Production Support Analyst

30+ Production Support Analyst Interview Questions and Answers

Updated 18 Oct 2024
search-icon

Q1. Write a query using below data to find out last string from emp table?

Ans.

Query to find last string from emp table

  • Use the ORDER BY clause with DESC keyword to sort the table in descending order

  • Use the LIMIT keyword to limit the result to 1 row

  • Assuming the last string refers to the last row in the table

Q2. What is the command to get the value present at 80th row , 100th column?

Ans.

To get the value present at 80th row, 100th column, you can use the command 'awk' in Unix/Linux systems.

  • Use the 'awk' command with the syntax 'awk 'NR==80 {print $100}' filename' to get the value at the specified row and column.

  • Replace 'filename' with the actual file name where the data is stored.

  • Ensure that the row and column numbers are adjusted based on the indexing starting from 1 in 'awk'.

Production Support Analyst Interview Questions and Answers for Freshers

illustration image

Q3. What is the command to search a file like test.txt in linux?

Ans.

The command to search a file like test.txt in Linux is 'grep'.

  • Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.

  • For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.

Q4. How to check if any job failed & steps. Concept of ITIL

Ans.

To check if any job failed, we can use monitoring tools and logs. ITIL recommends incident management process.

  • Use monitoring tools like Nagios, Zabbix, etc. to check job status

  • Check logs for any error messages or exceptions

  • ITIL recommends following the incident management process to resolve the issue

  • Incident management process includes identifying, logging, categorizing, prioritizing, diagnosing, resolving, and closing the incident

Are these interview questions helpful?

Q5. What is difference between hashmap and concurrent hashmap

Ans.

HashMap is not thread-safe while ConcurrentHashMap is thread-safe.

  • HashMap is not thread-safe and can lead to ConcurrentModificationException if modified while iterating.

  • ConcurrentHashMap allows concurrent modifications without the need for external synchronization.

  • ConcurrentHashMap achieves thread-safety by dividing the map into segments, allowing multiple threads to operate on different segments concurrently.

  • ConcurrentHashMap is preferred for multi-threaded environments wher...read more

Q6. What is the diff between constructor and method in java

Ans.

Constructor is a special type of method used to initialize objects, while a method is a block of code that performs a specific task.

  • Constructor is called when an object is created, while a method is called to perform a specific task.

  • Constructors do not have a return type, while methods have a return type.

  • Constructors have the same name as the class, while methods can have any name.

  • Example: Constructor - public ClassName() { // constructor code } Method - public void methodNam...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. What is the difference between PL SQL AND SQL?

Ans.

PL/SQL is a procedural language extension to SQL used for writing complex queries and programs.

  • SQL is used for querying and manipulating data in a database

  • PL/SQL is used for writing complex queries and programs

  • PL/SQL is a procedural language that extends SQL with programming constructs like loops and conditional statements

  • PL/SQL is used to create stored procedures, functions, and triggers in Oracle databases

Q8. If you are using linux then tell me 10 commands in your daily work

Ans.

10 commonly used Linux commands in daily work

  • ls - list directory contents

  • cd - change directory

  • grep - search for a pattern in a file

  • tail - display the last part of a file

  • cat - concatenate and display files

  • chmod - change file permissions

  • sudo - execute a command as a superuser

  • ps - display information about running processes

  • kill - terminate a process

  • ssh - connect to a remote server securely

Production Support Analyst Jobs

S2RL Production Support Analyst 5-8 years
Infosys Limited
3.7
Ahmedabad
Production Support Analyst 0-1 years
Softeon
4.1
Chennai
Production Support Analyst 3-8 years
HotelHub
3.9
Bangalore / Bengaluru

Q9. What is incident management and problem management

Ans.

Incident management involves resolving incidents to restore normal service operation, while problem management focuses on identifying and addressing the root cause of recurring incidents.

  • Incident management is the process of managing and resolving incidents to restore normal service operation as quickly as possible.

  • Problem management involves identifying the root cause of incidents and implementing permanent solutions to prevent them from recurring.

  • Incident management focuses...read more

Q10. How to check which file is taking in space in system

Ans.

To check which file is taking up space in the system, you can use commands like du, df, and find.

  • Use 'du' command to display disk usage of files and directories

  • Use 'df' command to display disk space usage of file systems

  • Use 'find' command to search for files based on size

Q11. what is internal workflow for the BFSI domain?

Ans.

Internal workflow for BFSI domain involves processes related to banking, financial services, and insurance.

  • Customer onboarding and account setup

  • Transaction processing and monitoring

  • Risk management and compliance checks

  • Customer support and issue resolution

  • Data analysis and reporting

Q12. What will you do when application gets crashed

Ans.

I will investigate the root cause of the crash, analyze logs, and work on resolving the issue to restore application functionality.

  • Check application logs for error messages

  • Identify the root cause of the crash

  • Work with development team to troubleshoot and fix the issue

  • Implement temporary workaround if needed

  • Test the application thoroughly before restoring it to production

Q13. what are all the clauses available in sql

Ans.

SQL clauses are used to perform specific actions in a SQL query.

  • SELECT: retrieves data from a database

  • FROM: specifies the table(s) to retrieve data from

  • WHERE: filters the data based on specified conditions

  • GROUP BY: groups the data based on specified columns

  • HAVING: filters the grouped data based on specified conditions

  • ORDER BY: sorts the data based on specified columns

  • JOIN: combines rows from multiple tables based on related columns

  • INSERT INTO: inserts new data into a table

  • UPD...read more

Q14. What are the RDBMS and list few

Ans.

RDBMS stands for Relational Database Management System. It is a type of database management system that stores data in a structured format.

  • Examples of RDBMS include MySQL, Oracle Database, SQL Server, PostgreSQL, and SQLite.

  • RDBMS use tables to store data and relationships between different tables to organize data.

  • They support SQL (Structured Query Language) for querying and managing data.

  • ACID properties (Atomicity, Consistency, Isolation, Durability) are maintained in RDBMS t...read more

Q15. Write s query to find maximum salary from EMP?

Ans.

Query to find maximum salary from EMP

  • Use the MAX() function to find the maximum salary

  • Specify the column name for salary in the SELECT statement

  • Specify the table name and column name for salary in the FROM clause

Q16. Can we override main method in java

Ans.

No, main method in Java cannot be overridden.

  • Main method is a static method of a class and cannot be overridden.

  • Subclasses can have their own main method, but it will not be considered as the entry point of the program.

  • Example: public class SubClass extends MainClass { public static void main(String[] args) { // This is not the entry point of the program }}

Q17. What is internal working of hashmap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.

  • If multiple key-value pairs hash to the same index, they are stored in a linked list at that index.

  • To retrieve a value, the key is hashed again to find the corresponding index ...read more

Q18. Write a command to replace a string in unix

Ans.

Use the sed command to replace a string in Unix

  • Use the following syntax: sed 's/original_string/new_string/g' filename

  • The 's' flag stands for substitute, 'g' flag stands for global (replace all occurrences)

  • Example: sed 's/hello/goodbye/g' file.txt

Q19. Write the command to find the hidden files in unix

Ans.

Use the 'ls' command with the '-a' flag to find hidden files in Unix.

  • Use the command 'ls -a' to list all files, including hidden files.

  • Hidden files in Unix start with a dot (.) before the file name.

  • Example: 'ls -a' will display all files, including hidden files.

Q20. what do you see on the tree and explain it

Ans.

I see a tree with green leaves, brown trunk, and branches extending outward.

  • Green leaves

  • Brown trunk

  • Branches extending outward

Q21. What is JVM, how it works

Ans.

JVM stands for Java Virtual Machine, it is a virtual machine that enables a computer to run Java programs.

  • JVM is an abstract computing machine that enables a computer to run Java programs

  • It provides a runtime environment in which Java bytecode can be executed

  • JVM manages memory, provides security, and facilitates garbage collection

  • It translates Java bytecode into machine code that can be executed by the computer's processor

Q22. what is Asset in BFSI domain?

Ans.

In the BFSI domain, an asset refers to any valuable item owned by an individual or organization that can be converted into cash.

  • Assets can include cash, investments, real estate, equipment, and intellectual property.

  • In the banking sector, assets can also refer to loans given out to customers.

  • Assets are important for financial institutions as they represent the value of the organization and its ability to generate revenue.

  • Asset management is a key function in the BFSI domain t...read more

Q23. what are the types of index and purpose

Ans.

Types of indexes include clustered, non-clustered, unique, and composite indexes, each serving a different purpose in optimizing database performance.

  • Clustered index: Physically reorders the data in the table based on the index key. Only one clustered index per table.

  • Non-clustered index: Creates a separate structure for the index, containing the key columns and a pointer to the actual data rows.

  • Unique index: Ensures that the indexed columns do not contain duplicate values.

  • Com...read more

Q24. differentiate TRUNCATE , DROP , DELETE

Ans.

TRUNCATE, DROP, and DELETE are SQL commands used to remove data from a table, but they differ in their functionality.

  • TRUNCATE is a DDL command that removes all rows from a table, but keeps the structure intact.

  • DROP is a DDL command that removes an entire table, including its structure and data.

  • DELETE is a DML command that removes specific rows from a table based on a condition.

  • TRUNCATE is faster than DELETE as it doesn't generate any transaction logs.

  • DROP is irreversible and ...read more

Q25. Diff between static and non-static

Ans.

Static variables belong to the class itself, while non-static variables belong to instances of the class.

  • Static variables are shared among all instances of a class

  • Non-static variables are unique to each instance of a class

  • Static variables can be accessed without creating an instance of the class

  • Non-static variables can only be accessed through an instance of the class

Q26. what is stored procedure

Ans.

A stored procedure is a precompiled set of SQL statements that can be executed on demand.

  • Stored procedures are stored in a database and can be called by applications or other stored procedures.

  • They are used to encapsulate and execute complex logic or tasks.

  • Stored procedures can accept input parameters and return output parameters or result sets.

  • They improve performance by reducing network traffic and optimizing query execution.

  • Examples of stored procedures include creating a ...read more

Frequently asked in,

Q27. What is JDK JRE JVM

Ans.

JDK is Java Development Kit, JRE is Java Runtime Environment, and JVM is Java Virtual Machine.

  • JDK includes tools for developing Java applications.

  • JRE provides the libraries and components required to run Java applications.

  • JVM is the runtime environment in which Java bytecode is executed.

  • Example: JDK includes javac compiler, JRE includes Java libraries, JVM interprets bytecode.

Q28. Query in sql for joins

Ans.

SQL query for joins

  • Use JOIN keyword to combine rows from two or more tables based on a related column between them

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Q29. what is constraints?

Ans.

Constraints are limitations or restrictions that affect the design, implementation, or operation of a system.

  • Constraints can be related to time, budget, resources, technology, or regulations.

  • They can impact the functionality, performance, scalability, or security of a system.

  • Examples include budget constraints limiting the purchase of new hardware, time constraints for project deadlines, or regulatory constraints for data privacy.

  • Identifying and managing constraints is import...read more

Q30. what is view in sql?

Ans.

A view in SQL is a virtual table based on the result-set of a SELECT statement.

  • Views are used to simplify complex queries by storing them as virtual tables

  • Views do not store data themselves, but display data from underlying tables

  • Views can be used to restrict access to certain columns or rows of a table

  • Views can be used to join multiple tables and present the data in a single table-like structure

Q31. what are data types

Ans.

Data types are classifications of data that determine the type of values that can be stored and manipulated.

  • Data types define the characteristics of data such as size, range, and operations that can be performed on them.

  • Common data types include integers, floating-point numbers, strings, booleans, and arrays.

  • Examples: int age = 25, float salary = 5000.50, string name = 'John Doe', bool isEmployed = true, int[] numbers = {1, 2, 3}

Q32. what is primary key

Ans.

A primary key is a unique identifier for a record in a database table.

  • Primary key ensures each record in a table is unique.

  • It is used to establish relationships between tables.

  • Primary key can be a single column or a combination of columns.

  • It enforces data integrity and allows efficient data retrieval.

  • Examples of primary keys include social security numbers, email addresses, etc.

Q33. what is ur strength

Ans.

My strength lies in my ability to troubleshoot complex technical issues efficiently and effectively.

  • Strong problem-solving skills

  • Excellent communication skills to work with cross-functional teams

  • Ability to prioritize and manage multiple tasks simultaneously

  • Experience in analyzing logs and identifying root causes

Q34. Basic understaing of Java

Ans.

Java is a popular programming language used for developing applications and software.

  • Java is an object-oriented programming language.

  • It is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).

  • Java is used for developing web applications, mobile apps, and enterprise software.

  • Key concepts in Java include classes, objects, inheritance, and polymorphism.

Q35. Troubleshooting techniques

Ans.

Troubleshooting techniques involve identifying, isolating, and resolving issues in a systematic manner.

  • Gather information about the issue from users or logs

  • Identify the root cause of the problem

  • Isolate the issue to determine the scope of impact

  • Develop a plan to resolve the issue

  • Implement the solution and test to ensure it is fixed

  • Document the troubleshooting process for future reference

Q36. How to list files

Ans.

To list files, use command line tools like ls or dir.

  • Use 'ls' command in Unix/Linux systems to list files in a directory

  • Use 'dir' command in Windows systems to list files in a directory

  • Add options like -l for detailed listing or -a to show hidden files

  • Use wildcards like * to filter files based on patterns

Q37. How to check logs

Ans.

To check logs, use command line tools like tail, grep, and less to view and search through log files.

  • Use 'tail' command to view the last few lines of a log file

  • Use 'grep' command to search for specific keywords or patterns in a log file

  • Use 'less' command to view log files page by page and search for specific content

Q38. Diff between grep and egrep

Ans.

grep is a basic pattern matching tool, while egrep is an extended version with more advanced pattern matching capabilities.

  • grep is a basic command-line utility for searching plain-text data sets for lines that match a regular expression pattern.

  • egrep is an extended version of grep that supports more advanced regular expression patterns.

  • egrep is equivalent to grep -E, which enables extended regular expressions.

  • egrep is more powerful and flexible compared to grep for pattern ma...read more

Q39. Sql query for condition

Ans.

Use SQL query to filter data based on a condition

  • Use WHERE clause to specify the condition

  • Example: SELECT * FROM table_name WHERE column_name = 'value'

  • You can use logical operators like AND, OR, NOT to combine conditions

Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions for Production Support Analyst Related Skills

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.7
 • 7.6k Interviews
3.8
 • 4.8k Interviews
3.8
 • 529 Interviews
3.9
 • 476 Interviews
4.2
 • 180 Interviews
3.6
 • 28 Interviews
2.6
 • 17 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Production Support Analyst Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter