Production Support Analyst

40+ Production Support Analyst Interview Questions and Answers

Updated 2 Jul 2025
search-icon

Q. Write a query to find the last string from the emp table.

Ans.

Query to find last string from emp table

  • Use the ORDER BY clause with DESC keyword to sort the table in descending order

  • Use the LIMIT keyword to limit the result to 1 row

  • Assuming the last string refers to the last row in the table

Asked in CGI Group

3d ago

Q. What command retrieves the value at the 80th row and 100th column?

Ans.

To get the value present at 80th row, 100th column, you can use the command 'awk' in Unix/Linux systems.

  • Use the 'awk' command with the syntax 'awk 'NR==80 {print $100}' filename' to get the value at the specified row and column.

  • Replace 'filename' with the actual file name where the data is stored.

  • Ensure that the row and column numbers are adjusted based on the indexing starting from 1 in 'awk'.

Production Support Analyst Interview Questions and Answers for Freshers

illustration image

Asked in CGI Group

2d ago

Q. What is the command to search for a file named test.txt in Linux?

Ans.

The command to search a file like test.txt in Linux is 'grep'.

  • Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.

  • For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.

Asked in Releventz

4d ago

Q. What is the difference between a constructor and a method in Java?

Ans.

Constructor is a special type of method used to initialize objects, while a method is a block of code that performs a specific task.

  • Constructor is called when an object is created, while a method is called to perform a specific task.

  • Constructors do not have a return type, while methods have a return type.

  • Constructors have the same name as the class, while methods can have any name.

  • Example: Constructor - public ClassName() { // constructor code } Method - public void methodNam...read more

Are these interview questions helpful?

Asked in Xoriant

4d ago

Q. How to check if any job failed & steps. Concept of ITIL

Ans.

To check if any job failed, we can use monitoring tools and logs. ITIL recommends incident management process.

  • Use monitoring tools like Nagios, Zabbix, etc. to check job status

  • Check logs for any error messages or exceptions

  • ITIL recommends following the incident management process to resolve the issue

  • Incident management process includes identifying, logging, categorizing, prioritizing, diagnosing, resolving, and closing the incident

Asked in Incedo

1d ago

Q. What is the difference between a HashMap and a ConcurrentHashMap?

Ans.

HashMap is not thread-safe while ConcurrentHashMap is thread-safe.

  • HashMap is not thread-safe and can lead to ConcurrentModificationException if modified while iterating.

  • ConcurrentHashMap allows concurrent modifications without the need for external synchronization.

  • ConcurrentHashMap achieves thread-safety by dividing the map into segments, allowing multiple threads to operate on different segments concurrently.

  • ConcurrentHashMap is preferred for multi-threaded environments wher...read more

Production Support Analyst Jobs

Pluxee India logo
Production Support Analyst 3-8 years
Pluxee India
4.1
₹ 9 L/yr - ₹ 13 L/yr
Mumbai
DEUTSCHE BANK AG logo
Production Support Analyst, AVP 5-10 years
DEUTSCHE BANK AG
3.9
Bangalore / Bengaluru
Damco logo
Production Support Analyst (5-10 yrs) 5-10 years
Damco
3.8
5d ago

Q. How did you establish a connection between your information and the server?

Ans.

I established a connection by configuring network settings, using appropriate protocols, and verifying server accessibility.

  • Configured network settings such as IP address and subnet mask to ensure proper communication.

  • Used protocols like TCP/IP to establish a reliable connection.

  • Verified server accessibility through ping tests to check connectivity.

  • Utilized tools like SSH or RDP for secure remote access to the server.

  • Monitored logs for any connection errors and resolved them ...read more

1d ago

Q. What is the code for adding additional information to a table?

Ans.

Adding information to a table typically involves using SQL INSERT statements.

  • Use the INSERT INTO statement to add new rows. Example: INSERT INTO table_name (column1, column2) VALUES (value1, value2);

  • You can insert multiple rows at once. Example: INSERT INTO table_name (column1, column2) VALUES (value1, value2), (value3, value4);

  • Ensure data types match the table schema to avoid errors.

  • Use transactions for batch inserts to maintain data integrity.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q. What is the difference between PL/SQL and SQL?

Ans.

PL/SQL is a procedural language extension to SQL used for writing complex queries and programs.

  • SQL is used for querying and manipulating data in a database

  • PL/SQL is used for writing complex queries and programs

  • PL/SQL is a procedural language that extends SQL with programming constructs like loops and conditional statements

  • PL/SQL is used to create stored procedures, functions, and triggers in Oracle databases

Asked in Amdocs

1d ago

Q. If you are using Linux, tell me about 10 commands you use in your daily work.

Ans.

10 commonly used Linux commands in daily work

  • ls - list directory contents

  • cd - change directory

  • grep - search for a pattern in a file

  • tail - display the last part of a file

  • cat - concatenate and display files

  • chmod - change file permissions

  • sudo - execute a command as a superuser

  • ps - display information about running processes

  • kill - terminate a process

  • ssh - connect to a remote server securely

Asked in Cognizant

4d ago

Q. What factors determine the priority of incidents and outages?

Ans.

Factors determining incident and outage priority

  • Impact on business operations

  • Urgency of the issue

  • Number of users affected

  • Potential financial loss

  • SLA agreements

  • Reputation damage

  • Regulatory compliance requirements

Asked in TCS

3d ago

Q. What is the difference between incident management and problem management?

Ans.

Incident management focuses on resolving issues quickly to minimize impact, while problem management focuses on identifying and addressing root causes to prevent future incidents.

  • Incident management is reactive, focusing on restoring services as quickly as possible.

  • Problem management is proactive, focusing on identifying and addressing the root cause of incidents to prevent them from happening again.

  • Incident management is typically handled by the support team, while problem m...read more

Asked in Releventz

5d ago

Q. What is incident management and problem management

Ans.

Incident management involves resolving incidents to restore normal service operation, while problem management focuses on identifying and addressing the root cause of recurring incidents.

  • Incident management is the process of managing and resolving incidents to restore normal service operation as quickly as possible.

  • Problem management involves identifying the root cause of incidents and implementing permanent solutions to prevent them from recurring.

  • Incident management focuses...read more

Asked in FIS

6d ago

Q. How do you check which file is taking up the most space in a system?

Ans.

To check which file is taking up space in the system, you can use commands like du, df, and find.

  • Use 'du' command to display disk usage of files and directories

  • Use 'df' command to display disk space usage of file systems

  • Use 'find' command to search for files based on size

Asked in CGI Group

1d ago

Q. What is the internal workflow for the BFSI domain?

Ans.

Internal workflow for BFSI domain involves processes related to banking, financial services, and insurance.

  • Customer onboarding and account setup

  • Transaction processing and monitoring

  • Risk management and compliance checks

  • Customer support and issue resolution

  • Data analysis and reporting

Asked in Releventz

6d ago

Q. What will you do when the application crashes?

Ans.

I will investigate the root cause of the crash, analyze logs, and work on resolving the issue to restore application functionality.

  • Check application logs for error messages

  • Identify the root cause of the crash

  • Work with development team to troubleshoot and fix the issue

  • Implement temporary workaround if needed

  • Test the application thoroughly before restoring it to production

Asked in Sanmina Sci

4d ago

Q. What are RDBMS, and can you list a few?

Ans.

RDBMS stands for Relational Database Management System. It is a type of database management system that stores data in a structured format.

  • Examples of RDBMS include MySQL, Oracle Database, SQL Server, PostgreSQL, and SQLite.

  • RDBMS use tables to store data and relationships between different tables to organize data.

  • They support SQL (Structured Query Language) for querying and managing data.

  • ACID properties (Atomicity, Consistency, Isolation, Durability) are maintained in RDBMS t...read more

3d ago

Q. What clauses are available in SQL?

Ans.

SQL clauses are used to perform specific actions in a SQL query.

  • SELECT: retrieves data from a database

  • FROM: specifies the table(s) to retrieve data from

  • WHERE: filters the data based on specified conditions

  • GROUP BY: groups the data based on specified columns

  • HAVING: filters the grouped data based on specified conditions

  • ORDER BY: sorts the data based on specified columns

  • JOIN: combines rows from multiple tables based on related columns

  • INSERT INTO: inserts new data into a table

  • UPD...read more

Q. Write a query to find the maximum salary from the EMP table.

Ans.

Query to find maximum salary from EMP

  • Use the MAX() function to find the maximum salary

  • Specify the column name for salary in the SELECT statement

  • Specify the table name and column name for salary in the FROM clause

Asked in Capgemini

1d ago

Q. Can we override the main method in Java?

Ans.

No, main method in Java cannot be overridden.

  • Main method is a static method of a class and cannot be overridden.

  • Subclasses can have their own main method, but it will not be considered as the entry point of the program.

  • Example: public class SubClass extends MainClass { public static void main(String[] args) { // This is not the entry point of the program }}

Asked in Infosys

6d ago

Q. Explain the internal workings of a HashMap.

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where the pair will be stored.

  • If multiple key-value pairs hash to the same index, they are stored in a linked list at that index.

  • To retrieve a value, the key is hashed again to find the corresponding index ...read more

2d ago

Q. How do you schedule a job in Linux using Unix commands?

Ans.

To schedule a job in Linux, use the 'cron' utility to create a cron job.

  • Use the 'crontab -e' command to edit the cron table for the current user.

  • Specify the schedule for the job using the appropriate time and date format.

  • Add the command or script to be executed at the scheduled time.

  • Save and exit the cron table to activate the scheduled job.

6d ago

Q. Write an SQL query to create a table with four parameters.

Ans.

SQL query to create a table with four parameters

  • Use CREATE TABLE statement to create a new table

  • Specify the table name and column names along with their data types

  • Add any constraints or default values as needed

  • Example: CREATE TABLE myTable (id INT, name VARCHAR(50), age INT, salary DECIMAL(10,2))

Asked in Capgemini

1d ago

Q. Write a command to replace a string in Unix.

Ans.

Use the sed command to replace a string in Unix

  • Use the following syntax: sed 's/original_string/new_string/g' filename

  • The 's' flag stands for substitute, 'g' flag stands for global (replace all occurrences)

  • Example: sed 's/hello/goodbye/g' file.txt

1d ago

Q. what do you see on the tree and explain it

Ans.

I see a tree with green leaves, brown trunk, and branches extending outward.

  • Green leaves

  • Brown trunk

  • Branches extending outward

Asked in Capgemini

1d ago

Q. Write the command to find the hidden files in Unix.

Ans.

Use the 'ls' command with the '-a' flag to find hidden files in Unix.

  • Use the command 'ls -a' to list all files, including hidden files.

  • Hidden files in Unix start with a dot (.) before the file name.

  • Example: 'ls -a' will display all files, including hidden files.

Asked in Releventz

5d ago

Q. What is JVM, how it works

Ans.

JVM stands for Java Virtual Machine, it is a virtual machine that enables a computer to run Java programs.

  • JVM is an abstract computing machine that enables a computer to run Java programs

  • It provides a runtime environment in which Java bytecode can be executed

  • JVM manages memory, provides security, and facilitates garbage collection

  • It translates Java bytecode into machine code that can be executed by the computer's processor

Asked in CGI Group

2d ago

Q. What is an asset in the BFSI domain?

Ans.

In the BFSI domain, an asset refers to any valuable item owned by an individual or organization that can be converted into cash.

  • Assets can include cash, investments, real estate, equipment, and intellectual property.

  • In the banking sector, assets can also refer to loans given out to customers.

  • Assets are important for financial institutions as they represent the value of the organization and its ability to generate revenue.

  • Asset management is a key function in the BFSI domain t...read more

Asked in Mage Data

2d ago

Q. What are the types of indexes and their purposes?

Ans.

Types of indexes include clustered, non-clustered, unique, and composite indexes, each serving a different purpose in optimizing database performance.

  • Clustered index: Physically reorders the data in the table based on the index key. Only one clustered index per table.

  • Non-clustered index: Creates a separate structure for the index, containing the key columns and a pointer to the actual data rows.

  • Unique index: Ensures that the indexed columns do not contain duplicate values.

  • Com...read more

2d ago

Q. Differentiate between TRUNCATE, DROP, and DELETE statements.

Ans.

TRUNCATE, DROP, and DELETE are SQL commands used to remove data from a table, but they differ in their functionality.

  • TRUNCATE is a DDL command that removes all rows from a table, but keeps the structure intact.

  • DROP is a DDL command that removes an entire table, including its structure and data.

  • DELETE is a DML command that removes specific rows from a table based on a condition.

  • TRUNCATE is faster than DELETE as it doesn't generate any transaction logs.

  • DROP is irreversible and ...read more

1
2
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Infosys Logo
3.6
 • 7.9k Interviews
Cognizant Logo
3.7
 • 5.9k Interviews
Capgemini Logo
3.7
 • 5.1k Interviews
Reliance Retail Logo
3.9
 • 1.7k Interviews
View all

Top Interview Questions for Production Support Analyst Related Skills

interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Production Support Analyst Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits