Senior Technical Associate
40+ Senior Technical Associate Interview Questions and Answers

Asked in Genpact

Q. What about DNS, query, zones, records, stub zone, PTR, Point record, how many record we can create manually in DNS server, File server, Quota Policy, DHCP, Scope, Subnet, Subnetting, IP ranges, Protocol, OSI Mo...
read moreTechnical questions related to DNS, File server, Quota Policy, DHCP, Subnetting, IP ranges, Protocol, OSI Model, topology.
DNS: query, zones, records, stub zone, PTR, Point record, manually creating records
File server: managing files and folders, permissions, sharing
Quota Policy: setting limits on disk space usage
DHCP: assigning IP addresses to devices on a network
Subnetting: dividing a network into smaller subnetworks
IP ranges: specifying a range of IP addresses for a network...read more

Asked in Genpact

Q. Active Directory, How to migrate AD from legacy server to new server, how to take backup of active directory, what is FSMO, what is master roles, what is responsibility of roles, how many partition make in AD d...
read moreMigrating AD involves backing up and restoring data, transferring FSMO roles, and creating partitions in the AD database.
To migrate AD, first backup the data on the legacy server and restore it on the new server.
Transfer FSMO roles to the new server to ensure it has the necessary authority.
Create partitions in the AD database to organize and manage data more efficiently.
FSMO stands for Flexible Single Master Operations and includes five roles: Schema Master, Domain Naming Mas...read more

Asked in Genpact

Q. How to upgrade windows from user end, what about antivirus, encryption, primary and logical partition, pst or ost, different between switch and gateway
To upgrade Windows, user needs to consider antivirus, encryption, partitioning, and data backup. Switch and gateway are different networking devices.
Before upgrading, backup important data and create a system restore point.
Disable antivirus and encryption software temporarily.
Check if the system has enough space and compatible hardware for the upgrade.
Primary partition contains the operating system while logical partition is used for data storage.
PST and OST files are used by...read more

Asked in Bank of America

Q. How can you measure exactly 4 liters of water using only a 3-liter bucket and a 5-liter bucket?
Measure 4ltr exactly with a 3ltr and 5ltr bucket.
Fill the 5ltr bucket completely
Pour the 5ltr bucket into the 3ltr bucket, leaving 2ltr in the 5ltr bucket
Empty the 3ltr bucket
Pour the remaining 2ltr from the 5ltr bucket into the 3ltr bucket
Fill the 5ltr bucket again
Pour water from the 5ltr bucket into the 3ltr bucket until it is full
Now, there will be 4ltr of water in the 5ltr bucket

Asked in BA Continuum

Q. Write a program to convert a number given in words to its numeral representation. For example, if the input is 'three million four hundred fifty six thousand three hundred thirty five', the output should be 345...
read moreConvert a number in words to its numeral form.
Split the input string into words
Create a dictionary mapping words to their numerical values
Iterate through the words and add up the numerical values
Return the final sum as a string

Asked in BA Continuum

Q. Write a program to print all numbers from 1 to n that are divisible by both 2 and 7.
Print all numbers from 1 to n that are divisible by 2 and 7.
Use a loop to iterate from 1 to n
Check if the current number is divisible by 2 and 7 using the modulo operator
If the number is divisible by both 2 and 7, print it
Senior Technical Associate Jobs



Asked in Bank of America

Q. Reverse a string with pointers and with least time complexity.
Reverse a string using pointers with least time complexity.
Use two pointers, one pointing to the start of the string and the other pointing to the end.
Swap the characters at the two pointers and move the pointers towards each other until they meet in the middle.
Continue swapping until the entire string is reversed.

Asked in Goldman Sachs

Q. Can Outlook .pst or .ost files become corrupt, and if so, how would you recover them?
Yes, Outlook .pst or .ost files can get corrupt. Recovery can be done using scanpst.exe or third-party tools.
Corruption can occur due to various reasons such as sudden shutdown, virus attack, or oversized file.
Scanpst.exe is a built-in tool in Outlook that can be used to repair minor corruption issues.
For major corruption issues, third-party tools like Stellar Repair for Outlook can be used.
It is important to regularly backup .pst or .ost files to avoid data loss.
Share interview questions and help millions of jobseekers 🌟

Asked in Goldman Sachs

Q. How do you set up a system or provide client support?
To setup a system or provide support to clients, one needs to have technical knowledge and communication skills.
Understand the client's requirements and provide solutions accordingly
Install and configure hardware and software components
Provide training and support to clients
Troubleshoot and resolve technical issues
Maintain documentation and keep track of system updates
Communicate effectively with clients and team members

Asked in Innovaccer

Q. How many automated tools have you worked with to date?
I have worked with 5 automated tools till date.
I have experience working with Selenium for web automation
I have used Appium for mobile automation
I have worked with JMeter for performance testing
I have experience with Jenkins for continuous integration
I have used Postman for API testing

Asked in MetLife

Q. What is the software testing life cycle? Explain it.
Testing life cycle is a process of testing software from planning to deployment.
It includes planning, designing, executing, and reporting.
It starts with the identification of requirements and ends with the deployment of the software.
It helps to ensure that the software meets the desired quality standards.
It involves various types of testing such as unit testing, integration testing, system testing, and acceptance testing.
It also includes bug tracking and fixing.
It is an itera...read more

Asked in Innovaccer

Q. How many email campaigns do you run on a daily basis?
I do not run email campaigns on a daily basis as my role does not involve marketing activities.
My role as a Senior Technical Associate does not involve running email campaigns
My focus is on technical tasks such as software development and troubleshooting
If there are any email campaigns that need technical support, I may assist in that aspect
However, I do not have any direct involvement in the planning or execution of email campaigns

Asked in Genpact

Q. What is router , what is networking layers , windows patching,
A router is a networking device that forwards data packets between computer networks. Networking layers refer to the OSI model which defines the different levels of communication in a network. Windows patching refers to the process of updating and fixing vulnerabilities in the Windows operating system.
A router is a hardware device that connects multiple networks and routes data packets between them.
Networking layers refer to the OSI model which consists of seven layers (Physi...read more

Asked in BA Continuum

Q. What are the steps in the waterfall model?
Waterfall model is a linear sequential approach to software development.
Requirements gathering and analysis
Design
Implementation
Testing
Deployment
Maintenance

Asked in Tech Mahindra

Q. How would you troubleshoot a router?
To troubleshoot a router, start by checking physical connections, rebooting the router, checking for firmware updates, and analyzing network settings.
Check physical connections to ensure everything is properly connected
Reboot the router to see if that resolves the issue
Check for firmware updates and install if necessary
Analyze network settings to identify any potential issues

Asked in Amazon

Q. What is smoke testing?
Smoke testing is a preliminary testing technique to check if the software build is stable enough for further testing.
Smoke testing is a type of non-exhaustive testing.
It is performed to ensure that the critical functionalities of the software are working fine.
It is usually done after a new build is deployed to check if it is stable enough for further testing.
Smoke testing is a quick and easy way to catch major issues early on in the testing process.
Examples of smoke tests inc...read more

Asked in Tata Steel

Q. What do you mean by Networking?
Networking refers to the process of connecting devices and systems to share information and resources.
Networking involves the use of hardware and software to establish connections between devices and systems.
Networking allows for the sharing of information and resources, such as files, printers, and internet access.
Networking can be done through various methods, including wired and wireless connections.
Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth...read more

Asked in BA Continuum

Q. Explain the approach used in the previous problem.
I need more context on the previous problem to provide an answer.
Please provide more information on the previous problem
Without context, I cannot provide an answer

Asked in Eviden

Q. Use of important date, future,added after, cancellation reports
Important date, future, added after, and cancellation reports are used for tracking and managing events and changes.
Important date reports help track significant dates such as project deadlines or product launch dates.
Future reports provide insight into upcoming events and can help with resource planning.
Added after reports track changes made after a certain date, which can be useful for auditing purposes.
Cancellation reports track cancelled events or orders and can help with...read more

Asked in Granules India Limited

Q. What is the packing process flow?
The packing process flow involves receiving, sorting, packing, labeling, and shipping products.
Receive products from production or suppliers
Sort products based on order requirements
Pack products into appropriate packaging
Label packages with necessary information
Ship packages to customers or distribution centers
Asked in Rendered Ideas Softgame

Q. What is the bug life cycle?
Bug life cycle refers to the stages a bug goes through from discovery to resolution.
Bug is discovered and reported
Bug is assigned to a developer
Developer reproduces the bug
Developer fixes the bug
Bug is tested and verified as fixed
Bug is closed

Asked in Gail Gas

Q. What is the process of laying a steel pipeline?
The process of laying steel pipelines involves planning, trenching, welding, coating, lowering into the trench, backfilling, and testing for leaks.
Plan the route of the pipeline and obtain necessary permits
Excavate a trench along the planned route
Weld the sections of steel pipe together
Coat the pipeline to prevent corrosion
Lower the pipeline into the trench using specialized equipment
Backfill the trench to cover the pipeline
Test the pipeline for leaks before putting it into s...read more

Asked in DANA Graziano India

Q. What is an internal diameter check point?
An internal diameter checkpoint ensures the correct measurement of a pipe's inner diameter for quality control.
Used in manufacturing to verify dimensions of pipes and tubes.
Ensures that the internal diameter meets specified tolerances.
Example: A pipe with a specified internal diameter of 50mm must be checked to ensure it is not less than 49.5mm.
Helps prevent issues in fluid dynamics and flow rates in engineering applications.
Can be part of automated quality control systems in...read more

Asked in BA Continuum

Q. Explain different data types in Python.
Python supports various data types including numeric, string, boolean, list, tuple, set, and dictionary.
Numeric data types include integers, floats, and complex numbers.
String data type is used to represent text.
Boolean data type has two values: True and False.
List is a collection of ordered and changeable elements.
Tuple is a collection of ordered and unchangeable elements.
Set is a collection of unordered and unindexed elements.
Dictionary is a collection of key-value pairs.
Ex...read more
Asked in Dharaksha Ecosolutions

Q. What is the difference between a two-stroke and a four-stroke engine?
Two-stroke engines have one power stroke per revolution, while four-stroke engines have one power stroke every two revolutions.
Two-stroke engines have a simpler design with fewer moving parts compared to four-stroke engines.
Two-stroke engines require a fuel-oil mixture for lubrication, while four-stroke engines have a separate oil system.
Two-stroke engines are lighter and more compact, making them ideal for applications where weight and size are critical.
Four-stroke engines a...read more

Asked in Cognizant

Q. Describe the MicroStrategy Architecture.
MicroStrategy Architecture is a multi-tiered architecture that consists of various components.
It consists of three main components: Intelligence Server, Web Server, and Database Server.
Intelligence Server is responsible for processing and analyzing data.
Web Server provides a user interface for accessing and interacting with data.
Database Server stores the data that is being analyzed.
MicroStrategy Architecture also includes other components like Mobile Server, Transaction Serv...read more

Asked in Tech Mahindra

Q. How do you troubleshoot Windows?
Troubleshooting Windows involves identifying and resolving issues with the operating system.
Check for error messages in Event Viewer
Run Windows Update to ensure system is up to date
Use System File Checker (sfc /scannow) to check for and repair corrupted system files
Restart the computer to see if the issue resolves itself
Check for driver updates and install if necessary

Asked in Eviden

Q. Types of reports in corporate actions
Corporate actions reports include entitlement, mandatory, voluntary, and optional reports.
Entitlement reports show the number of shares or securities a shareholder is entitled to receive.
Mandatory reports are required by law and include information on stock splits, mergers, and acquisitions.
Voluntary reports are optional and include information on tender offers and exchange offers.
Optional reports include information on dividend reinvestment plans and shareholder rights plans...read more

Asked in HCLTech

Q. What is Active Directory?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
It stores information about network resources such as computers, users, and groups.
It provides authentication and authorization services for Windows-based computers.
It allows administrators to manage and deploy software, policies, and updates to network resources.
It uses a hierarchical structure of domains and organizational units (OUs) to organize network resources.
It supports integrat...read more

Asked in Virtusa Consulting Services

Q. Explain agile methodology.
Agile methodology is an iterative approach to software development that emphasizes flexibility and customer satisfaction.
Agile values individuals and interactions over processes and tools
It emphasizes working software over comprehensive documentation
Agile teams work in short iterations called sprints
Customer feedback is incorporated throughout the development process
Examples of agile methodologies include Scrum, Kanban, and Extreme Programming
Interview Questions of Similar Designations
Interview Experiences of Popular Companies






Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary


Reviews
Interviews
Salaries
Users

