System Administrator

300+ System Administrator Interview Questions and Answers

Updated 16 Dec 2024

Popular Companies

search-icon

Q1. 2. What is Cloud Technology. What is Microsoft Intune. If we can manage applications using MAM then why do we need MDM?

Ans.

Cloud technology is the delivery of computing services over the internet. Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) solution.

  • Cloud technology allows users to access data and applications from anywhere with an internet connection.

  • Microsoft Intune is a cloud-based solution that allows organizations to manage mobile devices and applications.

  • MAM allows organizations to manage and secure applications and data on mobile...read more

Q2. 7.A user has received a zip file in Outlook, which is a managed app. Will the user be able to open that zip file?

Ans.

It depends on the app's settings and the user's permissions.

  • If the managed app allows opening zip files and the user has permission to do so, then they can open it.

  • If the app does not allow opening zip files or the user does not have permission, then they cannot open it.

  • The user should check with their IT department or the app's documentation to determine if zip files are allowed.

  • If the zip file contains a potentially harmful file type, the app may block it from being opened.

System Administrator Interview Questions and Answers for Freshers

illustration image

Q3. How to create a Repository file/YUM client Configuration?

Ans.

To create a Repository file/YUM client Configuration, follow these steps:

  • Create a new repository file in the /etc/yum.repos.d/ directory

  • Specify the repository name, base URL, enabled status, and other options in the file

  • Save the file and exit the editor

  • Run 'yum clean all' command to clear the cache

  • Run 'yum repolist' command to verify the repository configuration

Q4. If you have learn anew programing language for this job,what wil do ?

Ans.

I would take the initiative to learn the new programming language as quickly as possible.

  • Research the best resources for learning the language

  • Practice coding in the new language regularly

  • Seek guidance and mentorship from experienced programmers

  • Attend workshops and conferences to enhance knowledge

  • Apply the new language in real-world projects to gain experience

Are these interview questions helpful?

Q5. 3.What is the difference between Passcode and PIN?

Ans.

Passcode and PIN are both used for authentication, but they differ in their length and complexity.

  • A passcode is typically longer than a PIN and can include letters, numbers, and symbols.

  • A PIN is usually a 4-6 digit number.

  • Passcodes are generally considered more secure than PINs.

  • Examples of passcodes include the password for your email account or the code to unlock your phone.

  • Examples of PINs include the code to access your bank account or the PIN to unlock your SIM card.

Q6. How check available physical volumes, Volume groups and Logical Volumes?

Ans.

To check available physical volumes, volume groups, and logical volumes, you can use the 'pvdisplay', 'vgdisplay', and 'lvdisplay' commands.

  • Use 'pvdisplay' command to display information about physical volumes.

  • Use 'vgdisplay' command to display information about volume groups.

  • Use 'lvdisplay' command to display information about logical volumes.

  • These commands provide detailed information about the available physical volumes, volume groups, and logical volumes on the system.

  • You...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. How to Recover the root password if its missed or deleted?

Ans.

To recover root password, boot into single-user mode and reset the password.

  • Reboot the system and press 'e' at the GRUB menu to edit the boot options.

  • Add 'single' or 'init=/bin/bash' to the end of the 'linux' line and press F10 to boot.

  • Run 'passwd' command to reset the root password.

  • Reboot the system and login with the new password.

Q8. what is different IP address range available and specify the range for each class?

Ans.

IP address ranges are divided into classes: A, B, C, D, and E.

  • Class A: 1.0.0.0 to 126.0.0.0

  • Class B: 128.0.0.0 to 191.255.0.0

  • Class C: 192.0.0.0 to 223.255.255.0

  • Class D: 224.0.0.0 to 239.255.255.255

  • Class E: 240.0.0.0 to 255.255.255.255

System Administrator Jobs

System Administrator 3-8 years
Yuzhan Technology India Pvt Ltd, Foxconn Groups
4.0
₹ 4 L/yr - ₹ 8 L/yr
Chennai
CICS System Admin/ Programmer 2-6 years
Wipro Limited
3.7
Pune
System Administrator - IT 4-8 years
Virtusa Consulting Services Pvt Ltd
3.8
Chennai

Q9. What is the difference between Restart and Reload in Services?

Ans.

Restarting a service stops and then starts it again, while reloading a service refreshes its configuration without stopping it.

  • Restarting a service completely stops it and then starts it again

  • Reloading a service refreshes its configuration without stopping it

  • Restarting a service is useful when there are critical changes or issues

  • Reloading a service is useful when only the configuration needs to be updated

Q10. How to check server performance, incase application running on the server performing slow, what will you do ?

Ans.

To check server performance, monitor CPU, memory, disk usage. Use tools like top, htop, iostat. Check logs for errors.

  • Monitor CPU usage with top or htop command

  • Monitor memory usage with free or vmstat command

  • Monitor disk usage with df or iostat command

  • Check logs for errors related to the application

  • Use performance monitoring tools like Nagios or Zabbix

Q11. 8.Can we differ an OS update for an iOS device using an MDM solution? If yes, how can we do so?

Ans.

Yes, we can differ an OS update for an iOS device using an MDM solution.

  • MDM solution allows administrators to control the update process

  • Administrators can choose to delay or skip updates for certain devices

  • This can be done by creating update policies and assigning them to specific devices or groups

  • For example, an organization may choose to delay updates for a few days to ensure compatibility with their internal apps

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspa...read more

Q12. What programming language you know , and can code in ?

Ans.

I am proficient in Python and can code in Java and C++.

  • Proficient in Python, can code in Java and C++

  • Experience in developing web applications using Flask and Django frameworks

  • Familiarity with data analysis libraries like Pandas and Numpy

  • Experience in developing GUI applications using PyQt and Tkinter

  • Knowledge of version control systems like Git and SVN

Q13. If machine display is not showing when you turn on the computer. Then what you will do.? What will be your first step..for rectify the error??

Ans.

Check if the monitor is turned on and connected properly. Restart the computer.

  • Check if the monitor is turned on and connected properly

  • Check if the cables are connected properly

  • Restart the computer

  • Check if the graphics card is working properly

Q14. what are the types of backup and when we do it each of those?

Ans.

There are different types of backups, including full, incremental, and differential backups.

  • Full backup: A complete backup of all data and files.

  • Incremental backup: Only backs up the changes made since the last backup.

  • Differential backup: Backs up all changes made since the last full backup.

  • Scheduled backups: Regularly scheduled backups to ensure data is protected.

  • Offsite backups: Storing backups in a separate location for disaster recovery.

  • Cloud backups: Backing up data to r...read more

Q15. if server down with your employee end and netwoek is down at management end what is your core responsiblity

Ans.

As a system administrator, my core responsibility would be to troubleshoot and resolve the issue as quickly as possible.

  • Identify the root cause of the issue

  • Check for any backups or redundancies that can be used

  • Communicate the issue to management and other relevant parties

  • Work with the team to resolve the issue as quickly as possible

  • Document the issue and the steps taken to resolve it for future reference

Q16. 6.If a device is not enrolled through DEP, can I still block the screen capture feature on an iOS device

Ans.

Yes, it is possible to block screen capture feature on an iOS device even if it is not enrolled through DEP.

  • You can use a mobile device management (MDM) solution to block screen capture feature on iOS devices.

  • MDM solutions like Jamf, Microsoft Intune, and VMware Workspace ONE can help you enforce policies on iOS devices.

  • You can create a policy in your MDM solution to disable the screen capture feature on iOS devices.

  • This policy will apply to all iOS devices that are enrolled ...read more

Q17. What are the tools that will be helpful to you in identifying the problems and solving them?

Ans.

Tools for identifying and solving problems as a System Administrator

  • Monitoring tools like Nagios, Zabbix, and PRTG

  • Log analysis tools like Splunk, ELK Stack, and Graylog

  • Network analysis tools like Wireshark and tcpdump

  • Remote access tools like SSH and RDP

  • Scripting languages like Python and Bash

  • Virtualization tools like VMware and VirtualBox

  • Backup and recovery tools like Veeam and Backup Exec

Q18. What is VPN and what steps do you perform for VPN issues

Ans.

VPN stands for Virtual Private Network, used to securely connect to a private network over the internet.

  • Understand the VPN setup and configuration

  • Check VPN client software for any issues

  • Verify network connectivity and firewall settings

  • Ensure correct VPN credentials are being used

  • Check VPN server logs for any errors

  • Restart VPN services if necessary

Q19. How do you troubleshoot when a working system shut down automatically ?

Ans.

I would check the system logs, hardware components, and power supply to identify the root cause of the shutdown.

  • Check system logs for any error messages or warnings

  • Verify hardware components such as RAM, CPU, and hard drive

  • Check power supply and ensure it is functioning properly

  • Look for any recent changes or updates that may have caused the shutdown

  • Perform stress tests to identify any potential hardware issues

Q20. what is clustering and its types

Ans.

Clustering is the process of grouping similar objects together based on certain criteria.

  • Clustering is used in various fields like data analysis, machine learning, and network management.

  • Types of clustering include hierarchical clustering, k-means clustering, and density-based clustering.

  • Hierarchical clustering creates a tree-like structure of clusters.

  • K-means clustering partitions data into k clusters based on similarity.

  • Density-based clustering groups objects based on their...read more

Q21. What is the full form of SDLC?

Ans.

SDLC stands for Software Development Life Cycle.

  • SDLC is a process used by software development teams to design, develop, and test high-quality software.

  • It consists of several phases including planning, analysis, design, implementation, and maintenance.

  • Each phase has its own set of activities and deliverables that must be completed before moving on to the next phase.

  • SDLC helps ensure that software is developed on time, within budget, and meets the needs of the end-users.

  • Exampl...read more

Q22. what is AD ,Tell me about iso layers,what is tcp/ip.

Ans.

AD is Active Directory, a directory service developed by Microsoft. ISO layers refer to the OSI model, and TCP/IP is a protocol suite.

  • Active Directory is a directory service used to manage resources in a network.

  • ISO layers refer to the Open Systems Interconnection model, which is a conceptual model used to describe network communication.

  • TCP/IP is a protocol suite used for communication between devices on a network.

  • TCP/IP consists of four layers: application, transport, intern...read more

Q23. Could you explain the steps ,how to extending LVM?

Ans.

To extend LVM, follow these steps: 1. Create a new partition. 2. Initialize the partition as a physical volume. 3. Add the physical volume to the volume group. 4. Extend the logical volume. 5. Resize the file system.

  • Create a new partition using tools like fdisk or parted.

  • Initialize the partition as a physical volume using the pvcreate command.

  • Add the physical volume to the volume group using the vgextend command.

  • Extend the logical volume using the lvextend command.

  • Resize the ...read more

Q24. If system is unable to boot then how will you fix it?

Ans.

To fix a system that is unable to boot, you can try troubleshooting steps such as checking hardware connections, running diagnostics, repairing the operating system, or restoring from a backup.

  • Check hardware connections to ensure everything is properly connected

  • Run diagnostics to identify any hardware or software issues

  • Repair the operating system using recovery tools or installation media

  • Restore the system from a backup if available

  • If necessary, seek assistance from technical...read more

Q25. Do you know about DNS DHCP exchange version,office 365.

Ans.

Yes, I am familiar with DNS, DHCP, Exchange version, and Office 365.

  • DNS (Domain Name System) is responsible for translating domain names into IP addresses.

  • DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network.

  • Exchange version refers to the version of Microsoft Exchange Server, which is used for email, calendar, and contacts.

  • Office 365 is a cloud-based suite of productivity tools, including email, calendar, and document collaboration.

  • I have ex...read more

Q26. How do we troubleshoot the bsod issue , slow performance,

Ans.

BSOD and slow performance troubleshooting

  • Check for hardware issues such as faulty RAM or hard drive

  • Update drivers and firmware

  • Scan for malware and viruses

  • Check for overheating

  • Review system logs for errors

  • Disable unnecessary startup programs

  • Perform a clean boot

  • Check for available updates and patches

  • Perform a system restore

  • Reinstall the operating system if necessary

Q27. What is ip address , local user and roaming user , organization unit, Active director domain service, DNS, hyper-v

Ans.

Explanation of IP address, local and roaming users, organization unit, Active Directory Domain Service, DNS, and Hyper-V.

  • IP address is a unique numerical identifier assigned to each device on a network.

  • Local user is a user account that is created on a specific device and can only be used on that device.

  • Roaming user is a user account that can be used on multiple devices within a network.

  • Organization unit is a container object in Active Directory used to organize and manage net...read more

Q28. How to install,update and configure ESXi.

Ans.

ESXi can be installed using ISO or USB. Update using vSphere Update Manager. Configure using vSphere Client or PowerCLI.

  • To install ESXi, download the ISO image and burn it to a CD or create a bootable USB drive. Boot the server from the CD or USB and follow the installation wizard.

  • To update ESXi, use vSphere Update Manager. It can be used to update multiple hosts at once.

  • To configure ESXi, use vSphere Client or PowerCLI. vSphere Client is a GUI tool while PowerCLI is a comman...read more

Q29. How would you present a SAN LUN to Solaris LDOM or CDOM ?

Ans.

To present a SAN LUN to Solaris LDOM or CDOM, we need to follow a few steps.

  • First, we need to identify the SAN LUN and the target LDOM/CDOM.

  • Then, we need to create a logical device using the format command.

  • Next, we need to configure the LUN using the cfgadm command.

  • Finally, we need to add the LUN to the LDOM/CDOM using the ldm add-vdsdev command.

Q30. What would you do in case of Blue screen of death

Ans.

In case of Blue screen of death, I would first try to identify the cause of the issue and then troubleshoot accordingly.

  • Check for any recent hardware or software changes that may have caused the issue

  • Restart the computer and see if the issue persists

  • Run diagnostic tools to check for hardware failures

  • Check for any available Windows updates or driver updates

  • If necessary, restore the system to a previous stable state using System Restore

Q31. What is stack and can we use ROM as stack?

Ans.

Stack is a data structure used to store and retrieve data in a last-in-first-out (LIFO) manner. ROM cannot be used as stack.

  • Stack is a collection of elements with two main operations: push (add element) and pop (remove element).

  • Stack follows the LIFO principle, meaning the last element added is the first one to be removed.

  • Stack can be implemented using arrays or linked lists.

  • ROM (Read-Only Memory) cannot be used as stack because it is a non-volatile memory used for permanent ...read more

Q32. What Oops concepts polymorphism and encapsulation mean , differentiate them

Ans.

Polymorphism and encapsulation are two important OOP concepts. Polymorphism allows objects to take on multiple forms, while encapsulation ensures data security.

  • Polymorphism allows objects to be treated as if they are of different types, depending on the context in which they are used.

  • Encapsulation is the practice of hiding data and methods within a class, so that they cannot be accessed or modified from outside the class.

  • Polymorphism and encapsulation work together to create ...read more

Q33. How to add user and create directory in Linux?

Ans.

To add a user and create a directory in Linux, you can use the 'useradd' command to create the user and 'mkdir' command to create the directory.

  • Use the 'useradd' command followed by the username to create a new user. For example: 'useradd john'

  • To create a directory, use the 'mkdir' command followed by the directory name. For example: 'mkdir /home/john'

  • You can also specify additional options with the 'useradd' command, such as setting the user's home directory or assigning a s...read more

Q34. 4.What is DEP/Apple Business Manager?

Ans.

DEP/Apple Business Manager is a device management solution for Apple devices.

  • DEP stands for Device Enrollment Program, which allows organizations to easily deploy and manage Apple devices.

  • Apple Business Manager is a web-based portal that allows IT administrators to manage devices, apps, and content.

  • With DEP/Apple Business Manager, IT administrators can automate device enrollment, configure settings, and distribute apps and content.

  • This solution is particularly useful for orga...read more

Q35. What are the products of VMware.

Ans.

VMware offers a range of products for virtualization, cloud computing, and software-defined data centers.

  • VMware vSphere - virtualization platform

  • VMware NSX - network virtualization and security platform

  • VMware vSAN - software-defined storage solution

  • VMware Horizon - virtual desktop infrastructure (VDI) solution

  • VMware Cloud Foundation - hybrid cloud infrastructure platform

Q36. How will you edit an existing file on a Linux server?

Ans.

To edit an existing file on a Linux server, you can use a text editor like Vim or Nano.

  • Use a text editor like Vim or Nano to open the file for editing

  • Make the necessary changes to the file

  • Save the changes and exit the text editor

Q37. 5.What is the benefit of using DEP?

Ans.

DEP provides security by preventing execution of malicious code in memory.

  • DEP stands for Data Execution Prevention.

  • It is a security feature in modern operating systems.

  • DEP prevents execution of code in memory regions marked as non-executable.

  • This helps prevent buffer overflow attacks and other types of malware.

  • DEP can be enabled for specific applications or for the entire system.

  • Examples of DEP-enabled applications include Microsoft Office and Internet Explorer.

Q38. How to check how many user are login in Linux server..?

Ans.

To check the number of logged-in users in a Linux server, use the 'who' or 'w' command.

  • Use the 'who' command to display information about currently logged-in users.

  • Use the 'w' command to get detailed information about logged-in users, including idle time and processes.

  • Both commands provide the username, terminal, login time, and IP address of the logged-in users.

  • You can also use the 'users' command to simply list the usernames of logged-in users.

Q39. What is command to see task running on your linux server.?

Ans.

The command to see tasks running on a Linux server is 'top'.

  • The 'top' command displays real-time information about processes running on the server.

  • It provides details such as process ID, CPU usage, memory usage, and more.

  • Press 'q' to exit the 'top' command.

  • Use 'top -u username' to filter processes by a specific user.

  • Combine 'top' with other commands like 'grep' to search for specific processes.

Q40. WHAT ARE DIFFERENCES AND SIMILARITY BETWEEN C AND C++?

Ans.

C is a procedural language while C++ is an object-oriented language. C++ is an extension of C.

  • C++ supports classes and objects while C does not.

  • C++ has better support for polymorphism and inheritance than C.

  • C++ has a standard template library (STL) which provides a collection of classes and functions for common programming tasks.

  • C++ is more complex than C and requires more knowledge of object-oriented programming concepts.

  • Both languages are compiled languages and have similar...read more

Q41. Any knowledge on windows servers, what do you know about patching windows, types of servers you know.

Ans.

I have knowledge on patching Windows servers and different types of servers.

  • I am familiar with the process of patching Windows servers to ensure they are up to date with the latest security updates and bug fixes.

  • I am aware of different types of Windows servers such as file servers, web servers, domain controllers, and application servers.

  • I understand the importance of regularly patching servers to protect against vulnerabilities and ensure optimal performance.

Q42. Do you know how to replace drum of a Printer ?

Ans.

Yes, I know how to replace the drum of a printer.

  • First, turn off the printer and unplug it from the power source.

  • Open the printer cover and locate the drum unit.

  • Press the release lever and remove the old drum unit.

  • Unpack the new drum unit and remove any protective coverings.

  • Insert the new drum unit into the printer and secure it with the release lever.

  • Close the printer cover and plug in the power source.

  • Turn on the printer and perform a test print to ensure proper installatio...read more

Q43. How to Install outlook through POP3/IMAP process?

Ans.

Outlook can be installed through POP3/IMAP process by configuring the email account settings in Outlook.

  • Open Outlook and go to File > Add Account

  • Select 'Manual setup or additional server types' and click Next

  • Choose POP or IMAP and enter the email account details

  • Configure the incoming and outgoing server settings

  • Click on 'More Settings' and configure additional settings if required

  • Test the account settings and click Finish to complete the setup

Q44. If my printer is not working then how will you fix this issue

Ans.

I will check the printer connections, troubleshoot the issue, and update drivers if necessary.

  • Check if the printer is turned on and connected to the computer

  • Check if there are any error messages on the printer or computer

  • Restart the printer and computer

  • Update printer drivers if necessary

  • Check if there is enough paper and ink/toner in the printer

Q45. What is the basic requirement to install the WDS server ?

Ans.

The basic requirement to install the WDS server is a Windows Server operating system.

  • Windows Server operating system

  • Sufficient disk space

  • Active Directory Domain Services

  • DHCP server

  • DNS server

Q46. How would you find the IP address of a machine

Ans.

You can find the IP address of a machine by using command line tools or checking network settings.

  • Use the 'ipconfig' command on Windows to find the IP address

  • Use the 'ifconfig' command on Linux or macOS to find the IP address

  • Check network settings in the system preferences or control panel

Q47. What is smtp , Pop 3 and their port numbers

Ans.

SMTP is a protocol used for sending emails, while POP3 is used for receiving emails. They have specific port numbers for communication.

  • SMTP (Simple Mail Transfer Protocol) is used for sending emails

  • POP3 (Post Office Protocol version 3) is used for receiving emails

  • SMTP uses port 25 for communication

  • POP3 uses port 110 for communication

Q48. A clients computer crashed after working on it how would you handle the client

Ans.

I would apologize for the inconvenience and offer to troubleshoot the issue to resolve it.

  • Express empathy and understanding for the client's frustration

  • Assure the client that you will do everything possible to resolve the issue

  • Ask the client about the symptoms and details of the crash

  • Offer to troubleshoot the issue remotely or schedule an onsite visit if necessary

  • Provide regular updates to the client on the progress of the troubleshooting and resolution

Q49. How can a customer update windows 11 on a i7 7700k powered computer

Ans.

Windows 11 can be updated on an i7 7700k powered computer through Windows Update or manually downloading the update from Microsoft's website.

  • Go to Settings > Update & Security > Windows Update and click Check for updates

  • If the update is available, click Download and install

  • Alternatively, download the update manually from Microsoft's website and install it

  • Make sure the computer meets the minimum system requirements for Windows 11

Q50. What are RJ45 and RJ11 connectors?

Ans.

RJ45 and RJ11 connectors are types of connectors used in networking and telecommunications.

  • RJ45 connectors are used for Ethernet connections and have 8 pins.

  • RJ11 connectors are used for telephone connections and have 6 pins.

  • RJ45 connectors are larger in size compared to RJ11 connectors.

  • RJ45 connectors are commonly used in home and office networks.

  • RJ11 connectors are commonly used for landline telephones and DSL connections.

1
2
3
4
5
6
7
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10k Interviews
3.9
 • 7.8k Interviews
3.7
 • 5.2k Interviews
3.6
 • 3.6k Interviews
4.1
 • 2.3k Interviews
3.7
 • 791 Interviews
3.9
 • 463 Interviews
4.0
 • 149 Interviews
4.0
 • 35 Interviews
3.0
 • 33 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

System Administrator Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter