Assistant Manager Information Technology

10+ Assistant Manager Information Technology Interview Questions and Answers

Updated 29 Sep 2024
search-icon

Q1. process of Pr to Po cycle Server and which servers do u work

Ans.

The Pr to Po cycle involves the process of converting a purchase request (Pr) into a purchase order (Po) for server procurement.

  • The Pr is generated by the requester and contains details of the required server.

  • The Pr is then reviewed and approved by the relevant authority.

  • The approved Pr is converted into a Po by the procurement team.

  • The Po contains details of the server to be procured and is sent to the vendor.

  • The vendor confirms the order and delivers the server to the organ...read more

Q2. Do you know about Zero trust architecture if yes please explain

Ans.

Zero trust architecture is a security model that eliminates the idea of trust based on network location.

  • Zero trust assumes that threats could be both inside and outside the network.

  • It requires strict identity verification for anyone trying to access resources.

  • Access controls are based on the principle of least privilege.

  • Network segmentation is a key component of zero trust architecture.

  • Examples of zero trust architecture solutions include Google's BeyondCorp and Microsoft's Z...read more

Q3. What is osi layers and their function?

Ans.

OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

  • Physical Layer: Deals with physical connections and transmission of raw data.

  • Data Link Layer: Manages data frames and error detection/correction.

  • Network Layer: Handles routing and logical addressing.

  • Transport Layer: Ensures end-to-end communication and data flow control.

  • Session Layer: Manages sessions betwe...read more

Q4. What is routers and their types?

Ans.

Routers are networking devices that forward data packets between computer networks. Types include wired, wireless, core, edge, and virtual routers.

  • Routers are used to connect multiple networks together

  • Wired routers use physical cables to connect devices

  • Wireless routers use Wi-Fi to connect devices

  • Core routers are used in the backbone of the network

  • Edge routers connect the network to external networks

  • Virtual routers are software-based routers used in virtualized environments

Are these interview questions helpful?

Q5. What is switch and their types?

Ans.

A switch is a networking device that connects devices on a local area network (LAN) and forwards data packets between them.

  • Types of switches include managed switches, unmanaged switches, and layer 2/layer 3 switches.

  • Managed switches allow for configuration and monitoring of network traffic.

  • Unmanaged switches are plug-and-play devices with no configuration options.

  • Layer 2 switches operate at the data link layer and use MAC addresses to forward data.

  • Layer 3 switches operate at ...read more

Q6. What is file server and how to configure wifi router

Ans.

A file server is a computer that stores and manages files for multiple users on a network. Configuring a wifi router involves setting up network security and access controls.

  • A file server is a central location for storing and managing files on a network

  • It allows multiple users to access and share files

  • File servers can be configured with different levels of access control and security measures

  • Configuring a wifi router involves setting up network security protocols such as WPA2...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. What difference between ECC and SAP DBM?

Ans.

ECC is an ERP system while SAP DBM is a database management system used by SAP for automotive industry.

  • ECC stands for Enterprise Central Component and is an ERP system used for managing business processes.

  • SAP DBM stands for SAP Dealer Business Management and is a database management system specifically designed for the automotive industry.

  • ECC is a comprehensive system that integrates various business functions like finance, HR, sales, etc.

  • SAP DBM focuses on managing dealer op...read more

Q8. What is the AD and DHCP and domain

Ans.

AD is Active Directory, a directory service used to manage computers and users in a network. DHCP is Dynamic Host Configuration Protocol, a protocol used to assign IP addresses to devices. A domain is a group of computers and users that share a common security policy.

  • AD is used to manage users, computers, and other resources in a network

  • DHCP assigns IP addresses to devices on a network

  • A domain is a logical group of computers and users that share a common security policy

  • AD and...read more

Assistant Manager Information Technology Jobs

Enabling Areas - ML Ops - AM - Information Technology 2-7 years
Deloitte Shared Services India Pvt. Ltd
3.8
Mumbai
Enabling Areas - AD & IAM - AM - Information Technology 2-7 years
Deloitte Shared Services India Pvt. Ltd
3.8
Mumbai
Enabling Areas - Power Bi - AM - Information Technology 3-8 years
Deloitte Shared Services India Pvt. Ltd
3.8
Mumbai

Q9. What is network and networking?

Ans.

Network is a collection of computers and other devices connected together to share resources and information.

  • Network refers to the infrastructure that allows devices to communicate with each other.

  • Networking involves the process of connecting devices within a network to enable communication.

  • Examples of networks include LAN (Local Area Network), WAN (Wide Area Network), and the internet.

Q10. What can you improve ETC operation

Ans.

To improve ETC operation, I would focus on streamlining processes, enhancing system performance, and improving user experience.

  • Implement automation to reduce manual tasks and improve efficiency

  • Optimize network infrastructure to enhance system performance

  • Upgrade software and hardware to ensure compatibility and reliability

  • Enhance cybersecurity measures to protect sensitive data

  • Provide training and support to users for better utilization of ETC system

  • Implement user-friendly int...read more

Q11. In sql server trigger and stored procedures

Ans.

Triggers and stored procedures are used in SQL Server for automating tasks and enforcing data integrity.

  • Triggers are automatically executed in response to certain events, such as insert, update, or delete operations on a table.

  • Stored procedures are precompiled SQL statements that can be executed with parameters.

  • Triggers can be used to enforce business rules or maintain data integrity, while stored procedures can be used for complex data manipulation or business logic.

  • Triggers...read more

Q12. What is Recall process?

Ans.

Recall process is the procedure of retrieving and replacing defective products from the market.

  • Recall process is initiated when a product is found to be defective or potentially harmful to consumers.

  • It involves notifying the public, retailers, and distributors about the recall.

  • The defective products are then retrieved from the market and replaced with safe ones.

  • Recall process is crucial for maintaining consumer safety and trust in the brand.

  • Examples include automobile recalls...read more

Q13. Structure of current company Infra setup

Ans.

The current company infra setup consists of a hybrid cloud environment with on-premises servers and cloud services.

  • Hybrid cloud environment with a mix of on-premises servers and cloud services

  • Utilization of virtualization technologies for server consolidation and resource optimization

  • Implementation of network security measures such as firewalls, VPNs, and intrusion detection systems

  • Regular backups and disaster recovery plans in place

  • Monitoring tools for performance and availa...read more

Q14. How CRM integrated with DBM.

Ans.

CRM can be integrated with a Database Management System (DBMS) by syncing customer data between the two systems.

  • Use APIs to connect CRM and DBMS for data synchronization

  • Map fields in CRM to corresponding tables in DBMS

  • Automate data transfer processes for real-time updates

  • Utilize CRM plugins or extensions for seamless integration

Q15. How to setup Backup process

Ans.

Setting up a backup process involves determining backup frequency, selecting backup storage, implementing backup software, and testing backups regularly.

  • Determine backup frequency based on data criticality and frequency of changes

  • Select appropriate backup storage such as external hard drives, cloud storage, or network-attached storage (NAS)

  • Implement backup software like Veeam, Acronis, or Backup Exec

  • Set up automated backup schedules to ensure regular backups

  • Test backups regul...read more

Q16. what is NetBIOS Protocol

Ans.

NetBIOS Protocol is a legacy networking protocol used for communication between computers on a LAN.

  • NetBIOS stands for Network Basic Input/Output System

  • It was developed by IBM in the 1980s

  • It uses a broadcast method for communication

  • It is commonly used with the SMB protocol for file and printer sharing

  • It has been largely replaced by newer protocols such as TCP/IP

Q17. Functional flow OF HIS

Ans.

The functional flow of HIS refers to the process of how a hospital information system operates.

  • The HIS receives patient data from various sources such as registration, laboratory, and radiology.

  • The data is then stored in a central database and can be accessed by authorized personnel.

  • The HIS also includes modules for billing, scheduling, and inventory management.

  • The system generates reports and analytics to aid in decision-making.

  • The HIS must comply with regulatory requirement...read more

Q18. what is FQDN

Ans.

FQDN stands for Fully Qualified Domain Name.

  • FQDN is a complete domain name that specifies the exact location of a website or server in the internet.

  • It includes the hostname, domain name, and top-level domain (TLD).

  • For example, www.example.com is an FQDN.

  • FQDNs are used to uniquely identify websites and servers on the internet.

  • They are important for DNS resolution and network communication.

Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Assistant Manager Information Technology Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter