Technical Specialist

100+ Technical Specialist Interview Questions and Answers

Updated 1 Mar 2025

Q51. What is difference in delete and truncate

Ans.

Delete removes rows one by one, while truncate removes all rows at once.

  • Delete is a DML command, while truncate is a DDL command

  • Delete can be rolled back, while truncate cannot be rolled back

  • Delete fires triggers, while truncate does not fire triggers

Q52. 1. What is azure managed resource group

Ans.

Azure Managed Resource Group is a container that holds related resources for an Azure solution.

  • It provides a way to organize and manage resources in Azure.

  • It helps in grouping resources that share the same lifecycle, permissions, and policies.

  • It simplifies resource management by allowing operations on multiple resources at once.

  • It can be used to apply policies and access controls to a set of resources.

  • It enables easier deployment, monitoring, and deletion of resources as a si...read more

Q53. major activity and how we resolved the issue

Ans.

Resolved a major issue by identifying the root cause and implementing a solution

  • Identified the root cause of the issue through thorough analysis

  • Collaborated with cross-functional teams to develop and implement a solution

  • Conducted testing and validation to ensure the solution was effective

  • Provided training and support to end-users to prevent future occurrences

Q54. What is standard object in salesforce

Ans.

Standard objects are pre-built objects in Salesforce that are used to store data and perform actions.

  • Standard objects are included with Salesforce and cannot be deleted.

  • Examples of standard objects include Account, Contact, Lead, Opportunity, and Case.

  • Standard objects can be customized with fields, page layouts, and record types.

  • Standard objects can also be related to each other through lookup and master-detail relationships.

Are these interview questions helpful?

Q55. What is difference between IMA and FMA

Ans.

IMA and FMA are two different types of instruction set architectures used in computer processors.

  • IMA stands for Immediate Addressing Mode, where the operand is a constant value.

  • FMA stands for Floating Point Multiply-Add, which is a type of instruction used in floating point arithmetic.

  • IMA instructions are used for simple arithmetic operations, while FMA instructions are used for complex mathematical operations.

  • IMA instructions are faster than FMA instructions, but FMA instruc...read more

Q56. Define NSSA in OSPF ,E1and E2 route

Ans.

NSSA is a type of OSPF area that allows external routes to be imported as Type 7 LSAs.

  • NSSA stands for Not-So-Stubby Area

  • It is used to connect stub areas to the OSPF backbone

  • NSSA allows external routes to be imported as Type 7 LSAs, which are then translated to Type 5 LSAs by the ABR

  • E1 and E2 routes are two types of external routes that can be imported into OSPF

  • E1 routes have a metric that is added to the OSPF cost, while E2 routes have a fixed metric that is not affected by t...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. Cloud architecture on Iaas, Paas and agentless services.

Ans.

Cloud architecture involves IaaS, PaaS, and agentless services for efficient and scalable solutions.

  • IaaS (Infrastructure as a Service) provides virtualized computing resources over the internet.

  • PaaS (Platform as a Service) offers a platform allowing customers to develop, run, and manage applications without dealing with infrastructure.

  • Agentless services do not require the installation of agents on the target systems, reducing complexity and overhead.

  • Examples: AWS (IaaS), Goog...read more

Q58. What is Recovery mode?

Ans.

Recovery mode is a troubleshooting mode in which a device is booted with minimal resources to fix issues.

  • Recovery mode is used to fix software issues on devices such as smartphones, tablets, and computers.

  • It allows the user to access a limited set of tools and features to diagnose and fix problems.

  • In recovery mode, the device may be able to perform tasks such as wiping the cache partition, factory resetting, or installing updates.

  • To enter recovery mode, the user typically nee...read more

Technical Specialist Jobs

OpenShift AI - Technical Specialist 5-10 years
IBM India Pvt. Limited
4.0
Mumbai
Partner Technical Specialist - Territory (PTS-T) 5-10 years
IBM India Pvt. Limited
4.0
Mumbai
Digital Technical Specialist (DTS) 5-10 years
IBM India Pvt. Limited
4.0
Bangalore / Bengaluru

Q59. Write a SQL query(It could be any question)

Ans.

Write a SQL query to find the total number of orders placed by each customer.

  • Use the GROUP BY clause to group the orders by customer.

  • Use the COUNT function to count the number of orders for each customer.

  • Join the orders table with the customers table to get the customer names.

Q60. How would you do memory management

Ans.

Memory management involves allocating and deallocating memory efficiently to optimize system performance.

  • Use dynamic memory allocation functions like malloc, calloc, and realloc to allocate memory as needed

  • Track memory usage and release unused memory using free function to prevent memory leaks

  • Implement memory pooling or caching to reuse memory blocks and reduce overhead of frequent allocation/deallocation

  • Use memory profiling tools to analyze memory usage patterns and optimize...read more

Q61. Architecture of Kubenetes and command line and troubleshooting steps

Ans.

Kubernetes architecture, command line usage, and troubleshooting steps

  • Kubernetes architecture includes master nodes, worker nodes, and etcd for storing cluster data

  • Use kubectl command line tool to interact with Kubernetes clusters

  • Troubleshooting steps involve checking pod status, logs, and events for errors

  • Common kubectl commands include kubectl get, kubectl describe, and kubectl logs

  • Debugging with kubectl exec to access containers within pods

Q62. How to change thruster brake liners?

Ans.

To change thruster brake liners, follow these steps carefully.

  • Disconnect power to the thruster brake system

  • Remove the cover or housing to access the brake assembly

  • Unscrew and remove the bolts holding the old brake liners in place

  • Replace the old brake liners with new ones

  • Secure the new brake liners in place with bolts

  • Reassemble the cover or housing

  • Reconnect power and test the thruster brake system

Q63. What is switching & routing And more about routing.

Ans.

Switching & routing are key functions in networking. Switching directs data within a network, while routing determines the best path for data to travel.

  • Switching involves forwarding data packets between devices on the same network segment.

  • Routing involves determining the best path for data packets to travel between different networks.

  • Switches operate at Layer 2 of the OSI model, while routers operate at Layer 3.

  • Examples of switches include Ethernet switches, while examples of...read more

Q64. What is the purpose of Host service

Ans.

Host service is a software program that runs in the background and provides services to other programs or devices.

  • Host service is responsible for managing and coordinating communication between different devices or programs.

  • It can provide services such as file sharing, printing, and remote access.

  • Examples of host services include Windows Remote Desktop, Apache web server, and FTP server.

  • Host services can be run on a dedicated server or on a personal computer.

  • They are essentia...read more

Q65. What is threading & how do threads share data

Ans.

Threading is a way for a program to split itself into multiple simultaneous tasks, known as threads, to improve performance.

  • Threads are lightweight processes within a program that can run concurrently

  • Threads can share data by accessing the same memory space

  • Common ways for threads to share data include using shared variables or passing data between threads

Q66. Filters in .Net and when to use

Ans.

Filters in .Net are used to manipulate data before it is displayed or processed further.

  • Filters can be used for data validation, formatting, or transformation.

  • Filters are commonly used in ASP.NET MVC for tasks like authentication, authorization, logging, etc.

  • Filters can be applied globally to all controllers or specific to individual actions.

  • Examples of filters in .Net include AuthorizationFilter, ActionFilter, ResultFilter, ExceptionFilter, etc.

Q67. How does work asi communication

Ans.

ASI communication involves the exchange of data between a computer system and an ASI device.

  • ASI stands for Asynchronous Serial Interface.

  • It is a communication protocol used to transfer data between devices.

  • ASI communication is commonly used in the broadcast industry to transport video and audio signals.

  • It is a reliable and cost-effective method of transmitting data over short distances.

  • ASI devices include encoders, decoders, modulators, and demodulators.

Q68. What is forest in Active Directory?

Ans.

A forest in Active Directory is a collection of domains that share a common schema, configuration, and global catalog.

  • A forest is the top-level structure in Active Directory.

  • It consists of one or more domains that share a common schema, configuration, and global catalog.

  • Each domain within a forest has a two-way transitive trust relationship with every other domain in the forest.

  • Forests are used to group multiple domains together for easier management and administration.

  • Exampl...read more

Q69. How to start outlook in safe mode

Ans.

Outlook can be started in safe mode by holding down the Ctrl key while opening the application.

  • Hold down the Ctrl key on your keyboard

  • Click on the Outlook shortcut to open the application

  • Release the Ctrl key when prompted to start in safe mode

Q70. What is custom object in salesforce

Ans.

Custom object is a Salesforce object created by the user to store data specific to their organization.

  • Custom objects are created using the Object Manager in Salesforce.

  • They can have custom fields, relationships, and page layouts.

  • Examples include a custom object for tracking customer feedback or a custom object for managing project tasks.

  • Custom objects can also be used in Salesforce automation, such as workflows and triggers.

Q71. What is java? What is C?What is C++

Ans.

Java, C, and C++ are programming languages used for software development.

  • Java is an object-oriented language used for developing applications and software.

  • C is a procedural language used for system programming and embedded systems.

  • C++ is an object-oriented language that extends C and is used for developing complex software systems.

  • Java and C++ are both compiled languages, while C can be compiled or interpreted.

  • Java runs on a virtual machine, while C and C++ code is compiled i...read more

Q72. DOF of Industrial Manipulator?

Ans.

The DOF of an industrial manipulator refers to the number of degrees of freedom it has.

  • DOF stands for degrees of freedom.

  • It refers to the number of independent movements a manipulator can make.

  • A 6-DOF manipulator can move in six different directions.

  • The more DOF a manipulator has, the more versatile it is.

  • DOF can be increased by adding more joints or axes to the manipulator.

Q73. Explain the difference between vSS and vDS

Ans.

vSS is a virtual switch that operates at the host level, while vDS is a distributed virtual switch that spans multiple hosts.

  • vSS is a standard virtual switch that is local to a single host.

  • vDS is a distributed virtual switch that allows for centralized management across multiple hosts.

  • vSS does not support advanced features like network I/O control and LACP, while vDS does.

  • vSS is managed per host, while vDS is managed centrally through vCenter Server.

  • vDS provides better scalab...read more

Q74. What are the hurdles for generic launch?

Ans.

Hurdles for generic launch include patent protection, regulatory approval, market competition, and manufacturing challenges.

  • Patent protection for the brand-name drug may delay generic launch.

  • Regulatory approval processes can be lengthy and complex.

  • Market competition from other generics or brand-name drugs can impact success.

  • Manufacturing challenges such as ensuring quality and consistency of the product.

Q75. Creating azure vm mentioning all its steps.

Ans.

Creating an Azure VM involves several steps.

  • Log in to the Azure portal

  • Click on 'Create a resource'

  • Search for 'Windows Server' or 'Linux' depending on your preference

  • Select the appropriate image and size

  • Configure networking and storage options

  • Review and create the VM

  • Wait for the VM to be created and deployed

Q76. SQL query to find entries based on last name

Ans.

Use SELECT statement with WHERE clause and LIKE operator to find entries based on last name.

  • Use SELECT statement to retrieve data from the table.

  • Use WHERE clause to filter the data based on last name.

  • Use LIKE operator with % wildcard to match any characters before or after the last name.

  • Example: SELECT * FROM table_name WHERE last_name LIKE 'Smith%'

Q77. How many minor and major versions

Ans.

The number of minor and major versions depend on the specific software or system being discussed.

  • The number of minor versions typically indicates smaller updates or bug fixes.

  • Major versions usually signify significant changes or new features.

  • For example, a software might have 5 minor versions and 2 major versions.

Q78. What's the biggest hike?

Ans.

The biggest hike I have ever been on was a challenging 10-mile trek up a steep mountain.

  • The biggest hike I have done was a 10-mile trek

  • It was challenging and involved steep terrain

  • The hike took several hours to complete

Q79. Prepare keyword and positional parameters

Ans.

Keyword and positional parameters are used in programming to pass arguments to functions.

  • Keyword parameters allow arguments to be passed by name, making the code more readable and flexible.

  • Positional parameters are passed based on their position in the function call.

  • Example: def greet(name, age): print(f'Hello {name}, you are {age} years old.') greet(age=25, name='John')

  • Example: def greet(name, age): print(f'Hello {name}, you are {age} years old.') greet('John', 25)

Q80. How much range of M12 sensors

Ans.

The range of M12 sensors varies depending on the specific sensor and its application.

  • The range can be affected by factors such as the type of sensor, the environment it is used in, and the material it is detecting.

  • For example, an M12 ultrasonic sensor may have a range of up to 2 meters, while an M12 inductive sensor may have a range of only a few millimeters.

  • It is important to consult the specifications of the specific sensor being used to determine its range.

Q81. explain the windows server version differences

Ans.

Windows Server versions differ in features, capabilities, and support.

  • Different versions include Windows Server 2008, 2012, 2016, and 2019.

  • Newer versions offer improved security, performance, and management tools.

  • Each version may have different system requirements and licensing options.

  • Features like Hyper-V virtualization, Active Directory, and Remote Desktop Services may vary.

  • Support and updates also vary between versions.

Q82. What is incident management

Ans.

Incident management is the process of identifying, analyzing, and resolving incidents to minimize their impact on business operations.

  • It involves the systematic handling of incidents from their initial detection to their resolution.

  • The goal is to restore normal service operation as quickly as possible and minimize the adverse effects on business processes.

  • Incident management includes incident logging, categorization, prioritization, investigation, diagnosis, escalation, resol...read more

Q83. Deep technical level of troubleshooting on cloud.

Ans.

Deep technical troubleshooting on cloud involves identifying and resolving complex issues within cloud infrastructure.

  • Understand the architecture and components of the cloud platform being used

  • Utilize monitoring and logging tools to identify issues

  • Analyze system performance metrics to pinpoint potential bottlenecks

  • Use debugging tools and techniques to troubleshoot code or configuration issues

  • Collaborate with cross-functional teams to resolve complex issues

Q84. Troubleshooting if laptop is not turning on

Ans.

Check power source, battery, connections, and hardware issues to troubleshoot laptop not turning on.

  • Check if the power source is working and plugged in properly

  • Ensure the battery is charged or try using a different power source

  • Inspect connections such as power cable, charger, and power button

  • Look for hardware issues like faulty motherboard or power supply

  • Try performing a hard reset by removing the battery and holding the power button for 30 seconds

Q85. What is supply chain management

Ans.

Supply chain management involves the coordination and optimization of all activities involved in the production and distribution of goods and services.

  • Involves planning, sourcing, making, delivering, and returning products

  • Focuses on efficiency, cost reduction, and customer satisfaction

  • Utilizes technology and data analytics to improve processes

  • Examples include inventory management, transportation logistics, and supplier relationships

Q86. What is firewall?

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic.

  • Firewall acts as a barrier between a trusted, secure internal network and another network like the Internet.

  • It can be hardware, software, or a combination of both.

  • Firewall can be configured to allow or block specific traffic based on predefined security rules.

  • Examples of firewalls include Cisco ASA, Fortinet FortiGate, and pfSense.

Q87. Micro controller and Mocro processor working

Ans.

Microcontrollers are integrated circuits that contain a processor core, memory, and programmable input/output peripherals, while microprocessors are just the processor core.

  • Microcontrollers are used in embedded systems and have all components on a single chip.

  • Microprocessors require external components like memory and peripherals to function.

  • Examples of microcontrollers include Arduino, PIC, and Raspberry Pi.

  • Examples of microprocessors include Intel Core i7, AMD Ryzen, and AR...read more

Q88. What is lambda in python

Ans.

Lambda is a shorthand way of defining anonymous functions in Python.

  • Lambda functions are defined using the keyword 'lambda'.

  • They can take any number of arguments, but can only have one expression.

  • Lambda functions are often used as arguments for higher-order functions.

  • Example: lambda x: x**2 defines a function that squares its input.

Q89. Implementation project of sap mm and ariba

Ans.

Implementation project of SAP MM and Ariba involves integrating SAP Materials Management with Ariba procurement system.

  • Understand business requirements for integration

  • Map out data flow between SAP MM and Ariba

  • Configure SAP MM to work with Ariba

  • Test integration to ensure seamless operation

  • Train end users on new system functionality

Q90. How are priority determined

Ans.

Priority is determined based on the urgency and importance of the task at hand.

  • Urgency is determined by the deadline or time sensitivity of the task

  • Importance is determined by the impact the task has on the overall goals and objectives

  • Priority can also be influenced by the resources available and the level of risk involved

  • Communication with stakeholders can also play a role in determining priority

Q91. Compare two tables and fetch records

Ans.

Comparing two tables and fetching records based on specified criteria.

  • Identify common column(s) between the two tables

  • Use JOIN operation to combine the tables based on the common column(s)

  • Apply WHERE clause to filter records based on specified criteria

Q92. Explain test cases and test plan

Ans.

Test cases are scenarios designed to validate the functionality of a system, while a test plan outlines the approach, resources, and schedule for testing.

  • Test cases are specific conditions or scenarios that are used to validate the functionality of a system.

  • Test plans outline the approach, resources, and schedule for testing a system.

  • Test cases are derived from requirements and are used to ensure that the system meets those requirements.

  • Test plans include details such as test...read more

Q93. Prepare control statement of sort cards

Ans.

Control statement of sort cards for Technical Specialist interview

  • Use SORT FIELDS statement to specify the fields to sort on

  • Use SORT statement to sort the input records based on specified fields

  • Use OUTFIL statement to write the sorted records to output file

Q94. How you’ve dealt with objection?

Ans.

I have dealt with objections by actively listening, addressing concerns, providing solutions, and building rapport.

  • Listen carefully to the objection without interrupting

  • Acknowledge the concern and show empathy

  • Provide relevant information or solutions to address the objection

  • Build rapport and trust by demonstrating expertise and understanding

Q95. Types of joins and examples in detail

Ans.

Types of joins in SQL with examples

  • Inner Join: Returns rows when there is a match in both tables

  • Left Join: Returns all rows from the left table and the matched rows from the right table

  • Right Join: Returns all rows from the right table and the matched rows from the left table

  • Full Outer Join: Returns rows when there is a match in either table

  • Cross Join: Returns the Cartesian product of the two tables

Q96. Boot from Image option

Ans.

Boot from Image option allows a computer to start up using an image file instead of a physical disk.

  • Allows for quick and easy deployment of operating systems or software

  • Useful for testing new configurations without affecting the main system

  • Commonly used in virtual environments like VMWare or VirtualBox

Q97. Brief about Kerberous in AD

Ans.

Kerberos is a network authentication protocol that uses tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

  • Kerberos is commonly used in Active Directory environments for authentication.

  • It uses a Key Distribution Center (KDC) to issue tickets to users and services.

  • Tickets are encrypted and can only be decrypted by the intended recipient.

  • Kerberos helps prevent unauthorized access to network resources.

  • Example:...read more

Q98. Registry path of TLS1.0

Ans.

The registry path of TLS1.0 is located in the Windows Registry under the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0

  • Look for the 'Enabled' DWORD value under the TLS 1.0 key to check if it is enabled or disabled

  • TLS 1.0 can be disabled by setting the 'Enabled' value to 0

Q99. Tombstone Scenario for Ad

Ans.

Tombstone scenario for an ad refers to when an ad is shown after the product or service being advertised is no longer available.

  • Tombstone scenario occurs when an ad is displayed for a product or service that is no longer available for purchase.

  • This can happen due to delays in updating ad campaigns or inventory changes.

  • It can lead to a poor user experience and wasted ad spend.

  • For example, showing an ad for a sold-out concert or a discontinued product.

Q100. What are interfaces on Java?

Ans.

Interfaces in Java are like blueprints for classes, defining methods that must be implemented by classes that implement the interface.

  • Interfaces in Java are used to achieve abstraction and multiple inheritance.

  • Interfaces can have abstract methods, default methods, and static methods.

  • Classes can implement multiple interfaces but can only extend one class.

  • Example: interface Shape { void draw(); }

  • Example: class Circle implements Shape { public void draw() { // draw circle } }

Previous
1
2
3
4
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.8
 • 8.1k Interviews
3.5
 • 3.8k Interviews
3.8
 • 2.9k Interviews
4.0
 • 2.3k Interviews
3.6
 • 281 Interviews
3.4
 • 269 Interviews
4.1
 • 267 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Technical Specialist Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter