Wipro
30+ Interview Questions and Answers
Q1. 2. What is Cloud Technology. What is Microsoft Intune. If we can manage applications using MAM then why do we need MDM?
Cloud technology is the delivery of computing services over the internet. Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) solution.
Cloud technology allows users to access data and applications from anywhere with an internet connection.
Microsoft Intune is a cloud-based solution that allows organizations to manage mobile devices and applications.
MAM allows organizations to manage and secure applications and data on mobile...read more
Q2. 7.A user has received a zip file in Outlook, which is a managed app. Will the user be able to open that zip file?
It depends on the app's settings and the user's permissions.
If the managed app allows opening zip files and the user has permission to do so, then they can open it.
If the app does not allow opening zip files or the user does not have permission, then they cannot open it.
The user should check with their IT department or the app's documentation to determine if zip files are allowed.
If the zip file contains a potentially harmful file type, the app may block it from being opened.
Q3. If you have learn anew programing language for this job,what wil do ?
I would take the initiative to learn the new programming language as quickly as possible.
Research the best resources for learning the language
Practice coding in the new language regularly
Seek guidance and mentorship from experienced programmers
Attend workshops and conferences to enhance knowledge
Apply the new language in real-world projects to gain experience
Q4. 3.What is the difference between Passcode and PIN?
Passcode and PIN are both used for authentication, but they differ in their length and complexity.
A passcode is typically longer than a PIN and can include letters, numbers, and symbols.
A PIN is usually a 4-6 digit number.
Passcodes are generally considered more secure than PINs.
Examples of passcodes include the password for your email account or the code to unlock your phone.
Examples of PINs include the code to access your bank account or the PIN to unlock your SIM card.
Q5. 8.Can we differ an OS update for an iOS device using an MDM solution? If yes, how can we do so?
Yes, we can differ an OS update for an iOS device using an MDM solution.
MDM solution allows administrators to control the update process
Administrators can choose to delay or skip updates for certain devices
This can be done by creating update policies and assigning them to specific devices or groups
For example, an organization may choose to delay updates for a few days to ensure compatibility with their internal apps
MDM solutions like Jamf, Microsoft Intune, and VMware Workspa...read more
Q6. 6.If a device is not enrolled through DEP, can I still block the screen capture feature on an iOS device
Yes, it is possible to block screen capture feature on an iOS device even if it is not enrolled through DEP.
You can use a mobile device management (MDM) solution to block screen capture feature on iOS devices.
MDM solutions like Jamf, Microsoft Intune, and VMware Workspace ONE can help you enforce policies on iOS devices.
You can create a policy in your MDM solution to disable the screen capture feature on iOS devices.
This policy will apply to all iOS devices that are enrolled ...read more
Q7. What is the full form of SDLC?
SDLC stands for Software Development Life Cycle.
SDLC is a process used by software development teams to design, develop, and test high-quality software.
It consists of several phases including planning, analysis, design, implementation, and maintenance.
Each phase has its own set of activities and deliverables that must be completed before moving on to the next phase.
SDLC helps ensure that software is developed on time, within budget, and meets the needs of the end-users.
Exampl...read more
Q8. 4.What is DEP/Apple Business Manager?
DEP/Apple Business Manager is a device management solution for Apple devices.
DEP stands for Device Enrollment Program, which allows organizations to easily deploy and manage Apple devices.
Apple Business Manager is a web-based portal that allows IT administrators to manage devices, apps, and content.
With DEP/Apple Business Manager, IT administrators can automate device enrollment, configure settings, and distribute apps and content.
This solution is particularly useful for orga...read more
Q9. 5.What is the benefit of using DEP?
DEP provides security by preventing execution of malicious code in memory.
DEP stands for Data Execution Prevention.
It is a security feature in modern operating systems.
DEP prevents execution of code in memory regions marked as non-executable.
This helps prevent buffer overflow attacks and other types of malware.
DEP can be enabled for specific applications or for the entire system.
Examples of DEP-enabled applications include Microsoft Office and Internet Explorer.
Q10. What is netcool architecture and explain each component involve and data flow.?
Netcool architecture is a system used for event management and monitoring. It consists of several components that work together to process and analyze data.
Netcool is a software suite developed by IBM for event management and monitoring.
The architecture includes various components such as probes, gateways, and databases.
Probes collect event data from different sources and send it to the Netcool system.
Gateways receive event data from probes and perform data normalization and ...read more
Q11. What will you do if vm machine is in hung state
I will try to identify the cause of the hang and take appropriate action to resolve it.
Check if the VM is responding to pings or console access
Check the VM's resource utilization and logs for any errors
Try to gracefully shut down the VM using the hypervisor's management tools
If graceful shutdown fails, force power off the VM and restart it
Investigate the cause of the hang and take steps to prevent it from happening again
Q12. What you will do if client reports website is down
I will immediately check the server and website logs to identify the issue and take necessary actions to resolve it.
Check server and website logs
Identify the issue
Take necessary actions to resolve it
Communicate with the client about the status and progress of the issue
Ensure preventive measures are in place to avoid similar issues in the future
Q13. how to find out the computer problems
Computer problems can be found by troubleshooting hardware, software, network, and security issues.
Check for error messages and logs
Test hardware components such as RAM, hard drive, and CPU
Scan for viruses and malware
Check network connectivity and settings
Update software and drivers
Consult user for any recent changes or issues
Q14. Adding network printer into multiple computers at a time
Use Group Policy to deploy printer to multiple computers simultaneously.
Create a shared printer on the network
Create a Group Policy Object (GPO) in Active Directory
Under Computer Configuration, go to Policies > Windows Settings > Deployed Printers
Add the shared printer and configure any necessary settings
Link the GPO to the appropriate Organizational Unit (OU) containing the computers
Restart the computers or run gpupdate /force to apply the GPO
Q15. Current version of windows. What is Operating system Diffrence between update and upgrade Dhcp, dns, troubleshooting. Lan, wan.
The question covers topics related to Windows operating system, updates, upgrades, DHCP, DNS, LAN, and WAN.
Operating system is the software that manages computer hardware resources and provides common services for computer programs.
Update refers to making improvements or fixes to existing software, while upgrade involves replacing the current version with a newer one.
DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, while DNS (Domain Nam...read more
Q16. What is DNS. DHCP, IP ADDRESS, TROUBLESHOOTING, HARDWARE ISSUE
DNS is a system that translates domain names to IP addresses. DHCP assigns IP addresses to devices on a network. IP address is a unique identifier for devices on a network. Troubleshooting involves identifying and resolving issues. Hardware issues refer to problems with physical components of a computer system.
DNS translates domain names to IP addresses (e.g. www.google.com to 172.217.3.206)
DHCP assigns IP addresses to devices on a network dynamically
IP address is a unique id...read more
Q17. What is difference between forward and reverse proxy?
Forward proxy is used by client to access the internet, while reverse proxy is used by server to access the internet on behalf of clients.
Forward proxy is used by clients to access the internet indirectly.
Reverse proxy is used by servers to access the internet on behalf of clients.
Forward proxy hides the identity of the client, while reverse proxy hides the identity of the server.
Forward proxy is commonly used for security and privacy reasons, while reverse proxy is used for ...read more
Q18. What is boundary groups in sccm. What is difference between package and application.
Boundary groups in SCCM are used to define network locations for clients. Package is a legacy deployment method while application is modern.
Boundary groups are used to assign clients to specific distribution points based on their network location.
Boundary groups are used to optimize content distribution and reduce WAN traffic.
Packages are legacy deployment method that require manual installation and do not support dependencies or supersedence.
Applications are modern deploymen...read more
Q19. How to install the os in server
To install an OS in a server, you need to boot from the installation media and follow the prompts to complete the installation.
Insert the installation media (CD, DVD, USB) into the server
Boot the server from the installation media
Follow the prompts to select language, time zone, and partition the hard drive
Enter the product key and create a user account
Wait for the installation to complete and reboot the server
Q20. Citrix workspace used cases and benifites
Citrix Workspace provides secure access to applications and data from any device, anywhere.
Allows users to access their virtual desktops and applications from any device with an internet connection
Provides a unified interface for accessing all applications and data
Enhances security by centralizing data and applications in the data center
Improves productivity by allowing users to work from anywhere
Reduces IT costs by simplifying application management and reducing hardware req...read more
Q21. Name some popular operating system?
Popular operating systems are used in computers, mobiles, and servers.
Windows - widely used in personal computers
macOS - used in Apple computers
Linux - popular in servers and open-source community
Android - widely used in mobile devices
iOS - used in Apple mobile devices
Q22. What is IaaS? Do you have a knowledge in cloud?
IaaS stands for Infrastructure as a Service. It is a cloud computing model where virtualized computing resources are provided over the internet.
IaaS allows users to rent IT infrastructure like servers, storage, and networking on a pay-as-you-go basis
Users can scale resources up or down based on their needs without investing in physical hardware
Examples of IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform
Q23. what are the commands used to take backup of VIO
The commands used to take backup of VIO are mksysb and savevg.
mksysb - Creates a system backup image on VIO server
savevg - Saves a volume group backup on VIO server
Q24. What is Active Directory
Active Directory is a Microsoft service that manages network resources and user accounts.
Centralized database for managing network resources and user accounts
Allows for single sign-on authentication
Can be used to manage access to resources across multiple domains
Can be integrated with other Microsoft services like Exchange and SharePoint
Uses a hierarchical structure of domains, trees, and forests
Can be managed through a GUI or command-line tools like PowerShell
Q25. What do you understand by VPN ?
VPN stands for Virtual Private Network, a secure connection that allows users to access a private network over a public network.
VPN creates a secure and encrypted connection over the internet.
It allows users to access resources on a private network from a remote location.
VPN can be used to protect data transmission and maintain privacy online.
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost.
Q26. What is host entry ?
A host entry is an entry in a computer's host file that maps a hostname to an IP address.
Host entries are used to override DNS resolution for specific hostnames.
They are commonly used for local development or testing purposes.
An example of a host entry is '127.0.0.1 localhost', which maps the hostname 'localhost' to the loopback IP address.
Host entries can also be used to block access to certain websites by mapping their hostname to an invalid IP address.
Q27. What is DNS and why we are using this
DNS stands for Domain Name System, used to translate domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites and other online services by providing a way to easily remember and access them.
DNS also helps in load balancing, redundancy, and security by allowing domain names to point to multiple IP addresses or servers.
DNS records include ...read more
Q28. What is vmware what is snapshot
VMware is a virtualization software that allows multiple operating systems to run on a single physical machine. Snapshots are point-in-time copies of a virtual machine's disk file.
VMware is a virtualization software used to create and manage virtual machines
It allows multiple operating systems to run on a single physical machine
Snapshots are point-in-time copies of a virtual machine's disk file, capturing the VM's state at that moment
Snapshots can be used to revert a VM to a ...read more
Q29. How can you improve PC Speed ?
To improve PC speed, you can upgrade hardware, optimize software, clean up disk space, disable startup programs, and run regular maintenance.
Upgrade hardware components such as RAM or SSD for faster performance
Optimize software by updating drivers and removing unnecessary programs
Clean up disk space by deleting temporary files and old documents
Disable startup programs that slow down boot time
Run regular maintenance tasks like disk defragmentation and system updates
Q30. Network flow of your environment
The network flow of our environment is well-structured and optimized for efficient data transfer.
Our network is designed to prioritize traffic based on importance and minimize congestion.
We use VLANs to segment our network and improve security.
We have implemented Quality of Service (QoS) to ensure critical applications receive the necessary bandwidth.
We regularly monitor network performance and make adjustments as needed.
Examples of our network flow include: traffic from our ...read more
Q31. What is ci/cd in jenkins?
CI/CD in Jenkins stands for Continuous Integration/Continuous Deployment, a practice of automating the software delivery process.
CI/CD is a software development practice where code changes are automatically built, tested, and deployed.
Jenkins is a popular automation server that is commonly used for implementing CI/CD pipelines.
Continuous Integration involves automatically building and testing code changes as they are committed to the version control system.
Continuous Deployme...read more
Q32. What does impact ?
Impact refers to the effect or influence that something has on a system or situation.
Impact can be positive or negative.
It can be immediate or long-term.
Examples of impact include system downtime, data loss, increased productivity, improved efficiency, etc.
Q33. Best practice to get logs
Best practice to get logs
Use a centralized logging system
Configure log rotation to avoid filling up disk space
Set log levels appropriately to reduce noise
Regularly review logs for anomalies and errors
Use tools like grep and awk to search and filter logs
Q34. How to manage VDI?
VDI can be managed by monitoring performance, updating software, optimizing resources, and ensuring security.
Monitor performance regularly to identify any issues or bottlenecks.
Update VDI software and patches to ensure system stability and security.
Optimize resources by balancing workloads and adjusting configurations as needed.
Ensure security measures are in place, such as encryption, access controls, and regular backups.
Consider implementing automation tools for easier mana...read more
Q35. What is virtualization
Virtualization is the process of creating a virtual version of a device or resource, such as a server, storage device, network or operating system.
Allows multiple virtual machines to run on a single physical machine
Increases efficiency by utilizing resources more effectively
Provides flexibility and scalability for IT infrastructure
Examples include VMware, Hyper-V, and VirtualBox
Q36. What is vsan and NSX
VSAN is a software-defined storage solution by VMware, while NSX is a network virtualization platform.
VSAN stands for Virtual Storage Area Network and is used for creating shared storage for virtual machines.
NSX is a network virtualization platform that allows for the creation of virtual networks and security policies.
Both VSAN and NSX are part of VMware's software-defined data center strategy.
VSAN integrates with VMware vSphere for storage management, while NSX integrates wi...read more
Q37. Latest tools supported
Some of the latest tools supported by System Administrators include Docker, Kubernetes, Ansible, Terraform, and Prometheus.
Docker
Kubernetes
Ansible
Terraform
Prometheus
Top HR Questions asked in null
Interview Process at null
Top System Administrator Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month