Application Support Engineer

100+ Application Support Engineer Interview Questions and Answers

Updated 1 Jul 2025
search-icon
1d ago

Q. what do you know about SQL , Unix , explain in brief

Ans.

SQL is a database language used to manage data. Unix is an operating system used for servers and workstations.

  • SQL is used to create, modify, and query databases.

  • Unix is a command-line interface used for file management, process control, and networking.

  • SQL can be used with various database management systems like MySQL, Oracle, and SQL Server.

  • Unix commands include ls, cd, grep, and chmod.

  • SQL and Unix are commonly used in web development and data analysis.

4d ago

Q. How can you add a column to a table without using the CREATE statement?

Ans.

To add a column without using create, you can use the ALTER TABLE statement.

  • Use the ALTER TABLE statement to add a new column to an existing table

  • Specify the table name and the new column name, data type, and any other constraints

  • Example: ALTER TABLE table_name ADD column_name data_type;

Application Support Engineer Interview Questions and Answers for Freshers

illustration image

Asked in CGI Group

4d ago
Q. How do you check how much space is left in the current drive?
Ans.

To check how much space is left in the current drive, you can use the 'df' command in the terminal.

  • Use the 'df' command followed by the '-h' flag to display the disk space in a human-readable format.

  • Look for the 'Available' column to see how much space is left on the current drive.

  • Example: 'df -h' will show you the disk space usage on all mounted filesystems.

Asked in Softenger

1d ago

Q. How do you find the heap dump files in Linux? What is the role of the superuser What can be used to modify file permissions? What are the different commands available to check the disk usage? what is the usage...

read more
Ans.

Answers to Linux-related questions for Application Support Engineer role

  • Heap dump files can be found using the jmap command

  • The superuser has complete control over the system and can perform any action

  • chmod command can be used to modify file permissions

  • Commands like df, du, and ls can be used to check disk usage

  • GREP command is used to search for a specific pattern in a file or output

Are these interview questions helpful?

Asked in CGI Group

3d ago
Q. How do you find all the processes that have opened a file in Linux?
Ans.

To find all processes that have opened a file in Linux, you can use the lsof command.

  • Use the lsof command followed by the file path to see which processes have opened the file.

  • You can also use the -t option with lsof to only display the process IDs.

  • To find all processes that have opened any file in a specific directory, use lsof +D /path/to/directory.

2d ago

Q. What would you do if the application performs slowly?

Ans.

I will investigate the root cause of the slow performance and take appropriate actions.

  • Check server resources usage

  • Analyze application logs

  • Identify bottleneck areas

  • Optimize database queries

  • Implement caching mechanisms

  • Upgrade hardware or software if necessary

Application Support Engineer Jobs

Apple India Pvt Ltd logo
Application Support Engineer 4-7 years
Apple India Pvt Ltd
4.3
Hyderabad / Secunderabad
Accenture Solutions Pvt Ltd logo
Application Support Engineer 15-20 years
Accenture Solutions Pvt Ltd
3.8
Bangalore / Bengaluru
Accenture Solutions Pvt Ltd logo
Application Support Engineer 3-8 years
Accenture Solutions Pvt Ltd
3.8
Bangalore / Bengaluru

Asked in Tek Travels

5d ago

Q. How do you fetch matching rows from two given tables using SQL queries?

Ans.

Use SQL JOIN operations to fetch matching rows from two tables based on a common key.

  • Use INNER JOIN to fetch rows that have matching values in both tables. Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;

  • Use LEFT JOIN to fetch all rows from the first table and matching rows from the second. Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id;

  • Use RIGHT JOIN to fetch all rows from the second table and matching rows from the first. Ex...read more

Asked in CGI Group

1d ago
Q. What does it mean when a file has 644 permissions in Linux?
Ans.

File with 644 permissions in Linux means read and write access for owner, and read-only access for group and others.

  • Owner can read and write the file

  • Group and others can only read the file

  • Permissions are represented as three sets of three bits (rwx)

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Asked in CGI Group

2d ago
Q. How do you find the second highest salary from a table in SQL?
Ans.

Use a subquery to find the second highest salary from a table in SQL.

  • Use a subquery to select the maximum salary from the table.

  • Then use another subquery to select the maximum salary that is less than the maximum salary found in the first subquery.

Asked in CGI Group

6d ago
Q. What is a pipe in operating systems, and when is it used?
Ans.

A pipe in operating systems is a form of inter-process communication that allows the output of one process to be used as the input of another process.

  • A pipe is a method for passing data between processes in a unidirectional manner.

  • It is typically used when the output of one process needs to be input into another process.

  • Pipes are created using the pipe() system call in Unix-like operating systems.

  • An example of using a pipe is when using the 'ls | grep' command in a Unix shell...read more

Q. How to find odd/even rows in sql, duplicate rows, how to delete duplicate rows, constraints, Joins, Ddl dml, diff truncate/delete

Ans.

SQL queries for finding odd/even rows, duplicates, and deleting duplicates. Also covers constraints, joins, and DDL/DML differences.

  • To find odd/even rows, use the MOD function with a value of 2

  • To find duplicate rows, use the GROUP BY clause with the HAVING clause

  • To delete duplicate rows, use the DELETE statement with a subquery

  • Constraints ensure data integrity by enforcing rules on columns or tables

  • Joins combine data from multiple tables based on a common column

  • DDL (Data Defi...read more

1d ago

Q. What are the most frequently used UNIX commands?

Ans.

Commonly used Unix commands

  • ls - list directory contents

  • cd - change directory

  • mkdir - make directory

  • rm - remove files or directories

  • cp - copy files or directories

  • mv - move or rename files or directories

  • grep - search for patterns in files

  • cat - concatenate and display files

  • chmod - change file permissions

  • ssh - secure shell remote login

2d ago

Q. What is views? difference between table and view?

Ans.

Views are virtual tables that are based on the result of a query. They provide a way to simplify complex queries and restrict access to data.

  • Views are created by selecting columns from one or more tables and can include joins, filters, and calculations.

  • Unlike tables, views do not store data physically, but rather retrieve it dynamically from the underlying tables.

  • Views can be used to present a subset of data to users, hide sensitive information, or simplify complex queries.

  • Ta...read more

Asked in Tek Travels

5d ago

Q. Given a table named 'project', how would you fetch project details where the project name starts with 'a'?

Ans.

Fetch project details where the project name starts with 'A' using SQL query.

  • Use SQL SELECT statement to retrieve data from the 'project' table.

  • Utilize the WHERE clause with the LIKE operator to filter results.

  • Example SQL query: SELECT * FROM project WHERE project_name LIKE 'A%';

  • The '%' wildcard allows for any characters to follow 'A'.

  • Ensure proper indexing on the project_name column for performance.

Asked in CGI Group

1d ago
Q. How do you take a backup of a table in MySQL?
Ans.

To take a backup of a table in MySQL, you can use the mysqldump command.

  • Use the mysqldump command followed by the database name and table name to backup a specific table.

  • Specify the username and password for the MySQL database when using mysqldump.

  • You can also backup multiple tables or the entire database using mysqldump.

  • Save the backup file in a secure location for future restoration if needed.

Asked in CGI Group

1d ago
Q. What are some important Crontab commands used in Linux?
Ans.

Crontab commands are used in Linux for scheduling tasks at specific times.

  • crontab -e: Edit the crontab file

  • crontab -l: List the current crontab entries

  • crontab -r: Remove the current crontab file

  • crontab -u username: Specify the username whose crontab is to be modified

  • */5 * * * * command: Run 'command' every 5 minutes

Asked in CGI Group

4d ago
Q. Can you enlist the basic components of Linux?
Ans.

Basic components of Linux include kernel, shell, commands, utilities, and file system.

  • Kernel - core component that manages hardware resources

  • Shell - interface for users to interact with the system

  • Commands - instructions given to the system for specific tasks

  • Utilities - additional tools for system management

  • File system - structure for organizing and storing data

Asked in Wipro

1d ago

Q. What do you know about the work of an application support engineer?

Ans.

Application Support Engineers are responsible for troubleshooting and resolving technical issues related to software applications.

  • Provide technical support to end-users and clients

  • Identify and resolve software bugs and errors

  • Collaborate with development teams to enhance application functionality

  • Document and maintain knowledge base articles for troubleshooting

  • Monitor application performance and identify areas for improvement

Asked in Amdocs

6d ago
Q. What is meant by normalization and denormalization?
Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. Denormalization is the opposite process.

  • Normalization involves breaking down data into smaller, more manageable tables to reduce redundancy and dependency.

  • Denormalization involves combining tables to improve query performance by reducing the number of joins needed.

  • Normalization helps maintain data integrity by reducing the risk of anomalies such as update, insert, an...read more

Q. What is LVM and why is it required?
Ans.

LVM stands for Logical Volume Manager, used to manage disk space efficiently by allowing for dynamic resizing of volumes.

  • LVM allows for easy resizing of volumes without needing to unmount the filesystem

  • It provides features like striping, mirroring, and snapshots for data management

  • LVM is required for efficient storage management in enterprise environments

Asked in CGI Group

1d ago
Q. What is the '/proc' file system in Linux?
Ans.

The '/proc' file system in Linux is a virtual file system that provides detailed information about the system's hardware, processes, and kernel.

  • It is a virtual file system that exists only in memory and does not correspond to any physical disk storage.

  • It provides real-time information about various system resources such as CPU, memory, processes, and devices.

  • Users can access and manipulate system information by reading from and writing to files within the '/proc' directory.

  • Fo...read more

Asked in CGI Group

1d ago
Q. Write a command to print the lines that contain the word 'july', while ignoring the case.
Ans.

Use grep command with -i flag to print lines containing 'july' ignoring case.

  • Use the following command: grep -i 'july' file.txt

  • Replace 'file.txt' with the actual file name if applicable

  • The -i flag makes the search case-insensitive

Asked in CGI Group

3d ago
Q. Can you explain any 5 essential UNIX commands?
Ans.

Five essential UNIX commands are ls, cd, pwd, mkdir, and rm.

  • ls - list directory contents

  • cd - change directory

  • pwd - print working directory

  • mkdir - make directory

  • rm - remove files or directories

1d ago

Q. Tell all SQL commands which you know

Ans.

Common SQL commands for data manipulation and retrieval

  • SELECT - retrieve data from a table

  • INSERT - insert data into a table

  • UPDATE - update existing data in a table

  • DELETE - delete data from a table

  • CREATE - create a new table or database

  • ALTER - modify the structure of a table

  • DROP - delete a table or database

  • JOIN - combine data from multiple tables

  • GROUP BY - group data based on a specific column

  • ORDER BY - sort data based on a specific column

Asked in Accenture

6d ago

Q. What types of questions are asked in the interview?

Ans.

Interview questions for Application Support Engineer focus on technical skills, problem-solving, and customer service abilities.

  • Technical questions may include troubleshooting scenarios, e.g., 'How would you resolve a database connectivity issue?'

  • Behavioral questions assess teamwork and communication, e.g., 'Describe a time you handled a difficult customer.'

  • Situational questions test problem-solving skills, e.g., 'What steps would you take if an application goes down unexpect...read more

Q. How do you securely move files from one server to another?

Ans.

Use secure file transfer protocols like SFTP or SCP to move files between servers.

  • Use SFTP (SSH File Transfer Protocol) or SCP (Secure Copy Protocol) for secure file transfer.

  • Ensure servers have proper firewall rules and access controls in place.

  • Encrypt files before transferring them to ensure data security.

  • Regularly update software and patches to prevent vulnerabilities.

  • Consider using VPN for added security during file transfer.

Asked in Subex

5d ago

Q. Insert syntax How to delete in SQL. Sql commands

Ans.

SQL delete syntax and commands.

  • Use the DELETE statement followed by the table name.

  • Add a WHERE clause to specify the rows to be deleted.

  • Use the TRUNCATE statement to delete all rows in a table.

  • Use the DROP statement to delete an entire table.

  • Be careful when deleting data as it cannot be recovered.

  • Examples: DELETE FROM table_name WHERE column_name = value;

  • TRUNCATE TABLE table_name;

  • DROP TABLE table_name;

Asked in Subex

3d ago

Q. What is the difference between a clustered index and a non-clustered index?

Ans.

Clustered index determines the physical order of data in a table while non-clustered index creates a separate structure.

  • Clustered index sorts and stores the data rows in the table based on their key values

  • Non-clustered index creates a separate structure that contains the key values and a pointer to the data row

  • A table can have only one clustered index while multiple non-clustered indexes can be created

  • Clustered index is faster for retrieving large amounts of data while non-cl...read more

4d ago

Q. What do you mean by indices?why it is use?

Ans.

Indices are values that point to specific data within a data structure. They are used to access and manipulate data efficiently.

  • Indices are commonly used in arrays to access specific elements.

  • They can also be used in databases to improve search performance.

  • Indices can be created on columns in a table to speed up queries.

  • In programming, indices are often used in loops to iterate over data structures.

  • Indices can also be used in mathematical operations, such as calculating the a...read more

4d ago

Q. Create a table containing 3-4 columns.

Ans.

A table with 3-4 columns is created to store and organize data in a structured manner.

  • Columns represent different attributes or properties of the data.

  • Each row in the table represents a unique record or entry.

  • Columns can have different data types such as text, numbers, dates, etc.

  • Primary key column can be used to uniquely identify each record.

  • Foreign key columns can establish relationships between tables.

  • Example: A table for customer data may have columns like 'ID', 'Name', '...read more

1
2
3
4
5
6
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Accenture Logo
3.8
 • 8.6k Interviews
Wipro Logo
3.7
 • 6.1k Interviews
Tech Mahindra Logo
3.5
 • 4.1k Interviews
HCLTech Logo
3.5
 • 4.1k Interviews
View all

Top Interview Questions for Application Support Engineer Related Skills

interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Application Support Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits