0% found this document useful (0 votes)
39 views

SME Questions

Networking involves transporting and exchanging data between connected devices over a shared medium. A computer network connects nodes like computers, printers, and other devices capable of sending or receiving data. A router is a networking device that connects different IP networks and examines packet headers to determine the best path to forward data between networks. Routers allow sharing a single internet connection between multiple devices. The key difference between IPv4 and IPv6 is that IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for a much larger address space.

Uploaded by

kevin kakkad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

SME Questions

Networking involves transporting and exchanging data between connected devices over a shared medium. A computer network connects nodes like computers, printers, and other devices capable of sending or receiving data. A router is a networking device that connects different IP networks and examines packet headers to determine the best path to forward data between networks. Routers allow sharing a single internet connection between multiple devices. The key difference between IPv4 and IPv6 is that IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for a much larger address space.

Uploaded by

kevin kakkad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

NETWORKING

1.What is networking.

Ans- Networking, also known as computer networking, is the practice of


transporting and exchanging data between nodes over a shared medium in an
information system. Networking comprises not only the design, construction
and use of a network, but also the management, maintenance and operation of
the network infrastructure, software and policies.

2.What is Computer Network?

A computer network is a set of devices connected through links. A node can be


computer, printer, or any other device capable of sending or receiving the
data. The links connecting the nodes are known as communication channels.

Computer Network uses distributed processing in which task is divided


among several computers. Instead, a single computer handles an entire task,
each separate computer handles a subset.

3.What is router?

Ans- A router is a device that connects two or more IP networks or


subnetworks.
The router is a physical or virtual internetworking device that is designed to
receive, analyze, and forward data packets between computer networks. A
router examines a destination IP address of a given data packet, and it uses the
headers and forwarding tables to decide the best way to transfer the packets.
There are some popular companies that develop routers; such are Cisco, 3Com,
HP, Juniper, D-Link, Nortel, etc. Some important points of routers are given
below:

A router is used in LAN (Local Area Network) and WAN (Wide Area
Network) environments. For example, it is used in offices for connectivity, and
you can also establish the connection between distant networks such as from
Bhopal to
It shares information with other routers in networking.
It uses the routing protocol to transfer the data across a network.
Furthermore, it is more expensive than other networking devices like switches
and hubs
Why Routers?
A router is more capable as compared to other network devices, such as a hub,
switch, etc., as these devices are only able to execute the basic functions of the
network. For example, a hub is a basic networking device that is mainly used to
forward the data between connected devices, but it cannot analyze or change
anything with the transferring data. On the other hand, the router has the
capability to analyze and modify the data while transferring it over a network,
and it can send it to another network. For example, generally, routers allow
sharing a single network connection between multiple devices

How does Router work?


A router analyzes a destination IP address of a given packet header and
compares it with the routing table to decide the packet's next path. The list of
routing tables provides directions to transfer the data to a particular network
destination. They have a set of rules that compute the best path to forward the
data to the given IP address.

Routers use a modem such as a cable, fiber, or DSL modem to allow


communication between other devices and the internet. Most of the routers have
several ports to connect different devices to the internet at the same time. It uses
the routing tables to determine where to send data and from where the traffic is
coming.
Features of Router
A router works on the 3rd layer (Network Layer) of the OSI model, and it is
able to communicate with its adjacent devices with the help of IP addresses and
subnet.
A router provides high-speed internet connectivity with the different types of
ports like gigabit, fast-Ethernet, and STM link port.
It allows the users to configure the port as per their requirements in the network.
Routers' main components are central processing unit (CPU), flash memory,
RAM, Non-Volatile RAM, console, network, and interface card.
4.Diff Between ipv4 and ipv4.

Ans.IPv4 is 32-Bit IP address whereas IPv6 is a 128-Bit IP address.


IPv4 is a numeric addressing method whereas IPv6 is an alphanumeric
addressing method.
IPv4 binary bits are separated by a dot(.) whereas IPv6 binary bits are separated
by a colon(:).
IPv4 offers 12 header fields whereas IPv6 offers 8 header fields.
IPv4 supports broadcast whereas IPv6 doesn’t support broadcast.
IPv4 has checksum fields while IPv6 doesn’t have checksum fields
When we compare IPv4 and IPv6, IPv4 supports VLSM (Variable Length
Subnet Mask) whereas IPv6 doesn’t support VLSM.
IPv4 uses ARP (Address Resolution Protocol) to map to MAC address whereas
IPv6 uses NDP (Neighbour Discovery Protocol) to map to MAC address
What is IPv4?
IPv4 is an IP version widely used to identify devices on a network using an
addressing system. It was the first version of IP deployed for production in the
ARPANET in 1983. It uses a 32-bit address scheme to store 2^32 addresses
which is more than 4 billion addresses. It is considered the primary Internet
Protocol and carries 94% of Internet traffic.
What is IPv6?
IPv6 is the most recent version of the Internet Protocol. This new IP address
version is being deployed to fulfill the need for more Internet addresses. It was
aimed to resolve issues that are associated with IPv4. With 128-bit address
space, it allows 340 undecillion unique address space. IPv6 is also called IPng
(Internet Protocol next generation).
Internet Engineer Taskforce initiated it in early 1994. The design and
development of that suite are now called IPv6.
5. Difference between Windows 10 and windows server 16.
They are built from the same codebase, but the server version has
somewhat better security enabled, especially when integrated into Active
Directory.

The server version also allows more concurrent remote connections, either as a file
share system or as a remote desktop host (though the latter requires some
additional licensing to enable that.)

6.Difference between San Nas Das.

The major differences between DAS, NAS, and SAN are costs, scalability,
and how storage is shared. The three systems also use different storage
mechanisms: DAS primarily uses hard-drive storage with sectors, NAS uses
shared files, and SAN uses block storage.
Different technologies are also used for transmitting data. DAS uses IDE/SCSI,
NAS uses TCP/IP and Ethernet, and SAN uses Fibre Channel and IP.

7.What is SSH?
Ans - SSH, also known as Secure Shell or Secure Socket Shell, is a network
protocol that gives users, particularly system administrators, a secure way to access
a computer over an unsecured network.
8.What is Dns?
Ans- When users type domain names into the URL bar in their browser, DNS
servers are responsible for translating those domain names to numeric IP
addresses, leading them to the correct websitIP
DNS servers translate requests for names into IP addresses, controlling which
server an end user will reach when they type a domain name into their web
browser. These requests are called queries.
9.OSI and TCP ip model layers names.
Ans- OSI layers are -
Application Layer,
Presentation Layer,
Session Layer,
Transport layer,
Network layer,
Data Link Layer,
Physical layer.
TCP IP model layers are --
Process/Application Layer,
Host-to-Host/Transport Layer,
Internet Layer,
Network Access/Link Layer
Difference between Hub, Switch and Router
1. Hub :A Hub is just a connector that connects the wires coming from
different sides. There is no signal processing or regeneration. It is an electronic
device that operates only on physical layers of the OSI model.
2. Switch :Switch is a point to point communication device. It operators at the
data link layer of OSI model. It uses switching table to find out the correct
destination.
3. Router :Routers are the multiport devices and more sophisticated as
compared to repeaters and bridges. It contains a routing table that enables it to
make decision about the route i.e. to determine which of several possible paths
between the source and destination is the best for a particular transmission.

QUE.Difference between IAAS, PAAS and SAAS.


1. IAAS: Infrastructure As A Service (IAAS) is means of delivering computing
infrastructure as on-demand services. It is one of the three fundamental cloud
service model servers storage network operating system. In the user purchasing
servers, software data center space, or network equipment and rent those resources
as a fully outsourced service can demand model. It allows dynamic scaling and the
resources are distributed as a service. It generally includes multiple-user on a
single piece of hardware.

2. PAAS: Platform As A Service (PAAS) is a cloud delivery model for


applications composed of services managed by a third party. It provides elastic
scaling of your application which allows developers to build applications and
services over the internet and the deployment models include public, private and
hybrid.

3. SAAS,are: Software As A Service (SAAS) allows users to run existing online


applications and it is a model software that is deployed as a hosting service and is
accessed over Output Rephrased/Re-written Text the internet or software delivery
model during which software and its associated data are hosted centrally and
accessed using their client, usually an online browser over the web. SAAS services
are used for the development and deployment of modern applications.

QUE. Difference between SAN and. DAS.

1. Directly Attached Storage (DAS) :

The storage device which is permanently attached to a desktop computer. DAS is


for a single user (Hard drive attached to a computer). It is well suited for a
small-to-medium sized business where sufficient amounts of storage can be
configured at a low startup cost. The DAS enclosure will be a separate adjacent
cabinet that contains additional disk drives.
Component of Directly Attached Storage (DAS) –
1. Storage devices
2. Cables
3. Disk Array
4. Protocol
5. Storage protocols: ATA, SCSI, SAS, SASA, FC

2. Storage Area Network (SAN) :

SAN acts on block level over network. Storage which can be accessed using ISCSI
or FC. Suitable for business-critical applications and where high performance is
required. The main benefit to a SAN-based storage solution is ability to share
storage arrays to multiple servers. This allows you to configure storage capacity as
needed, usually by a dedicated SAN administrator. Higher levels of performance
throughput are typical in a SAN environment, and data is highly available through
redundant disk controllers and drives.

Components of Storage Area Network (SAN) –


1. Node ports
2. Cables
3. Interconnect device such as: Hubs, switches, directors
4. Storage arrays

QUE.What is topology and how many type of topology?

Network topologies describe the methods in which all the elements of a


network are mapped. The topology term refers to both the physical and logical
layout of a network.

Different types of Physical Topologies are:


P2P Topology
Bus Topology
Ring Topology
Star Topology
Tree Topology
Mesh Topology
Hybrid Topology

1. What is firewall?
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established
security policies. At its most basic, a firewall is essentially the barrier that sits
between a private internal network and the public Internet.
20.What is DNS?
DNS servers translate requests for names into IP addresses, controlling which
server an end user will reach when they type a domain name into their web
browser. These requests are called queries.
24.What is OSI Layer?
OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer moves
through a physical medium to the software application in another computer.OSI
consists of seven layers, and each layer performs a particular network function.

28.DNS and primary site and secondary site


What is a primary DNS server?
DNS, or the Domain Name System, translates domain names into IP
addresses so users can easily navigate to sites on the Internet without having to
memorize long, specific strings of numbers and letters.

In this system, a primary DNS server is a server that hosts a website’s primary
zone file. This is a text database file that contains all of the authoritative
information for a domain, including its IP address, the identity of the domain
administrator, and various resource records. Resource records list domain
names alongside their corresponding IP addresses, and can take several
different forms:

A record: Directs a domain to an IPv4 address


AAAA record: Directs a domain to an IPv6 address
MX record: Assigns a mail server to a domain
NS record: Identifies authoritative DNS servers for a domain
Primary servers are also responsible for making any necessary changes to a zone’s
DNS records. Once the primary server has completed the update, it can then
pass along change requests to the secondary servers.
What is a secondary DNS server?
Primary DNS servers contain all relevant resource records and handle DNS queries
for a domain. By contrast, secondary DNS servers contain zone file copies that
are read-only, meaning they cannot be modified. Instead of getting their
information from local files, they receive pertinent information from a primary
server in a communication process known as a zone transfer.

Zone transfers become more complicated when they are completed between
multiple secondary servers. If several secondary servers are in use, one may be
designated as a higher-tier secondary server so that it is capable of replicating
zone file copies to the remaining pool of secondary servers.
How is a primary DNS server configured?
A server administrator may choose to designate a DNS server as a primary or
secondary server. In some cases, a server can be primary for one zone and
secondary for another zone.
Although each zone is limited to one primary DNS server, it can have any number
of secondary DNS servers. Maintaining one or more secondary servers ensures
that queries can be resolved even if the primary server becomes unresponsive.

What are the benefits of using a secondary DNS server?


Although secondary DNS servers are not necessary to complete DNS queries for a
domain, it
is standard practice (and required by many registrars) to establish at least one.
There are two main benefits of using a secondary DNS server:
Redundancy and resiliency: Relying on just one DNS server creates a single
point of failure. If the primary server fails or is compromised by an attack,
prospective visitors can no longer access the desired domain. Using secondary
servers creates redundancy and makes it less likely that users will experience a
disruption of service.
Load balancing: Secondary DNS servers can share the burden of incoming
requests to the domain so that the primary server doesn’t get overloaded and
cause a denial-of-service. They do this using round-robin DNS, a load
balancing technique designed to send roughly equal amounts of traffic to each
server.

What is dynamic DNS?


Dynamic DNS (DDNS) is a service that keeps IP addresses automatically updated.
This is especially useful for smaller web properties (personal websites, small
businesses, etc.) that are not assigned static IPs, but instead temporarily lease
IPs from their Internet Service Provider (ISP).
Rather than making frequent manual changes to a domain’s IP address via the
primary server, users can employ DDNS to automatically update their DNS
records with the most current IP address that has been assigned to their domain.

QUE. What is ITIL and use?


What is ITIL (Information Technology Infrastructure Library)?
ITIL (Information Technology Infrastructure Library) is a framework designed to
standardize the selection, planning, delivery, maintenance and overall lifecycle
of IT services within a business. The goal is to improve efficiency and achieve
predictable service delivery. The ITIL framework enables IT administrators to
be business service partners, rather than just back-end support. ITIL guidelines
and best practices align IT department actions and expenses to business needs
and change them as the business grows or shifts direction.
ITIL started in the 1980s, when data centers decentralized and adopted more
geographically diverse architectures. This practice caused process and
deployment discrepancies and brought inconsistent or suboptimal IT service
performance into organizations.
What is the ITIL process framework?
Each iteration of ITIL delivers updated documentation and certifications to prepare
admins for the current infrastructure landscape and the types of services they
provide. ITIL's framework is not a rigid checklist to implement best practices --
organizations evaluate and implement the aspects that are most important for
their needs.
The evolution of ITIL
Over time, the ITIL standard has evolved to address changing IT environments.
ITIL v1
In 1989, ITIL's goal was to standardize IT service management (ITSM). This
initial iteration gave organizations an overview of how to streamline services
and helped admins start thinking about best practices.
ITIL v2 offered admins a more applicable and uniform structure for service
support and delivery, and it included actual processes for organizations to
follow.
ITIL v3 gave a broader look at IT services and added guidelines on service
strategy, design, transition and operation. It also outlined ways for businesses to
continuously improve services. Its framework of core publications collected
best practices for each major phase of ITSM. These books and their core
concepts are the following
ITIL v4 is designed to help IT admins navigate the ins and outs of the Fourth
Industrial Revolution and provide guidance for the role of IT management in a
service economy. ITIL v4 accommodates newer approaches, such as DevOps,
automation, containers, microservices and the cloud. It also emphasizes the
integration of ITSM with other areas of a business.

QUE.What is use DNS?


DNS servers translate requests for specific domains into IP addresses, controlling
which server users with access when they enter the domain name into their
browser
.
QUE.What is Switch?
Switches are networking devices operating at layer 2 or a data link layer of the OSI
model.
They connect devices in a network and use packet switching to send, receive or
forward data packets or data frames over the network.
A switch has many ports, to which computers are plugged in. When a data frame
arrives at any port of a network switch, it examines the destination address,
performs necessary checks and sends the frame to the corresponding
device(s).It supports unicast, multicast as well as broadcast communications.

83.What is Powershell?
PowerShell is a cross-platform task automation solution made up of a
command-line shell, a scripting language, and a configuration management
framework. PowerShell runs on Windows, Linux, and macOS.

QUE. Tcp vs udp?


What is TCP?
Transmission Control Protocol (TCP) is connection-oriented, meaning once
a connection has been established, data can be transmitted in two directions.
TCP has built-in systems to check for errors and to guarantee data will be
delivered in the order it was sent, making it the perfect protocol for
transferring information like still images, data files, and web pages.

But while TCP is instinctively reliable, its feedback mechanisms also result in
a larger overhead, translating to greater use of the available bandwidth on
your network.

What is UDP?
User Datagram Protocol (UDP) is a simpler, connectionless Internet protocol
wherein error-checking and recovery services are not required. With UDP,
there is no overhead for opening a connection, maintaining a connection, or
terminating a connection; data is continuously sent to the recipient,
whether or not they receive it.
WHAT IS VIRTUALIZATION ?
Cloud computing is possible because of a technology called virtualization.
Virtualization allows for the creation of a simulated, digital-only "virtual"
computer that behaves as if it were a physical computer with its own
hardware. The technical term for such a computer is virtual machine.

99.What is cloud?
"The cloud" refers to servers that are accessed over the Internet, and the software
and databases that run on those servers. Cloud servers are located in data
centers all over the world. By using cloud computing, users and companies do
not have to manage physical servers themselves or run software applications on
their own machines.

What are the main service models of cloud computing?


cloud service models
Software-as-a-Service (SaaS): Instead of users installing an application on their
device, SaaS applications are hosted on cloud servers, and users access them
over the Internet. SaaS is like renting a house: the landlord maintains the house,
but the tenant mostly gets to use it as if they owned it. Examples of SaaS
applications include Salesforce, MailChimp, and Slack.

Platform-as-a-Service (PaaS): In this model, companies don't pay for hosted


applications; instead they pay for the things they need to build their own
applications. PaaS vendors offer everything necessary for building an
application, including development tools, infrastructure, and operating systems,
over the Internet. PaaS can be compared to renting all the tools and equipment
necessary for building a house, instead of renting the house itself. PaaS
examples include Heroku and Microsoft Azure.

Infrastructure-as-a-Service (IaaS): In this model, a company rents the servers


and storage they need from a cloud provider. They then use that cloud
infrastructure to build their applications. IaaS is like a company leasing a plot of
land on which they can build whatever they want — but they need to provide
their own building equipment and materials. IaaS providers include
DigitalOcean, Google Compute Engine, and OpenStack.

Formerly, SaaS, PaaS, and IaaS were the three main models of cloud computing,
and essentially all cloud services fit into one of these categories. However, in
recent years a fourth model has emerged:

Function-as-a-Service (FaaS): FaaS, also known as serverless computing, breaks


cloud applications down into even smaller components that only run when they
are needed. Imagine if it were possible to rent a house one little bit at a time: for
instance, the tenant only pays for the dining room at dinner time, the bedroom
while they are sleeping, the living room while they are watching TV, and when
they are not using those rooms, they don't have to pay rent on them.
FaaS or serverless applications still run on servers, as do all these models of
cloud computing. But they are called "serverless" because they do not run on
dedicated machines, and because the companies building the applications do
not have to manage any servers.
Also, serverless functions scale up, or duplicate, as more people use the application
— imagine if the tenant's dining room could expand on demand when more
people come over for dinner.

QUE.Advantages/Disadvantages of cloud COMPUTING?


Advantages of Cloud Computing
As we all know that Cloud computing is trending technology. Almost every
company switched their services on the cloud to rise the company growth.

Advantages of Cloud Computing --


1) Back-up and restore data
Once the data is stored in the cloud, it is easier to get back-up and restore that data
using the cloud.
2) Improved collaboration
Cloud applications improve collaboration by allowing groups of people to quickly
and easily share information in the cloud via shared storage.
3) Excellent accessibility
Cloud allows us to quickly and easily access store information anywhere, anytime
in the whole world, using an internet connection. An internet cloud
infrastructure increases organization productivity and efficiency by ensuring
that our data is always accessible.
4) Low maintenance cost
Cloud computing reduces both hardware and software maintenance costs for
organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
6) IServices in the pay-per-use model
Cloud computing offers Application Programming Interfaces (APIs) to the users
for access services on the cloud and pays the charges as per the usage of
service.
7) Unlimited storage capacity
Cloud offers us a huge amount of storing capacity for storing our important data
such as documents, images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers
many advanced features related to security and ensures that data is securely
stored and handled.

Disadvantages of Cloud Computing --


A list of the disadvantage of cloud computing is given below -
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, etc.) is stored
on the cloud, and we access these data through the cloud by using the internet
connection. If you do not have good internet connectivity, you cannot access
these data. However, we have no any other way to access data from the cloud.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may
face problems when transferring their services from one vendor to another. As
different vendors provide different platforms, that can cause difficulty moving
from one cloud to another.
3) Limited Control
As we know, cloud infrastructure is completely owned, managed, and monitored
by the service provider, so the cloud users have less control over the function
and execution of services within a cloud infrastructure.
4) Security
Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be
aware that you will be sending all your organization's sensitive information to a
third party, i.e., a cloud computing service provider. While sending the data on
the cloud, there may be a chance that your organization's information is hacked
by Hackers.

WHAT IS Public Cloud?


Public Cloud provides a shared platform that is accessible to the general public
through an Internet connection.
Public cloud operated on the pay-as-per-use model and administrated by the third
party, i.e., Cloud service provider.
In the Public cloud, the same storage is being used by multiple users at the same
time.
Public cloud is owned, managed, and operated by businesses, universities,
government organizations, or a combination of them.
Amazon Elastic Compute Cloud (EC2), Microsoft Azure, IBM's Blue Cloud, Sun
Cloud, and Google Cloud are examples of the public cloud.
Advantages of Public Cloud
There are the following advantages of public cloud -
1) Low Cost
Public cloud has a lower cost than private, or hybrid cloud, as it shares the same
resources with a large number of consumers.

2) Location Independent
Public cloud is location independent because its services are offered through the
internet.

3) Save Time
In Public cloud, the cloud service provider is responsible for the manage and
maintain data centers in which data is stored, so the cloud user can save their
time to establish connectivity, deploying new products, release product updates,
configure, and assemble servers.

4) Quickly and easily set up


Organizations can easily buy public cloud on the internet and deployed and
configured it remotely through the cloud service provider within a few hours.

5) Business Agility
Public cloud provides an ability to elastically re-size computer resources based on
the organization's requirements.

6) Scalability and reliability


Public cloud offers scalable (easy to add and remove) and reliable (24*7 available)
services to the users at an affordable cost.
Disadvantages of Public Cloud
1) Low Security
Public Cloud is less secure because resources are shared publicly.
2) Performance
In the public cloud, performance depends upon the speed of internet connectivity.
3) Less customizable
what is Private Cloud?
Private cloud is also known as an internal cloud or corporate cloud.
Private cloud provides computing services to a private internal network (within the
organization) and selected users instead of the general public.
Private cloud provides a high level of security and privacy to data through firewalls
and internal hosting. It also ensures that operational and sensitive data are not
accessible to third-party providers.
HP Data Centers, Microsoft, Elastra-private cloud, and Ubuntu are the example of
a private cloud.

Advantages of Private cloud


1) More Control
Private clouds have more control over their resources and hardware than public
clouds because it is only accessed by selected users.

2) Security & privacy


Security & privacy are one of the big advantages of cloud computing. Private
cloud improved the security level as compared to the public cloud.

3) Improved performance
Private cloud offers better performance with improved speed and space capacity.
Disadvantages of Private Cloud
1) High cost
The cost is higher than a public cloud because set up and maintain hardware
resources are costly.
2) Restricted area of operations
As we know, private cloud is accessible within the organization, so the area of
operations is limited.
3) Limited scalability
Private clouds are scaled only within the capacity of internal hosted resources.
4) Skilled people
Skilled people are required to manage and operate cloud services.

What is Hybrid Cloud?

Hybrid cloud is a combination of public and private clouds.


Hybrid cloud = public cloud + private cloud
The main aim to combine these cloud (Public and Private) is to create a unified,
automated, and well-managed computing environment.
In the Hybrid cloud, non-critical activities are performed by the public cloud and
critical activities are performed by the private cloud.
Mainly, a hybrid cloud is used in finance, healthcare, and Universities.
The best hybrid cloud provider companies are Amazon, Microsoft, Google, Cisco,
and NetApp.
hybrid cloud model

Advantages of Hybrid Cloud--


1) Flexible and secure
It provides flexible resources because of the public cloud and secure resources
because of the private cloud.
2) Cost effective
Hybrid cloud costs less than the private cloud. It helps organizations to save costs
for both infrastructure and application support.
3) Cost effective
It offers the features of both the public as well as the private cloud. A hybrid cloud
is capable of adapting to the demands that each company needs for space,
memory, and system.
4) Security
Hybrid cloud is secure because critical activities are performed by the private
cloud.
5) Risk Management
Hybrid cloud provides an excellent way for companies to manage the risk.

Disadvantages of Hybrid Cloud


1) Networking issues
In the Hybrid Cloud, networking becomes complex because of the private and the
public cloud.
2) Infrastructure Compatibility
Infrastructure compatibility is the major issue in a hybrid cloud. With dual-levels
of infrastructure, a private cloud controls the company, and a public cloud does
not, so there is a possibility that they are running in separate stacks.
3) Reliability
The reliability of the services depends on cloud service providers.
Community Cloud
Community cloud is a cloud infrastructure that allows systems and services to be
accessible by a group of several organizations to share the information. It is
owned, managed, and operated by one or more organizations in the community,
a third party, or a combination of them.

What is Community Cloud?


Example: Our government organization within India may share computing
infrastructure in the cloud to manage data.
Advantages of Community Cloud --
Cost effective
Community cloud is cost effective because the whole cloud is shared between
several organizations or a community.

Flexible and Scalable


The community cloud is flexible and scalable because it is compatible with every
user. It allows the users to modify the documents as per their needs and
requirement.

Security
Community cloud is more secure than the public cloud but less secure than the
private cloud.
Sharing infrastructure
Community cloud allows us to share cloud resources, infrastructure, and other
capabilities among various organizations.

Disadvantages of Community Cloud --

Community cloud is not a good choice for every organization.


Slow adoption to data
The fixed amount of data storage and bandwidth is shared among all community
members.
Community Cloud is costly than the public cloud.
Sharing responsibilities among organizations is difficult.

101. Which storage you will go for small network?


What is NAS (Network Attached Storage) and Why is NAS Important for Small
Businesses?
Data is a critical asset for companies Without access to their data, companies may
not provide their customers with the expected level of service. Poor customer
service, loss of sales or team collaboration problems are all examples of what
can happen when information is not available.
What is NAS ?
NAS device is a storage device connected to a network that allows storage and
retrieval of data from a central location for authorised network users and varied
clients. NAS devices are flexible and scale out, meaning that as you need
additional storage, you can add to what you have. NAS is like having a private
cloud in the office. It’s faster, less expensive and provides all the benefits of a
public cloud on site, giving you complete control.

102. What you'll do when your database is down?


A database may down at the file level, which means one or more files in the
database have been corrupted, causing corruption in the database. A corrupt file
is a logical damage to the database and hard drive. However, do-it-yourself data
recovery can overwrite the data and result in permanent data loss if it is done
incorrectly.
5 Keys to Prevent Database Downtime --
Here are five ways for DBAs to prevent database downtime and become modern
day heroes in the eyes of the CIO.
1. Review
Make sure you start your migration only after you have reviewed the important
applications, processes, and users, to determine what exactly needs to be
modified. You’re not ready to start migration until you’ve thought about the
existing environments and have contemplated the potential impact on
infrastructure and work flows.

2. Schedule smartly
Do whatever it takes to not mess with regular operations so that the programmers
don’t get frustrated. Scheduling resource-intensive migration tasks for off-hours
can be helpful if you think they’ll slow down customers or cause database
downtime.

3. Keep traffic moving


If the migration is taking a while, make sure that users don’t get stuck in different
database versions or in completely different products. Facilitate coexistence
(and if necessary redundancies) between the old and new systems so that all of
your users can continue to perform the necessary tasks.
4. Have a backup plan
Keep-calm-and-click-edit.svg.png
Always keep an eye on your recovery and backup plan to make sure that no data
goes missing. While the migration may be keeping you busy, it’s important that
you don’t lose track of what you will do if you have to suddenly restore data
mid-project.
5. Be a good manager

QUE .What will you do if your application in cloud is down? And All AZ are
down?

QUE.Which mechanism will you use for secure connection? (VPN/Some other
options)?
The two most widely used mechanisms for transport layer encryption are
Transport Layer Security (TLS) or IPsec.IPsec, TLS, and SSH share a
common goal, that is, to provide a secure connection between two
peers/devices/endpoints.

105. Which backup type will you choose if you want to take backup per
hour?

106. What is load balancer?


A load balancer is a device that acts as a reverse proxy and distributes network or
application traffic across a number of servers. Load balancers are used to
increase capacity (concurrent users) and reliability of applications.
108. What is incident in ITIL?
Incident management processes are used across many industries, and
incidents can include anything from IT system failure, to events requiring the
attention of healthcare professionals, to critical maintenance of physical
infrastructure.

109. How to host a website after creating?


Steps to Host a Website:
Step 1: Decide What Type of Website You Want
Static or Basic Websites
Dynamic Websites:
Step 2: Choose Your Hosting Server
Linux Hosting,
Windows Hosting,
Step 3: Select Your Web Hosting Plan
Shared Hosting:
VPS Hosting (Virtual Private Server Hosting)
Dedicated Hosting:
Cloud Hosting:
Step 4: Change Your DNS Address
Step 5: Upload Your Website

110. What is the use of windows server?


Windows Server is a group of operating systems designed by Microsoft that
supports enterprise-level management, data storage, applications, and
communications. Previous versions of Windows Server have focused on
stability, security, networking, and various improvements to the file system.

112. If change management happen. Is it time wate or not?


114. What were the modules?

121. Definition:Active directory, devops, database, rdbms, primary and


foreign key
Active directory - directory service, such as Active Directory Domain Services
(AD DS), provides the methods for storing directory data and making this data
available to network users and administrators. For example, AD DS stores
information about user accounts, such as names, passwords, phone numbers,
and so on, and enables other authorized users on the same network to access
this information.
Active Directory stores information about objects on the network and makes this
information easy for administrators and users to find and use. Active Directory
uses a structured data store as the basis for a logical, hierarchical organization
of directory information.
Active Directory also includes:
Schema. Global catalog.
Devops - The DevOps is a combination of two words, one is software
Development, and second is Operations. This allows a single team to handle the
entire application lifecycle, from development to testing, deployment, and
operations. DevOps helps you to reduce the disconnection between software
developers, quality assurance (QA) engineers, and system administrators.

Database - A database is an organized collection of structured information, or


data, typically stored electronically in a computer system. A database is usually
controlled by a database management system (DBMS). Together, the data and
the DBMS, along with the applications that are associated with them, are
referred to as a database system, often shortened to just database.

DBMS - Database Management System (DBMS) is a software that is used to


define, create and maintain a database and provides controlled access to the
data.
RDMS - Relational Database Management System (RDBMS) is a more advanced
version of a DBMS system that allows access to data in a more efficient way. It
is used to store or manage only the data that are in the form of tables.

DIFFERENCES
In DBMS, the storage of data is in the files. It is arranged either in a
hierarchical form or navigational form.
In RDBMS, the data is stored in tables. There is no hierarchy and instead,
follow a relational model. Columns are the headers and rows contain the
corresponding values.
RBMS allows users to store a large set of data.

122. Devops tools names


DevOps tools such as Git, Ansible, Docker, Puppet, Jenkins, Chef, Nagios, and
Kubernetes.
124. Difference between c++ and java 1
1.It has support for both procedural programming and object oriented
programming.
Java has support only for object oriented programming models.
2.C++ is platform dependent. It is based on the concept of Write Onceompile
Anywhere.
3.Java is platform independent. It is based on the concept of Write Once Run
Anywhere.
4.C ++ is only compiled and cannot be interpreted.
Java can be both compiled and interpreted.

139. list out the storage module topics

142. Ram rom differance


Random Access Memory (RAM) is used to store the programs and data being
used by the CPU in real-time. The data on the random access memory can be
read, written, and erased any number of times. RAM is a hardware element
where the data being currently used is stored. It is a volatile memory.
Types of RAM:
Static RAM, or (SRAM) which stores a bit of data using the state of a six
transistor memory cell.
Dynamic RAM, or (DRAM) which stores a bit data using a pair of transistor and
capacitor which constitute a DRAM memory cell.

Read Only Memory (ROM) is a type of memory where the data has been
prerecorded. Data stored in ROM is retained even after the computer is turned
off ie, non-volatile.
Types of ROM:
Programmable ROM, where the data is written after the memory chip has been
created. It is non-volatile.
Erasable Programmable ROM, where the data on this non-volatile memory chip
can be erased by exposing it to high-intensity UV light.
Electrically Erasable Programmable ROM, where the data on this non-volatile
memory chip can be electrically erased using field electron emission.
Mask ROM, in which the data is written during the manufacturing of the memory
chip.

143. Machine language and computer language difference


MACHINE LANGUAGE
1.Machine language ranks as the lowest level programming language. In this
language, instructions are executed directly via the Central Processing Unit.
2.Machine language cannot be deciphered by humans and can be comprehended
only by computers.
3.Machine languages comprise of binary digits 0s and 1s.
ASSEMBLY LANGUAGES
Assembly language refers to a low-level programming language that needs an
assembler for converting the instructions to machine or object codes.
Assembly language can be understood, used, and applied by humans.
Assembly languages have a syntax that is similar to the English language;

145. What is Ping?


A ping (Packet Internet or Inter-Network Groper) is a basic Internet program
that allows a user to test and verify if a particular destination IP address
exists and can accept requests in computer network administration. The
acronym was contrived to match the submariners' term for the sound of a
returned sonar pulse.
Ping is also used diagnostically to ensure that a host computer the user is
trying to reach is operating. Any operating system (OS) with networking
capability, including most embedded network administration software, can
use ping.

147. Situational base que related to itil

154. Why we go for cloud computing?

Accessibility: Cloud-based applications and data are accessible from virtually any
internet-connected device.
Speed to market: Developing in the cloud enables users to get their applications
to market quickly.
Data security: Hardware failures do not result in data loss because of networked
backups.
Savings on equipment: Cloud computing uses remote resources, saving
organizations the cost of servers and other equipment.
Pay structure: A “utility” pay structure means users only pay for the resources
they use.
Scalability: Cloud infrastructure scales on demand to support fluctuating
workloads.
Storage options: Users can choose public, private, or hybrid storage offerings,
depending on security needs and other considerations.
Control choices: Organizations can determine their level of control with
as-a-service options. These include software as a service (SaaS), platform as a
service (PaaS), and infrastructure as a service (IaaS).
Tool selection: Users can select from a menu of prebuilt tools and features to build
a solution that fits their specific needs.
Security features: Virtual private cloud, encryption, and API keys help keep data
secure.

156. What is mean by leadership from whom u are inspired


158. Difficult situation in life how u will overcome
177. modules names
178. what you did in communication class
179. communication modules
181. Automation?
Automation is a term for technology applications where human input is minimized.
This includes business process automation (BPA), IT automation, personal
applications such as home automation and more.
Types of automation
Basic automation
Basic automation takes simple, rudimentary tasks and automates them. This level
of automation is about digitizing work by using tools to streamline and
centralize routine tasks, such as using a shared messaging system instead of
having information in disconnected silos. Business process management (BPM)
and robotic process automation (RPA) are types of basic automation.

Process automation
Process automation manages business processes for uniformity and transparency. It
is typically handled by dedicated software and business apps. Using process
automation can increase productivity and efficiency within your business. It can
also deliver new insights into business challenges and suggest solutions.
Process mining and workflow automation are types of process automation.

Integration automation
Integration automation is where machines can mimic human tasks and repeat the
actions once humans define the machine rules. One example is the “digital
worker.” In recent years, people have defined digital workers as software robots
that are trained to work with humans to perform specific tasks. They have a
specific set of skills, and they can be “hired” to work on teams.

Artificial intelligence (AI) automation


The most complex level of automation is artificial intelligence (AI) automation.
The addition of AI means that machines can “learn” and make decisions based
on past situations they have encountered and analyzed. For example, in
customer service, virtual assistants powered can reduce costs while empowering
both customers and human agents, creating an optimal customer service
experience.

182. Use of middleware


Middleware is software that bridges gaps between other applications, tools,
and databases in order to provide unified services to users. It is commonly
characterized as the glue that connects different software platforms and
devices together.
Why use middleware?
The purpose of middleware is to foster interaction between different aspects
of an application or even between applications themselves. By leveraging
middleware, businesses can expect to experience:
Efficient connectivity
Innovative solutions
More concise transition periods
Easily accessible workplace tools

183.Basic disk vs dynamic disk


Basic disk
Basic disk uses normal partition tables found in MS-DOS and Windows to manage
all partitions on the hard disk.
Each hard drive can hold up to 3 or 4 partitions and there is one
secondary-extended partition.
In basic disk, there are two styles of partition in basic disk:
1. MBR partition
2. GPT partition
In basic disk, already created partition cannot be changed or modified.
A basic disk can be easily converted to a dynamic disk without losing any data.
Dynamic Disk -
In dynamic disk, a hard drive is divided into dynamic volumes.
In dynamic disk, there are not limited for primary and secondary-extended
partitions
In dynamic disk, there is no partition and it contains simple volumes, spanned
volumes, stripped volumes, mirrored volumes, and RAID-5 volumes.
While in dynamic disk, volumes can be extended.

184. What is office 365/ Advantages


Office 365 is a Software as a Service (SaaS) solution that combines the traditional
Microsoft Office desktop applications, Microsoft application services, and some
new productivity services, all of which are enabled as consumable services
from within Microsoft’s Azure cloud platform.
A few months ago, on 21st April 2020, Microsoft officially rebranded Office 365,
effectively changing the name from Office 365 to Microsoft 365 – but only for
specific licence types – namely the small and medium business SKUs
Features -
The latest Office apps, like Word, Excel, PowerPoint, and Outlook.
The ability to install on PCs, Macs, tablets, and phones.
1 TB of OneDrive cloud storage.
ADVANTAGE -
Access Files Anywhere
Secure Cloud Storage
Improved Communication
Predictable spend
Business Continuity
Automatic upgrades
Centralised Collaboration

185. what is normalization?


Normalization is the process of organizing data in a database. This includes
creating tables and establishing relationships between those tables according to
rules designed both to protect the data and to make the database more flexible
by eliminating redundancy and inconsistent dependency.

187. what is primary key and its use


A primary key is the column or columns that contain values that uniquely identify
each row in a table. A database table must have a primary key for Optim to
insert, update, restore, or delete data from a database table. Optim uses primary
keys that are defined to the database.

188. what is index in database


An index is defined by a field expression that you specify when you create the
index. Typically, the field expression is a single field name, like EMP_ID. An
index created on the EMP_ID field, for example, contains a sorted list of the
employee ID values in the table.
189. What is database security?
Database security includes a variety of measures used to secure database
management systems from malicious cyber-attacks and illegitimate use.
Database security programs are designed to protect not only the data within the
database, but also the data management system itself, and every application that
accesses it, from misuse, damage, and intrusion.
Why is it important
By definition, a data breach is a failure to maintain the confidentiality of data in a
database. How much harm a data breach inflicts on your enterprise depends on
a number of consequences or factors:

Compromised intellectual property: Your intellectual property—trade secrets,


inventions, proprietary practices—may be critical to your ability to maintain a
competitive advantage in your market. If that intellectual property is stolen or
exposed, your competitive advantage may be difficult or impossible to maintain
or recover.
Damage to brand reputation: Customers or partners may be unwilling to buy
your products or services (or do business with your company) if they don’t feel
they can trust you to protect your data or theirs.
Business continuity (or lack thereof): Some business cannot continue to operate
until a breach is resolved.
Fines or penalties for non-compliance: The financial impact for failing to
comply with global regulations such as the Sarbannes-Oxley Act (SAO) or
Payment Card Industry Data Security Standard (PCI DSS), industry-specific
data privacy regulations such as HIPAA, or regional data privacy regulations,
such as Europe’s General Data Protection Regulation (GDPR) can be
devastating, with fines in the worst cases exceeding several million dollars per
violation.
Costs of repairing breaches and notifying customers: In addition to the cost of
communicating a breach to customer, a breached organization must pay for
forensic and investigative activities, crisis management, triage, repair of the
affected systems, and more.
Common threats and challenges
Many software misconfigurations, vulnerabilities, or patterns of carelessness or
misuse can result in breaches. The following are among the most common types
or causes of database security attacks and their causes.
Insider threats
An insider threat is a security threat from any one of three sources with privileged
access to the database:

A malicious insider who intends to do harm


A negligent insider who makes errors that make the database vulnerable to attack

Human error
Accidents, weak passwords, password sharing, and other unwise or uninformed
user behaviors continue to be the cause of nearly half (49%) of all reported data
breaches.(Link resides outside IBM)

Exploitation of database software vulnerabilities


Hackers make their living by finding and targeting vulnerabilities in all kinds of
software, including database management software. All major commercial
database software vendors and open source database management platforms
issue regular security patches to address these vulnerabilities, but failure to
apply these patches in a timely fashion can increase your exposure.

SQL/NoSQL injection attacks


A database-specific threat, these involve the insertion of arbitrary SQL or non-SQL
attack strings into database queries served by web applications or HTTP
headers. Organizations that don’t follow secure web application coding
practices and perform regular vulnerability testing are open to these attacks.

Malware
Malware is software written specifically to exploit vulnerabilities or otherwise
cause damage to the database. Malware may arrive via any endpoint device
connecting to the database’s network.
Attacks on backups
Organizations that fail to protect backup data with the same stringent controls used
to protect the database itself can be vulnerable to attacks on backups.
Best practices
When evaluating database security in your environment to decide on your team’s
top priorities, consider each of the following areas:

Physical security: Whether your database server is on-premise or in a cloud data


center, it must be located within a secure, climate-controlled environment. (If
your database server is in a cloud data center, your cloud provider will take care
of this for you.)
Administrative and network access controls: The practical minimum number of
users should have access to the database, and their permissions should be
restricted to the minimum levels necessary for them to do their jobs. Likewise,
network access should be limited to the minimum level of permissions
necessary.
End user account/device security: Always be aware of who is accessing the
database and when and how the data is being used. Data monitoring solutions
can alert you if data activities are unusual or appear risky. All user devices
connecting to the network housing the database should be physically secure (in
the hands of the right user only) and subject to security controls at all times.
Encryption: ALL data—including data in the database, and credential
data—should be protected with best-in-class encryption while at rest and in
transit. All encryption keys should be handled in accordance with best-practice
guidelines.
Database software security: Always use the latest version of your database
management software, and apply all patches as soon as they are issued.
Application/web server security: Any application or web server that interacts
with the database can be a channel for attack and should be subject to ongoing
security testing and best practice management.
Backup security: All backups, copies, or images of the database must be subject
to the same (or equally stringent) security controls as the database itself.

191. What is PAD index in sql server?

PAD_INDEX: Used to apply the free space percentage specified by FillFactor to


the index intermediate level pages during index creation. FILLFACTOR: Used
to set the percentage of free space that the SQL Server Engine will leave in the
leaf level of each index page during the index creation

192. What is Next Gen networking?


The term "next-generation network" or NGN refers to important developments in
telecommunication core and access networks to be deployed over the next
decade. ITU defines NGN as a packet-based network in which service-related
functions are independent from underlying transport-related technologies. NGN
enables unfettered access for users to networks and to competing service
providers and services of their choice. It supports generalised mobility which
will allow consistent and ubiquitous provision of services to users [ITU-T
Recommendation Y.2001 (12/2004)].

The NGN has the following fundamental characteristics:

Packet-based transfer
Separation of control functions among bearer capabilities, call/session, and
application/service
Decoupling of service provision from transport, and provision of open
interfaces
Support for a wide range of services, applications and mechanisms based on
service building blocks (including real time/streaming/non-real time services
and multi-media)

193. What is oracle instance management?


Instance management involves configuring parameters that affect the basic
operation of the database instance. These parameters are called initialization
parameters. The Oracle database server reads these parameters at database
startup and monitors them while the database is running.
What is the use of Oracle instance?
An Oracle instance (also known as a database instance) contains the set of Oracle
Database background processes that operate on the stored data and the shared
allocated memory that those processes use to do their work. In this tutorial you
learn how to manage your Oracle Database instance.

194. what is schema?


A schema is a collection of logical structures of data, or schema objects. A schema
is owned by a database user and has the same name as that user. Each user owns
a single schema. Schema objects can be created and manipulated with SQL and
include the following types of objects: Clusters.
197. what are the software that act as middleware?
Middleware is software which lies between an operating system and the
applications running on it. Essentially functioning as hidden translation layer,
middleware enables communication and data management for distributed
applications. It is sometimes called plumbing, as it connects two applications
together so data and databases can be easily passed between the “pipe.” Using
middleware allows users to perform such requests as submitting forms on a web
browser or allowing the web server to return dynamic web pages based on a
user’s profile.

Common middleware examples include database middleware, application server


middleware, message-oriented middleware, web middleware and
transaction-processing monitors.
198. what is JVM?
What is Java Virtual Machine (JVM)? Java Virtual Machine, or JVM, loads,
verifies and executes Java bytecode. It is known as the interpreter or the core of
Java programming language because it executes Java programming.

199. What is the use of database?


What are 10 uses for a database that you use?
On-Demand Online Video Streaming. ...
Social Gaming. ...
Personal Cloud Storage. ...
Sports. ...
Finances. ...
Government Organizations. ...
Social Media. ...
eCommerce.
More items...•

201. What is jenkins?

Jenkins is an open source continuous integration/continuous delivery and


deployment (CI/CD) automation software DevOps tool written in the Java
programming language. It is used to implement CI/CD workflows, called
pipelines.

Pipelines automate testing and reporting on isolated changes in a larger code base
in real time and facilitates the integration of disparate branches of the code into
a main branch. They also rapidly detect defects in a code base, build the
software, automate testing of their builds, prepare the code base for deployment
(delivery), and ultimately deploy code to containers and virtual machines, as
well as bare metal and cloud servers. There are several commercial versions of
Jenkins. This definition only describes the upstream open source project.

202. What is job in jenkins?


A job is a runnable task that Jenkins controls to achieve a required objective. Also,
we can create a new job by clicking on "New Item" in the Jenkins dashboard.

203. What is SVM?


Support Vector Machine Algorithm
Support Vector Machine or SVM is one of the most popular Supervised Learning
algorithms, which is used for Classification as well as Regression problems.
However, primarily, it is used for Classification problems in Machine Learning.

The goal of the SVM algorithm is to create the best line or decision boundary that
can segregate n-dimensional space into classes so that we can easily put the new
data point in the correct category in the future. This best decision boundary is
called a hyperplane.

SVM chooses the extreme points/vectors that help in creating the hyperplane.
These extreme cases are called as support vectors, and hence algorithm is
termed as Support Vector Machine. Consider the below diagram in which there
are two different categories that are classified using a decision boundary or
hyperplane:

204. what is raid 4


205. raid 1
206. peer to peer
207. client serve architecture
208. what is application management
209. what are the diffrent records of DNS
1. half duplex / full duplex with examples
2. types of versions of ITIL
3. what is the use of edge in windows 10/ is it only a normal browser?
4. what is loop back address in networking, what is use
5. what is the port no. for DHCP
6. What is the use of traceroute command
7. static routing / dynamic routing
8. why should we hire you
9. what kind of task you carry on if i hire you
10.how to access 1 system to another system
11.Unix vs linux
12.what is linuxkernal
13.difference between Unix and windows
14.gig
15.what is reflective listening
16.primary role as administrator
17.what you learn in ITIL
18.what is soap
19.what is SLA
20.Net backup
21.different types of backup techniques
22.types of backup tools
23.different backup targets
24.disk management
25.linux commands
26.example of cisco switch commands
27.what is Nas
28.what is das
29.Nas VS Das
30.Components of office 365
31.what is office 365
32.advantages of office 365
33.Is office 365 paid service ?
34.user per acc. office365/ cost effective?
35.diffrence b/w static routing and dynamic routing
36.What is simple storage device in cloud
37. Diff between truncate and delete
38. How to delete duplicate rows
39. What command to copy a file to another directory in linux
40. What is synchronised messaging and unsynchronised messeging
41. What is osi model
42. What are the different layers of osimodel
43. What is the work of presentation layer
44. What is java messaging service
45. what is ami
46.What is incident
47.Diff bet RDBMS &DBMS
48. diff bet drop & delete
49. What is cloud computing
50.What are the layers of cloud.
51.1.How to find IP address in windows

52.2.What VPN

53.3.Device Manager

54.4.What will you do If ur laptop running slow

55.5.How was Training

56.6.What u have learn in training

57.7.What is ITIL and use

58.What is Linux and windows operating system.

59.Which is more safe Linux or windows OS.

60.Which is more user friendly Linux or windows.

61.What is thermodynamics and pitting in mechanical engineering.

62.Covid situation in your state.

63.Precautions to be taken in covid situation.

64.Any questions you want to ask.

65.What is ITIL why ITEL? Explain about ITIL?

66. Difficult situations in your life and how u over come it?

John vector ;

What is region in cloud?

What is availability in cloud?


Types of clouds

What did you learn in linux

How to remove non removable directory ?

How to list file systems in linux?

How to check cpu utilisation/usage?

FILE SYSTEMS

How to schedule in linux ?

Which is latest version in windows ? - 11

What is active directory.

sar command

How to check ip address?

Latest windows server version ? - 2019

What is MAC address

How to test website is working or not in command line ?

What is subnet?

What is IAM?

Diff without Saas , paas and iaas?

Advantage of hybrid cloud ?

what is SSL?

What is office 365

What is sharepoint

Which programming language do you know ?

What is vpc ? - virtual private cloud


What is dns?

Interviewer- Surendar Yadhav Govindarajalu

Basic ice breaking session.

From where you cmpltd your engineering?

Intro, hobbies and interest

Why cts?

Technologies you learnt. Technology you are confident in.

What is networking? What are types of network?

What is VPN? Why we use VPN?

What is topology? Types of topology?

Different classes of IP? Range of class C IP Address?

Private and Public IP Address

Port no of- http, https, dns, smtp, ssh

Which protocol has port no 21?

Difference between tcp and udp

What is broadcasting and multicasting?

What is firewall?

Difference between hub, switch and router

What you know about linux?

What is linux?
Difference between linux and unix

Examples of linux os.

How will you find version of linux kernel?

How you can access linux machine?

Commands in linux

What is cloud and cloud computing?

Different layer of clouds. Explain it.

You might also like