.What is the benefit of using DEP?

Ans.

DEP provides security by preventing execution of malicious code in memory.

  • DEP stands for Data Execution Prevention.

  • It is a security feature in modern operating systems.

  • DEP prevents execution of code in memory regions marked as non-executable.

  • This helps prevent buffer overflow attacks and other types of malware.

  • DEP can be enabled for specific applications or for the entire system.

  • Examples of DEP-enabled applications include Microsoft Office and Internet Explorer.

Add your answer

Q10. What is netcool architecture and explain each component involve and data flow.?

Ans.

Netcool architecture is a system used for event management and monitoring. It consists of several components that work together to process and analyze data.

  • Netcool is a software suite developed by IBM for event management and monitoring.

  • The architecture includes various components such as probes, gateways, and databases.

  • Probes collect event data from different sources and send it to the Netcool system.

  • Gateways receive event data from probes and perform data normalization and ...read more

Add your answer

Q11. What will you do if vm machine is in hung state

Ans.

I will try to identify the cause of the hang and take appropriate action to resolve it.

  • Check if the VM is responding to pings or console access

  • Check the VM's resource utilization and logs for any errors

  • Try to gracefully shut down the VM using the hypervisor's management tools

  • If graceful shutdown fails, force power off the VM and restart it

  • Investigate the cause of the hang and take steps to prevent it from happening again

Add your answer

Q12. What you will do if client reports website is down

Ans.

I will immediately check the server and website logs to identify the issue and take necessary actions to resolve it.

  • Check server and website logs

  • Identify the issue

  • Take necessary actions to resolve it

  • Communicate with the client about the status and progress of the issue

  • Ensure preventive measures are in place to avoid similar issues in the future

Add your answer

Q13. how to find out the computer problems

Ans.

Computer problems can be found by troubleshooting hardware, software, network, and security issues.

  • Check for error messages and logs

  • Test hardware components such as RAM, hard drive, and CPU

  • Scan for viruses and malware

  • Check network connectivity and settings

  • Update software and drivers

  • Consult user for any recent changes or issues

View 1 answer

Q14. Adding network printer into multiple computers at a time

Ans.

Use Group Policy to deploy printer to multiple computers simultaneously.

  • Create a shared printer on the network

  • Create a Group Policy Object (GPO) in Active Directory

  • Under Computer Configuration, go to Policies > Windows Settings > Deployed Printers

  • Add the shared printer and configure any necessary settings

  • Link the GPO to the appropriate Organizational Unit (OU) containing the computers

  • Restart the computers or run gpupdate /force to apply the GPO

Add your answer

Q15. Current version of windows. What is Operating system Diffrence between update and upgrade Dhcp, dns, troubleshooting. Lan, wan.

Ans.

The question covers topics related to Windows operating system, updates, upgrades, DHCP, DNS, LAN, and WAN.

  • Operating system is the software that manages computer hardware resources and provides common services for computer programs.

  • Update refers to making improvements or fixes to existing software, while upgrade involves replacing the current version with a newer one.

  • DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, while DNS (Domain Nam...read more

Add your answer

Q16. What is DNS. DHCP, IP ADDRESS, TROUBLESHOOTING, HARDWARE ISSUE

Ans.

DNS is a system that translates domain names to IP addresses. DHCP assigns IP addresses to devices on a network. IP address is a unique identifier for devices on a network. Troubleshooting involves identifying and resolving issues. Hardware issues refer to problems with physical components of a computer system.

  • DNS translates domain names to IP addresses (e.g. www.google.com to 172.217.3.206)

  • DHCP assigns IP addresses to devices on a network dynamically

  • IP address is a unique id...read more

Add your answer

Q17. What is difference between forward and reverse proxy?

Ans.

Forward proxy is used by client to access the internet, while reverse proxy is used by server to access the internet on behalf of clients.

  • Forward proxy is used by clients to access the internet indirectly.

  • Reverse proxy is used by servers to access the internet on behalf of clients.

  • Forward proxy hides the identity of the client, while reverse proxy hides the identity of the server.

  • Forward proxy is commonly used for security and privacy reasons, while reverse proxy is used for ...read more

Add your answer

Q18. What is boundary groups in sccm. What is difference between package and application.

Ans.

Boundary groups in SCCM are used to define network locations for clients. Package is a legacy deployment method while application is modern.

  • Boundary groups are used to assign clients to specific distribution points based on their network location.

  • Boundary groups are used to optimize content distribution and reduce WAN traffic.

  • Packages are legacy deployment method that require manual installation and do not support dependencies or supersedence.

  • Applications are modern deploymen...read more

Add your answer

Q19. How to install the os in server

Ans.

To install an OS in a server, you need to boot from the installation media and follow the prompts to complete the installation.

  • Insert the installation media (CD, DVD, USB) into the server

  • Boot the server from the installation media

  • Follow the prompts to select language, time zone, and partition the hard drive

  • Enter the product key and create a user account

  • Wait for the installation to complete and reboot the server

Add your answer

Q20. Citrix workspace used cases and benifites

Ans.

Citrix Workspace provides secure access to applications and data from any device, anywhere.

  • Allows users to access their virtual desktops and applications from any device with an internet connection

  • Provides a unified interface for accessing all applications and data

  • Enhances security by centralizing data and applications in the data center

  • Improves productivity by allowing users to work from anywhere

  • Reduces IT costs by simplifying application management and reducing hardware req...read more

Add your answer

Q21. Name some popular operating system?

Ans.

Popular operating systems are used in computers, mobiles, and servers.

  • Windows - widely used in personal computers

  • macOS - used in Apple computers

  • Linux - popular in servers and open-source community

  • Android - widely used in mobile devices

  • iOS - used in Apple mobile devices

View 1 answer

Q22. What is IaaS? Do you have a knowledge in cloud?

Ans.

IaaS stands for Infrastructure as a Service. It is a cloud computing model where virtualized computing resources are provided over the internet.

  • IaaS allows users to rent IT infrastructure like servers, storage, and networking on a pay-as-you-go basis

  • Users can scale resources up or down based on their needs without investing in physical hardware

  • Examples of IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform

Add your answer

Q23. what are the commands used to take backup of VIO

Ans.

The commands used to take backup of VIO are mksysb and savevg.

  • mksysb - Creates a system backup image on VIO server

  • savevg - Saves a volume group backup on VIO server

Add your answer

Q24. What is Active Directory

Ans.

Active Directory is a Microsoft service that manages network resources and user accounts.

  • Centralized database for managing network resources and user accounts

  • Allows for single sign-on authentication

  • Can be used to manage access to resources across multiple domains

  • Can be integrated with other Microsoft services like Exchange and SharePoint

  • Uses a hierarchical structure of domains, trees, and forests

  • Can be managed through a GUI or command-line tools like PowerShell

Add your answer

Q25. What do you understand by VPN ?

Ans.

VPN stands for Virtual Private Network, a secure connection that allows users to access a private network over a public network.

  • VPN creates a secure and encrypted connection over the internet.

  • It allows users to access resources on a private network from a remote location.

  • VPN can be used to protect data transmission and maintain privacy online.

  • Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost.

Add your answer

Q26. What is host entry ?

Ans.

A host entry is an entry in a computer's host file that maps a hostname to an IP address.

  • Host entries are used to override DNS resolution for specific hostnames.

  • They are commonly used for local development or testing purposes.

  • An example of a host entry is '127.0.0.1 localhost', which maps the hostname 'localhost' to the loopback IP address.

  • Host entries can also be used to block access to certain websites by mapping their hostname to an invalid IP address.

Add your answer

Q27. What is DNS and why we are using this

Ans.

DNS stands for Domain Name System, used to translate domain names to IP addresses.

  • DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).

  • It helps users access websites and other online services by providing a way to easily remember and access them.

  • DNS also helps in load balancing, redundancy, and security by allowing domain names to point to multiple IP addresses or servers.

  • DNS records include ...read more

Add your answer

Q28. What is vmware what is snapshot

Ans.

VMware is a virtualization software that allows multiple operating systems to run on a single physical machine. Snapshots are point-in-time copies of a virtual machine's disk file.

  • VMware is a virtualization software used to create and manage virtual machines

  • It allows multiple operating systems to run on a single physical machine

  • Snapshots are point-in-time copies of a virtual machine's disk file, capturing the VM's state at that moment

  • Snapshots can be used to revert a VM to a ...read more

Add your answer

Q29. How can you improve PC Speed ?

Ans.

To improve PC speed, you can upgrade hardware, optimize software, clean up disk space, disable startup programs, and run regular maintenance.

  • Upgrade hardware components such as RAM or SSD for faster performance

  • Optimize software by updating drivers and removing unnecessary programs

  • Clean up disk space by deleting temporary files and old documents

  • Disable startup programs that slow down boot time

  • Run regular maintenance tasks like disk defragmentation and system updates

Add your answer

Q30. Network flow of your environment

Ans.

The network flow of our environment is well-structured and optimized for efficient data transfer.

  • Our network is designed to prioritize traffic based on importance and minimize congestion.

  • We use VLANs to segment our network and improve security.

  • We have implemented Quality of Service (QoS) to ensure critical applications receive the necessary bandwidth.

  • We regularly monitor network performance and make adjustments as needed.

  • Examples of our network flow include: traffic from our ...read more

Add your answer

Q31. What is ci/cd in jenkins?

Ans.

CI/CD in Jenkins stands for Continuous Integration/Continuous Deployment, a practice of automating the software delivery process.

  • CI/CD is a software development practice where code changes are automatically built, tested, and deployed.

  • Jenkins is a popular automation server that is commonly used for implementing CI/CD pipelines.

  • Continuous Integration involves automatically building and testing code changes as they are committed to the version control system.

  • Continuous Deployme...read more

Add your answer

Q32. What does impact ?

Ans.

Impact refers to the effect or influence that something has on a system or situation.

  • Impact can be positive or negative.

  • It can be immediate or long-term.

  • Examples of impact include system downtime, data loss, increased productivity, improved efficiency, etc.

Add your answer

Q33. Best practice to get logs

Ans.

Best practice to get logs

  • Use a centralized logging system

  • Configure log rotation to avoid filling up disk space

  • Set log levels appropriately to reduce noise

  • Regularly review logs for anomalies and errors

  • Use tools like grep and awk to search and filter logs

Add your answer

Q34. How to manage VDI?

Ans.

VDI can be managed by monitoring performance, updating software, optimizing resources, and ensuring security.

  • Monitor performance regularly to identify any issues or bottlenecks.

  • Update VDI software and patches to ensure system stability and security.

  • Optimize resources by balancing workloads and adjusting configurations as needed.

  • Ensure security measures are in place, such as encryption, access controls, and regular backups.

  • Consider implementing automation tools for easier mana...read more

Add your answer

Q35. What is virtualization

Ans.

Virtualization is the process of creating a virtual version of a device or resource, such as a server, storage device, network or operating system.

  • Allows multiple virtual machines to run on a single physical machine

  • Increases efficiency by utilizing resources more effectively

  • Provides flexibility and scalability for IT infrastructure

  • Examples include VMware, Hyper-V, and VirtualBox

Add your answer

Q36. What is vsan and NSX

Ans.

VSAN is a software-defined storage solution by VMware, while NSX is a network virtualization platform.

  • VSAN stands for Virtual Storage Area Network and is used for creating shared storage for virtual machines.

  • NSX is a network virtualization platform that allows for the creation of virtual networks and security policies.

  • Both VSAN and NSX are part of VMware's software-defined data center strategy.

  • VSAN integrates with VMware vSphere for storage management, while NSX integrates wi...read more

Add your answer

Q37. Latest tools supported

Ans.

Some of the latest tools supported by System Administrators include Docker, Kubernetes, Ansible, Terraform, and Prometheus.

  • Docker

  • Kubernetes

  • Ansible

  • Terraform

  • Prometheus

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 20 interviews in the last 1 year
2 Interview rounds
Technical Round 1
Technical Round 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Administrator Interview Questions from Similar Companies

3.7
Ā ā€¢Ā 20 Interview Questions
3.1
Ā ā€¢Ā 17 Interview Questions
4.4
Ā ā€¢Ā 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ā¤ļø in India. Trademarks belong to their respective owners. All rights reserved Ā© 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter