0% found this document useful (0 votes)
9 views

Interview Point of Questions

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Interview Point of Questions

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1 . How will reset the password in windows sever and Linux machine?

Ans : Windows: We have to login on server through RDP we can see the option user management >> if
we can click on we can see the option of users >> we can see the Administrator option we can click on
right we can see the option set password

Windows+R-> lusrmgr.msc

Linux: First we have to login to the Linux server using root password. If we can type the Command
passwd<user name > it will ask us to New password re- enter the new password

2. How will you troubleshoot if Server un reachable?

Ans : First we have to check server is pinging or not using this request. If we can type ping <IP address>

Linux : If we get any server unreachability issues on Linux server .we will try logging into the server using
SSH <ip address>or ping <ip address > command

If it gives proper output like ttl and time in milliseconds, then server is reachable. If we can give the
uptime command it will show us clear information when the sever is up and running.

If the output says timed out than we have to escalate the ticket to concern team.

3. what are the action you will do if you get a high filesystem utilization alerts /file system full alerts?

Ans: First we will login into the server by using ip address or host name.

Then we will hit df -h command it will give the list of filesystems and its usage, we will check the file
system whose usage is high.

We will go the concerned mount directory and list the directories and files available using the
command ls- ltr then we use du -sch * command (DU-disk usage) then we will see which directory or
file consuming more utilization. If they are our scope and we can remove those files by using
rm -rf <directory name/filename> command.

If we are not sure about deleting them, we will escalate them to concerned team

4.How will check to the CPU utilization alerts?


Ans : WINTAL:

If we get any CPU alerts in wintel we have to login wintel server through RDC(REMOTE DESKTOP
CONNECTION)

Go to taskbar and check in which application is taking higher CPU and inform to the user to optimize
those applications.

Linux:
If we get any CPU utilization alerts we will login into the server and then we can check CPU usage “top
command “. It will show list of all the process and their CPU usage. If CPU is normal we close the alert, If
not we will escalate them to concern team for further action
5. Can you please explain me about Linux server patching activity?
Ans : Before perform the patching activity we will ask the backup team take the back up to avoid the
data loss in Linux server We will schedule patching activities based on client requirements at weekends
or off business hours ...we will use this command for patching
Yum update command
If client don’t want to update specific package yum
yum update --exclude <package name>

6. How will you check memory utilization alerts?

Ans : First we will login into the server by using ssh command in whichever server we got the Memory
alert. Then we will type free -m command to see the total memory allocated, its usage and free
memory available. We can also see the process id, user and memory utilization in the top command
we will inform the concerned team by providing the process id(PID) details and request them for
further action.

7. How to check history Linux sever ?


Ans : By using the yum history command

8. what is meant by snapshot?


Ans : Snapshot is nothing but a the current state of virtual machine.

9. what is meant by User management and explain me`` about the Managing users and their
permissions in the Linux servers?
To create user, delete user, modify permissions of the user comes under user management
User creation :
useradd <user name>
User del:
Userdel <user name>
User permissions:
Chmod
Umask
10) What is ITIL process?

Being into a support environment, one must be thorough with ITIL principles.
ITIL stands for Information Technology Infrastructure Library.
It consists of incident management, problem management and change management.
Unplanned event or service interruption comes under incident management. Most of our work involves
“Incident Management” only.
Problem is the underlying reason for one or more incidents. Finding the root cause comes under
“Problem Management “
For all scheduled activities mainly on production environment, we create changes, get approvals from
customers and internal teams and prepare run books and schedule them on weekends. This is “Change
Management “.
ITIL also includes SLA , OLA and response SLAs .
SLA stands for service level agreement. We have multiple priority tickets and each one have its own
SLAs . Like 1 hour for P1 , 8 hours for P2 and so on
OLA : Operation Level Agreement .
The time it takes to assign the ticket as soon as it reaches our queue.
Response SLA : The time it takes to send an initial communication to the customer.

11) What are the tools you have worked on?


GUTS
Skyvine
Armada
Google vendor portal

If we get any alters or incidents via skyvine tool,


we will collect their id and check it in Google Vendor portal tool weather the user is vendor or temp , full
time employees or director .
In armada tool we will find the information particular asset id of the customer which includes ip address
of the machine, operating system is using whether it is Linux , windows , MacBook and Chromebook and
we can also see any patching, updates or restarts pending for their os .If we see something like that ,we
will check our SOP documents based on the issue and advise them to follow those steps .
Grafana dashboards:
we use to monitor in Grafana dashboards, when we get any alert like high cpu utilization or high memory
utilization, we will be login into the Grafana dashboards and see ach dash boards if the alert is genuine.
In our environment we have CPU utilization, memory utilization, file system utilization, disk io and late
and see dashboards configured each of the servers.

12) What are the environments you have ?


We have mainly 4 environments prod , uat , qa and dev . Uat ,qa and dev are the nonprod environments .
We work on both prod and non prod servers here in google
13) what is IP address?
Ans : An IP address is unique numerical label assigned to each device in a network to identity and locate
it.

14)explain difference between IPv4 and 1Pv6 ?


Ans: IPv4 uses a 32-bit address format, while 1Pv6 uses a 128-bit address format .IPv6 was introduced
to overcome the shortage of available IPv4 addresses.
15) what is subnet mask ?
Ans : A subnet mask is used to divide an ip address is the network and which is host .

16) Define MAC address ?


A MAC address (Media Access Control address) is a hardware address that uniquely identifies a device on
a local network.

17)what is router ?
Ans : A router is a networking device that forwards data packets between different computer networks.

18) explain the OSI model and its layers ?


Ans : The OSI model is a conceptual framework that standardizes the functions of telecommunications or
network system. It has seven layers, from physical to application.

19)what is firewall?
Ans : A firewall is network security device that filters incoming and outgoing network traffic based on an
organization’s previously established security policies.
20) what is DNS and how does it work?
Ans : DNS (Domain Name System )translate human -friendly ___domain names into IP address, allowing
users to access websites by name.

21)what is DHCP server?


Ans : DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP
addresses and configuration information to devices on a network.
22) Explain about NAT?
Ans : NAT(Network address Translation) is a method used to modify network address information in
packet headers while in transit , typically used to allow multiple devices to share a single public IP
address.

You might also like