Add office photos
Employer?
Claim Account for FREE

VMware Software

4.4
based on 1.1k Reviews
Video summary
Filter interviews by

100+ Interview Questions and Answers

Updated 7 Jan 2025
Popular Designations

Q1. Next Smallest Palindrome Problem Statement

Find the next smallest palindrome strictly greater than a given number 'N' represented as a string 'S'.

Explanation:

You are given a number in string format, and your ...read more

Ans.

Find the next smallest palindrome greater than a given number represented as a string.

  • Iterate from the middle of the number and mirror the left side to the right side to create a palindrome

  • If the resulting palindrome is greater than the input number, return it

  • Handle cases where the number has all 9s and requires a carry over to the left side

Add your answer

Q2. Check Permutation Problem Statement

Given two strings 'STR1' and 'STR2', determine if they are anagrams of each other.

Explanation:

Two strings are considered to be anagrams if they contain the same characters,...read more

Ans.

Check if two strings are anagrams of each other by comparing their characters.

  • Create a character frequency map for both strings and compare them.

  • Sort both strings and compare if they are equal.

  • Use a hash set to store characters from one string and remove them while iterating through the other string.

  • Check if the character counts of both strings are equal.

  • Example: For input 'listen' and 'silent', the output should be true.

Add your answer

Q3. What Docker command can you use to transfer an image from one machine to another without using a Docker registry?

Ans.

Docker save and Docker load commands can be used to transfer an image from one machine to another without using a Docker registry.

  • Use the 'docker save' command to save the image as a tar file on the source machine

  • Transfer the tar file to the destination machine using any file transfer method (e.g., scp)

  • On the destination machine, use the 'docker load' command to load the image from the tar file

View 3 more answers

Q4. Search In Rotated Sorted Array Problem Statement

Given a rotated sorted array ARR of size 'N' and an integer 'K', determine the index at which 'K' is present in the array.

Note:
1. If 'K' is not present in ARR,...read more
Ans.

Given a rotated sorted array, find the index of a given integer 'K'.

  • Perform binary search to find the pivot point where the array is rotated.

  • Based on the pivot point, apply binary search on the appropriate half of the array to find 'K'.

  • Handle cases where 'K' is not present in the array by returning -1.

  • Example: For ARR = [12, 15, 18, 2, 4] and K = 2, the index of K is 3.

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. How does HA works? Port number? How many host failure allowed and why? ANS--> Maximum allowed host failures within a HA cluster is 4. What happens if 4 hosts have failed and a 5th one also fails. I have still e...

read more
Ans.

VMware HA allows for a maximum of 4 host failures within a cluster. If a 5th host fails, VMs may not restart depending on admission control settings.

  • Maximum allowed host failures within a HA cluster is 4

  • If a 5th host fails and admission control is enabled, some VMs may not restart due to resource constraints

  • If admission control is disabled, VMs will restart on any remaining host but may not be functional

  • Ensure enough port groups are configured on vSwitch for Virtual Machine p...read more

Add your answer
Q6. Which data structure would you use to implement the undo and redo operation in a system?
Ans.

Use a stack data structure for implementing undo and redo operations.

  • Stack data structure is ideal for implementing undo and redo operations as it follows Last In First Out (LIFO) principle.

  • Push the state of the system onto the stack when an action is performed, allowing for easy undo by popping the top element.

  • Redo operation can be implemented by keeping a separate stack for redo actions.

  • Example: In a text editor, each change in text can be pushed onto the stack for undo and...read more

View 2 more answers
Are these interview questions helpful?

Q7. Minimum Jumps Problem Statement

Bob and his wife are in the famous 'Arcade' mall in the city of Berland. This mall has a unique way of moving between shops using trampolines. Each shop is laid out in a straight...read more

Ans.

Calculate minimum jumps required to reach the last shop using trampolines, or return -1 if impossible.

  • Iterate through the array of shops while keeping track of the maximum reachable shop from the current shop.

  • If at any point the maximum reachable shop is less than the current shop, return -1 as it's impossible to reach the last shop.

  • Return the number of jumps made to reach the last shop.

Add your answer

Q8. Pair Sum in Binary Search Tree

Given a Binary Search Tree (BST) and a target value 'K', determine if there exist two unique elements in the BST such that their sum equals the target 'K'.

Explanation:

A BST is a...read more

Ans.

Check if there exist two unique elements in a BST that sum up to a target value 'K'.

  • Traverse the BST in-order to get a sorted array of elements.

  • Use two pointers approach to find the pair sum in the sorted array.

  • Consider edge cases like duplicate elements or negative values.

  • Time complexity can be optimized to O(n) using a HashSet to store visited nodes.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Reverse Linked List Problem Statement

Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.

Input:

The first line of input is an integer T, rep...read more
Ans.

Reverse a singly linked list by altering the links between nodes.

  • Iterate through the linked list and reverse the links between nodes

  • Use three pointers to keep track of the current, previous, and next nodes

  • Update the links between nodes until the end of the list is reached

Add your answer

Q10. Problem: Sort an Array of 0s, 1s, and 2s

Given an array/list ARR consisting of integers where each element is either 0, 1, or 2, your task is to sort this array in increasing order.

Input:

The input starts with...read more
Ans.

Sort an array of 0s, 1s, and 2s in increasing order.

  • Use a three-pointer approach to partition the array into sections of 0s, 1s, and 2s.

  • Iterate through the array and swap elements based on their values.

  • Time complexity should be O(n) to meet the constraints.

Add your answer

Q11. Convert Array to Min Heap Task

Given an array 'ARR' of integers with 'N' elements, you need to convert it into a min-binary heap.

A min-binary heap is a complete binary tree where each internal node's value is ...read more

Ans.

Convert the given array into a min-binary heap by modifying the array elements.

  • Iterate through the array and heapify each node starting from the last non-leaf node to the root node.

  • For each node, compare it with its children and swap if necessary to satisfy the min-heap property.

  • Continue this process until the entire array is converted into a min-heap.

Add your answer

Q12. Tower of Hanoi Problem Statement

You have three rods numbered from 1 to 3, and 'N' disks initially stacked on the first rod in increasing order of their sizes (largest disk at the bottom). Your task is to move ...read more

Ans.

Tower of Hanoi problem where 'N' disks need to be moved to another rod following specific rules in less than 2^N moves.

  • Implement a recursive function to move disks from one rod to another following the rules.

  • Use the concept of recursion and backtracking to solve the Tower of Hanoi problem efficiently.

  • Maintain a count of moves and track the movement of disks in a 2-D array/list.

  • Ensure that larger disks are not placed on top of smaller disks while moving.

  • Return the 2-D array/li...read more

Add your answer

Q13. Reverse Stack with Recursion

Reverse a given stack of integers using recursion. You must accomplish this without utilizing extra space beyond the internal stack space used by recursion. Additionally, you must r...read more

Ans.

Reverse a given stack of integers using recursion without using extra space or loops.

  • Use recursion to pop all elements from the original stack and store them in function call stack

  • Once the stack is empty, push the elements back in reverse order using recursion

  • Use the top(), pop(), and push() methods to manipulate the stack

Add your answer

Q14. Reverse List In K Groups Problem Statement

You are provided with a linked list having 'N' nodes and an integer 'K'. Your task is to reverse the linked list in groups of size K. If the list is numbered from 1 to...read more

Ans.

Reverse a linked list in groups of size K

  • Iterate through the linked list in groups of size K

  • Reverse each group of nodes

  • Handle cases where the last group may have fewer than K nodes

Add your answer

Q15. Problem: Search In Rotated Sorted Array

Given a sorted array that has been rotated clockwise by an unknown amount, you need to answer Q queries. Each query is represented by an integer Q[i], and you must determ...read more

Ans.

Search for integers in a rotated sorted array efficiently.

  • Use binary search to find the pivot point where the array is rotated.

  • Based on the pivot point, apply binary search on the appropriate half of the array.

  • Return the index of the integer if found, else return -1.

  • Time complexity should be O(logN) for each query.

Add your answer

Q16. Common Elements in Three Sorted Arrays

Given three sorted arrays A, B, and C of lengths N, M, and K respectively, your task is to find all elements that are present in all three arrays.

Input:

The first line co...read more
Ans.

Find common elements in three sorted arrays and output them in order.

  • Iterate through all three arrays simultaneously using three pointers.

  • Compare elements at pointers and move pointers accordingly.

  • If elements are equal, add to result and move all pointers forward.

  • If elements are not equal, move pointer of smallest element forward.

Add your answer

Q17. Flip Bits Problem Explanation

Given an array of integers ARR of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can be obta...read more

Ans.

Given an array of 0s and 1s, find the maximum count of 1s by flipping a sub-array at most once.

  • Iterate through the array and keep track of the maximum count of 1s obtained by flipping a sub-array.

  • Consider flipping a sub-array from index i to j by changing 0s to 1s and vice versa.

  • Update the maximum count of 1s if the current count is greater.

  • Return the maximum count of 1s obtained after flipping a sub-array at most once.

Add your answer

Q18. Reverse Number Problem Statement

Ninja is exploring new challenges and desires to reverse a given number. Your task is to assist Ninja in reversing the number provided.

Note:

If a number has trailing zeros, the...read more

Ans.

Implement a function to reverse a given number, omitting trailing zeros.

  • Create a function that takes an integer as input and reverses it while omitting trailing zeros

  • Use modulo and division operations to extract digits and reverse the number

  • Handle cases where the reversed number has leading zeros by omitting them

  • Ensure the reversed number is within the constraints specified

Add your answer
Q19. Can you design the bank architecture using basic OOP concepts in any programming language?
Ans.

Yes, I can design the bank architecture using basic OOP concepts in any programming language.

  • Create classes for entities like Bank, Account, Customer, Transaction, etc.

  • Use inheritance to model relationships between entities (e.g. SavingsAccount and CheckingAccount inheriting from Account).

  • Implement encapsulation to hide internal details of classes and provide public interfaces for interaction.

  • Utilize polymorphism to allow different classes to be treated as instances of a comm...read more

Add your answer

Q20. Remove Duplicates From Unsorted Linked List Problem Statement

You are provided with a linked list consisting of N nodes. Your task is to remove duplicate nodes such that each element occurs only once in the lin...read more

Ans.

Remove duplicates from an unsorted linked list while preserving the order of nodes.

  • Iterate through the linked list while keeping track of seen elements using a hash set.

  • If a duplicate element is encountered, skip it by adjusting the pointers.

  • Ensure the order of nodes is preserved by only keeping the first occurrence of each element.

Add your answer

Q21. Check If Preorder Traversal Is Valid

Determine whether a given array ARR of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).

A binary search tree (BST) is a tree structure where ea...read more

Ans.

Check if a given array of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).

  • Create a function that takes the array as input and checks if it satisfies the properties of a BST preorder traversal.

  • Iterate through the array and maintain a stack to keep track of the nodes in the BST.

  • Compare each element with the top of the stack to ensure it follows the BST property.

  • If the array is a valid preorder traversal of a BST, return 1; otherwise, return 0.

Add your answer

Q22. First and Last Position of an Element in a Sorted Array

Given a sorted array/list ARR consisting of ‘N’ elements, and an integer ‘K’, your task is to find the first and last occurrence of ‘K’ in ARR.

Explanatio...read more

Ans.

Find the first and last occurrence of a given element in a sorted array.

  • Use binary search to find the first occurrence of the element.

  • Use binary search to find the last occurrence of the element.

  • Handle cases where the element is not present in the array.

Add your answer

Q23. Intersection of Two Arrays Problem Statement

Given two arrays A and B with sizes N and M respectively, both sorted in non-decreasing order, determine their intersection.

The intersection of two arrays includes ...read more

Ans.

The problem involves finding the intersection of two sorted arrays efficiently.

  • Use two pointers to iterate through both arrays simultaneously.

  • Compare elements at the pointers and move the pointers accordingly.

  • Handle cases where elements are equal or not equal to find the intersection.

  • Return the intersection as an array of common elements.

Add your answer

Q24. Convert Sorted Array to BST Problem Statement

Given a sorted array of length N, your task is to construct a balanced binary search tree (BST) from the array. If multiple balanced BSTs are possible, you can retu...read more

Ans.

Construct a balanced binary search tree from a sorted array.

  • Create a function that recursively constructs a balanced BST from a sorted array.

  • Use the middle element of the array as the root of the BST.

  • Recursively build the left and right subtrees using the elements to the left and right of the middle element.

  • Ensure that the left and right subtrees are also balanced BSTs.

  • Return 1 if the constructed tree is correct, otherwise return 0.

Add your answer

Q25. Segregate Odd-Even Problem Statement

In a wedding ceremony at NinjaLand, attendees are blindfolded. People from the bride’s side hold odd numbers, while people from the groom’s side hold even numbers. For the g...read more

Ans.

Rearrange a linked list such that odd numbers appear before even numbers while preserving the order of appearance.

  • Iterate through the linked list and maintain two separate lists for odd and even numbers.

  • Merge the two lists while preserving the order of appearance.

  • Ensure to handle edge cases like empty list or list with only odd or even numbers.

Add your answer
Q26. How can you copy Docker images from one host to another without using a repository?
Ans.

Docker images can be copied from one host to another using 'docker save' and 'docker load' commands.

  • Use 'docker save' command to save the image as a tar file on the source host

  • Transfer the tar file to the destination host using SCP or any other file transfer method

  • Use 'docker load' command on the destination host to load the image from the tar file

Add your answer

Q27. What is a use case that would require setting up distributed Jenkins nodes?

Ans.

Distributed Jenkins nodes are used to handle large-scale builds and improve performance.

  • Large-scale builds: When there are a large number of builds to be executed simultaneously, distributed Jenkins nodes can handle the load by distributing the builds across multiple nodes.

  • Improved performance: By distributing the workload, the overall build time can be reduced, resulting in improved performance.

  • Resource utilization: Distributed nodes allow for better utilization of resources...read more

View 1 answer

Q28. 8 coins are given where all the coins have equal weight, except one. The odd one may be less weight than the other or it may be heavier than the rest 7 coins. In the worst case, how many iterations are needed t...

read more
Ans.

Identify the odd coin among 8 using a balance scale in a maximum of 3 weighings.

  • Use a balance scale to compare groups of coins.

  • First, divide the 8 coins into three groups: 3, 3, and 2.

  • Weigh the first two groups (3 vs 3). If they balance, the odd coin is in the group of 2.

  • If one group is heavier or lighter, the odd coin is in that group of 3.

  • In the second weighing, take 2 coins from the suspected group and weigh them against each other.

  • If they balance, the odd coin is the one ...read more

Add your answer
Q29. What is a use case that would require the setup of distributed Jenkins nodes?
Ans.

Setting up distributed Jenkins nodes is necessary for scaling Jenkins infrastructure and improving performance.

  • When there is a need to run a large number of jobs simultaneously

  • When jobs require different environments or configurations

  • When jobs need to be executed on different platforms or operating systems

  • When there is a need for high availability and fault tolerance

  • When there is a need to reduce build queue times and improve overall performance

Add your answer
Q30. What happens to the load balancer when an instance in AWS is deregistered?
Ans.

When an instance in AWS is deregistered, the load balancer stops sending traffic to that instance.

  • The load balancer detects the deregistration of the instance and stops routing traffic to it.

  • The load balancer redistributes the traffic to the remaining healthy instances.

  • The deregistered instance is no longer considered part of the load balancer's target group.

  • The load balancer health checks will mark the instance as unhealthy.

  • The load balancer will not send any new requests to...read more

Add your answer
Q31. How do you debug a website template that is very slow?
Ans.

To debug a slow website template, analyze performance metrics, check for inefficient code, optimize images and assets, and consider server-side improvements.

  • Analyze performance metrics using tools like Chrome DevTools or Lighthouse to identify bottlenecks.

  • Check for inefficient code such as unnecessary loops, redundant CSS rules, or large JavaScript files.

  • Optimize images and assets by compressing files, using lazy loading, or implementing a content delivery network (CDN).

  • Consi...read more

Add your answer
Q32. What is the difference between an inode number and a file descriptor?
Ans.

Inode number is a unique identifier for a file in a filesystem, while a file descriptor is a reference to an open file.

  • Inode number is a metadata associated with a file, stored in the filesystem's inode table.

  • File descriptor is a reference to an open file in a process, represented by an integer.

  • Inode number remains constant for a file even if it is moved or renamed, while file descriptor changes with each open/close operation.

  • Example: In a Unix-like system, 'ls -i' command di...read more

Add your answer

Q33. What are the prerequisites for VMotion?

Ans.

Prerequisites for VMotion include network configuration, CPU compatibility, shared storage, and virtual switch restrictions.

  • ESX Servers must have VMkernel ports enabled for VMotion on the same network segment

  • ESX Servers must be managed by the same Virtual Center server

  • ESX Servers must have compatible CPUs

  • ESX Servers must have consistent networks and network labels

  • VMs must be stored on shared storage like iSCSI, FC SAN, or NAS/NFS

  • VMs cannot use local CD/floppy or internal-only...read more

Add your answer

Q34. There are at most eight servers in a data center. Each server has a capacity/memory limit. There can be at most eight tasks that need to be scheduled on those servers. Each task requires a certain capacity/memo...

read more
Add your answer
Q35. Can you write an Ansible playbook to install Apache?
Ans.

Yes, I can write an Ansible playbook to install Apache.

  • Use the 'apt' module to install Apache on Debian/Ubuntu systems

  • Use the 'yum' module to install Apache on Red Hat/CentOS systems

  • Ensure to start and enable the Apache service after installation

Add your answer
Q36. How would you debug issues with Apache and Nginx?
Ans.

To debug issues with Apache and Nginx, check error logs, configuration files, server status, and network connectivity.

  • Check error logs for any relevant error messages or warnings.

  • Review configuration files for any misconfigurations or typos.

  • Check server status to ensure services are running and responding correctly.

  • Verify network connectivity to ensure there are no network issues affecting communication.

  • Use tools like curl, telnet, or netcat to test connections and troublesho...read more

Add your answer

Q37. Describe the Akamai request flow and the hierarchy of rules parsed when a request reaches Akamai.

Ans.

Akamai request flow involves parsing rules in a hierarchical manner.

  • Akamai request flow involves multiple stages and rules.

  • When a request comes to Akamai, it goes through a series of stages such as Edge server selection, caching, and delivery.

  • During each stage, different rules are parsed and applied based on the configuration.

  • The hierarchy of rules determines the order in which they are evaluated and applied.

  • For example, caching rules may be evaluated before delivery rules.

  • Th...read more

Add your answer

Q38. How would you debug a website that is progressively slowing down?

Ans.

To debug a progressively slowing down website, I would analyze the server logs, check for memory leaks, and optimize the code.

  • Analyze server logs to identify any errors or bottlenecks

  • Check for memory leaks in the code

  • Optimize the code by removing unnecessary scripts and optimizing images

  • Use tools like Chrome DevTools to identify performance issues

  • Consider implementing a content delivery network (CDN) to improve website speed

Add your answer
Q39. What is the difference between constructor injection and setter injection in dependency injection?
Ans.

Constructor injection passes dependencies through a class constructor, while setter injection uses setter methods.

  • Constructor injection is done by passing dependencies as parameters to the constructor.

  • Setter injection involves calling setter methods to set the dependencies after the object is created.

  • Constructor injection ensures that all required dependencies are provided at the time of object creation.

  • Setter injection allows for optional dependencies to be set after the obj...read more

Add your answer

Q40. Given an array of balls with three colors: Red, Green, and Blue, rearrange the array so that all red balls are on the left, green balls are in the middle, and blue balls are on the right.

Add your answer
Q41. What are the different states of entity instances?
Ans.

Entity instances can be in new, managed, detached, or removed states.

  • New state: when an entity is first created but not yet associated with a persistence context.

  • Managed state: when an entity is being managed by a persistence context and any changes made to it will be tracked.

  • Detached state: when an entity was previously managed but is no longer associated with a persistence context.

  • Removed state: when an entity is marked for removal from the database.

Add your answer

Q42. Why are processes for my virtual machine still visible when running the ps command on the Service Console, even though my virtual machine is powered down?

Ans.

Virtual machine processes may still be visible in the Service Console even when powered down.

  • Virtual machine processes may still be running in the background even when the virtual machine is powered down.

  • The ps command shows all processes running on the system, including those related to virtual machines.

  • Some processes may continue to run for maintenance or monitoring purposes even when the virtual machine is not actively running.

Add your answer

Q43. When we click on the power button of our Laptop, what happens immediately and how is Windows loaded?

Ans.

Pressing the power button initiates the boot process, loading Windows through a series of hardware and software checks.

  • Power button pressed: Sends a signal to the motherboard to start the boot process.

  • POST (Power-On Self Test): The BIOS/UEFI checks hardware components like RAM, CPU, and storage.

  • Bootloader: BIOS/UEFI locates the bootloader on the storage device (e.g., HDD, SSD).

  • Windows Boot Manager: The bootloader loads the Windows Boot Manager, which prepares the OS for loadi...read more

Add your answer
Q44. What are the advantages of design patterns in Java?
Ans.

Design patterns in Java provide reusable solutions to common problems, improving code quality and maintainability.

  • Promotes code reusability by providing proven solutions to common design problems

  • Improves code maintainability by following established best practices

  • Enhances code readability by providing a common language for developers to communicate design ideas

  • Helps in creating scalable and flexible software architecture

  • Examples include Singleton, Factory, Observer, and Strat...read more

Add your answer
Q45. Design a file searching functionality for Windows and Mac that includes indexing of file names.
Ans.

Design a file searching functionality with indexing for Windows and Mac.

  • Implement a search algorithm to quickly find files based on user input.

  • Create an index of file names to improve search speed.

  • Support both Windows and Mac operating systems.

  • Utilize system APIs for file access and indexing.

  • Provide a user-friendly interface for searching and browsing files.

  • Consider implementing filters for file type, size, and date modified.

Add your answer
Q46. How would you design a system for MakeMyTrip?
Ans.

Designing a system for MakeMyTrip

  • Utilize a microservices architecture to handle different functionalities like flight booking, hotel reservations, and holiday packages

  • Implement a robust backend system to handle high traffic and ensure scalability

  • Incorporate a user-friendly interface for easy navigation and booking process

  • Integrate payment gateways for secure transactions

  • Include features like personalized recommendations, loyalty programs, and customer support chatbots

  • Utilize ...read more

Add your answer
Q47. How would you prevent a DDoS attack?
Ans.

To prevent a DDoS attack, implement network security measures, use DDoS mitigation services, and monitor traffic patterns.

  • Implement network security measures such as firewalls, intrusion detection systems, and access control lists.

  • Use DDoS mitigation services from providers like Cloudflare or Akamai to filter out malicious traffic.

  • Monitor traffic patterns and set up alerts for unusual spikes in traffic that could indicate a DDoS attack.

  • Consider implementing rate limiting or C...read more

Add your answer
Q48. What is the difference between the MVC (Model-View-Controller) and MVT (Model-View-Template) design patterns?
Ans.

MVC focuses on separating concerns of an application into three components, while MVT is a variation used in Django framework.

  • MVC separates an application into Model (data), View (presentation), and Controller (logic) components.

  • MVT is used in Django framework where Model represents data, View represents presentation, and Template represents logic.

  • In MVC, the Controller handles user input and updates the Model and View accordingly.

  • In MVT, the Template handles user input and u...read more

Add your answer
Q49. What are the different types of advice in Spring AOP?
Ans.

Types of advice in Spring AOP include before, after, around, after-returning, and after-throwing.

  • Before advice: Executed before the method invocation.

  • After advice: Executed after the method invocation, regardless of its outcome.

  • Around advice: Wraps around the method invocation, allowing for custom behavior before and after.

  • After-returning advice: Executed after the method successfully returns a value.

  • After-throwing advice: Executed after the method throws an exception.

Add your answer
Q50. What are the benefits of the Java Executor Framework?
Ans.

The Java Executor Framework provides a way to manage and control the execution of tasks in a multithreaded environment.

  • Allows for easy management of thread pools, reducing overhead of creating new threads for each task.

  • Provides a way to schedule tasks for execution at a specific time or with a delay.

  • Supports task cancellation and interruption.

  • Facilitates handling of task dependencies and coordination between tasks.

  • Offers better control over thread execution, such as setting t...read more

Add your answer

Q51. Given a list of arraylists containing elements, write a function that prints out the permutations of the elements such that each permutation set contains only 1 element from each arraylist and there are no dupl...

read more
Ans.

Function to print permutations of elements from arraylists with no duplicates.

  • Use recursion to generate all possible permutations by selecting one element from each arraylist at a time.

  • Keep track of used elements to avoid duplicates in the permutation sets.

  • Use a set data structure to store and check for duplicates efficiently.

Add your answer

Q52. Is there a way to blacklist IPs in AWS?

Ans.

Yes, AWS provides various methods to blacklist IPs.

  • Use AWS WAF to create rules to block specific IP addresses

  • Configure security groups to deny traffic from specific IP addresses

  • Utilize AWS Network ACLs to block traffic from specific IP addresses

View 2 more answers

Q53. I want to add a new VLAN to the production network? What are the steps involved in that? And how do you enable it?

Ans.

Adding a new VLAN to a production network involves several steps and enabling it requires configuration changes.

  • Plan the new VLAN configuration including VLAN ID, subnet, and gateway.

  • Configure the switch or router to create the new VLAN.

  • Assign ports to the new VLAN as needed.

  • Enable routing between the new VLAN and other VLANs if required.

  • Test the new VLAN to ensure connectivity and functionality.

  • Examples: VLAN 20 with subnet 192.168.20.0/24 and gateway 192.168.20.1.

  • Examples: ...read more

Add your answer

Q54. What the difference between connecting the ESX host through VC and Vsphere? What are the services involved in that? What are the port numbers’s used?

Ans.

Connecting ESX host through VC and vSphere involves different services and port numbers.

  • Connecting ESX host through VC involves vCenter Server which provides centralized management and monitoring.

  • Connecting ESX host through vSphere involves vCenter Server along with additional services like vSphere Client and vSphere Web Client.

  • Some of the services involved in connecting ESX host through VC and vSphere include vCenter Server, vSphere Client, vSphere Web Client, and ESXi host ...read more

Add your answer

Q55. How do you implement the Executor Framework, and what are its benefits?

Ans.

Executor framework is used to manage threads and execute tasks asynchronously.

  • Executor framework provides a way to manage threads and execute tasks asynchronously.

  • It provides a thread pool and a queue to manage tasks.

  • It helps in improving the performance of the application by reducing the overhead of creating and destroying threads.

  • It also provides a way to handle exceptions and errors in the tasks.

  • Example: Executors.newFixedThreadPool(10) creates a thread pool of 10 threads.

Add your answer
Q56. What are the advantages and disadvantages of the buddy system?
Ans.

The buddy system has advantages like increased safety and support, but also drawbacks like dependency and lack of independence.

  • Advantages: increased safety, support, accountability, motivation

  • Disadvantages: dependency, lack of independence, potential for conflicts

  • Example: In a buddy system at work, colleagues can support each other in completing tasks and provide motivation to stay on track.

  • Example: However, relying too heavily on a buddy can lead to dependency and hinder ind...read more

Add your answer

Q57. Given an array representing a post-order traversal of a binary tree, write a function to check if the binary tree formed from the array is a Binary Search Tree.

Ans.

Check if a Binary Tree formed from a Post order traversal array is a Binary Search Tree.

  • Start by constructing the Binary Tree from the given Post order traversal array.

  • Check if the Binary Tree satisfies the properties of a Binary Search Tree.

  • Use recursion to check if each node's value is within the correct range.

  • Example: Post order traversal array [1, 3, 2] forms a Binary Search Tree.

  • Example: Post order traversal array [3, 2, 1] does not form a Binary Search Tree.

Add your answer
Q58. What is the system call that creates a separate connection?
Ans.

The system call that creates a separate connection is fork()

  • fork() is a system call in Unix-like operating systems that creates a new process by duplicating the existing process

  • The new process created by fork() is called the child process, while the original process is called the parent process

  • fork() is commonly used in network programming to create separate connections for handling multiple clients

Add your answer

Q59. What files are created when creating a VM and after powering on the VM?

Ans.

Creating and powering on a VM generates various files for configuration, storage, and state management.

  • VM Configuration File (e.g., .vmx for VMware) - Contains settings for the VM.

  • Virtual Disk File (e.g., .vmdk for VMware) - Stores the VM's data and operating system.

  • Snapshot Files (e.g., .vmsn for VMware) - Capture the state of the VM at a point in time.

  • Log Files (e.g., .log) - Record events and errors during VM operation.

  • NVRAM File (e.g., .nvram) - Stores the BIOS settings f...read more

Add your answer

Q60. I am not able to connect to the Service Console over the network. What could the issue be?

Ans.

Possible reasons for not being able to connect to the Service Console over the network.

  • Check network connectivity and ensure the correct IP address is being used.

  • Verify firewall settings to allow access to the Service Console.

  • Ensure the Service Console service is running properly.

  • Check for any network configuration issues or restrictions.

  • Restart the Service Console and try connecting again.

Add your answer
Q61. What are the stages in the Software Development Life Cycle?
Ans.

The stages in the Software Development Life Cycle include planning, design, development, testing, deployment, and maintenance.

  • 1. Planning: Define project scope, requirements, and timelines.

  • 2. Design: Create architecture, UI/UX, and database design.

  • 3. Development: Write code based on design specifications.

  • 4. Testing: Verify functionality, performance, and security.

  • 5. Deployment: Release the software to users or clients.

  • 6. Maintenance: Fix bugs, add new features, and update sof...read more

Add your answer
Q62. What is overloading in the context of Object-Oriented Programming (OOP)?
Ans.

Overloading in OOP is the ability to define multiple methods with the same name but different parameters.

  • Overloading allows multiple methods with the same name but different parameters to coexist in a class.

  • The compiler determines which method to call based on the number and type of arguments passed.

  • Example: having multiple constructors in a class with different parameter lists.

Add your answer

Q63. What happens if the VMDK header file is corrupt? How would you troubleshoot this issue?

Ans.

A corrupt VMDK header can lead to VM inaccessibility; troubleshooting involves recovery tools and backups.

  • Check VM logs for errors related to VMDK access.

  • Use VMware's 'vmware-vdiskmanager' tool to attempt a repair.

  • Restore the VMDK header from a backup if available.

  • Consider using third-party recovery tools like Stellar Data Recovery.

  • If the VMDK is part of a snapshot, check the snapshot chain for issues.

View 1 answer

Q64. How will you generate a report for a list of ESX, VMs, RAM, and CPU used in your Vsphere environment?

Ans.

Generate a report of ESX hosts, VMs, RAM, and CPU usage in a vSphere environment using PowerCLI or vSphere Client.

  • Use PowerCLI to connect to vCenter: Connect-VIServer -Server 'vCenterServerName'.

  • Retrieve ESX hosts: Get-VMHost | Select Name, @{Name='CPU';Expression={($_.CpuTotalMhz/1000)}}, @{Name='RAM';Expression={($_.MemoryTotalMB)}}.

  • List VMs and their resource usage: Get-VM | Select Name, @{Name='CPU';Expression={($_.NumCpu)}}, @{Name='RAM';Expression={($_.MemoryGB)}}.

  • Expor...read more

Add your answer

Q65. How do you start and stop a VM using the command prompt?

Add your answer
Q66. Can you explain the concept of multithreading in Java?
Ans.

Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.

  • Multithreading allows multiple threads to run concurrently within a single process.

  • Threads share the same memory space, allowing for efficient communication and data sharing.

  • Java provides built-in support for multithreading through the Thread class and Runnable interface.

  • Example: Creating a new thread using Thread class or implementing Runnable interface and passin...read more

Add your answer
Q67. What is the difference between paging and swapping in operating systems?
Ans.

Paging is a memory management scheme that allows the operating system to store and retrieve data from secondary storage in fixed-size blocks, while swapping involves moving entire processes between main memory and disk.

  • Paging involves dividing physical memory into fixed-size blocks called pages, while swapping involves moving entire processes between main memory and disk.

  • Paging allows for more efficient use of physical memory by storing parts of a process in different pages, ...read more

Add your answer

Q68. Given an unsorted array, can you create a balanced binary search tree with logarithmic complexity? If so, how?

Ans.

It is not possible to create a balanced B tree from an unsorted array in logarithmic complexity.

  • Creating a balanced B tree from an unsorted array requires sorting the array first, which has a complexity of O(n log n).

  • Balanced B tree construction typically has a complexity of O(n log n) or O(n) depending on the algorithm used.

  • Example: If we have an unsorted array [3, 1, 4, 1, 5, 9, 2, 6, 5], we would need to sort it first before constructing a balanced B tree.

Add your answer

Q69. Have you ever patched the ESX host? What are the steps involved?

Add your answer
Q70. Can you provide an example of a deadlock in operating systems?
Ans.

A deadlock in operating systems occurs when two or more processes are unable to proceed because each is waiting for the other to release a resource.

  • Deadlock involves a circular wait, where each process is waiting for a resource held by another process in the cycle.

  • Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.

  • Example: Process A holds Resource 1 and waits for Resource 2, while Process B holds Resource 2 and waits f...read more

Add your answer
Q71. How do you implement the Java Executor Framework?
Ans.

The Java Executor Framework provides a way to manage and execute tasks asynchronously in Java applications.

  • Create an instance of ExecutorService using Executors class

  • Submit tasks for execution using execute() or submit() methods

  • Handle the results of the tasks using Future objects

  • Shutdown the ExecutorService when tasks are completed using shutdown() method

Add your answer
Q72. Can you explain the prototype scope in Spring?
Ans.

Prototype scope in Spring creates a new instance of the bean every time it is requested.

  • Prototype scope is used when a new instance of the bean is required for each request.

  • It is not thread-safe, as a new instance is created for each request.

  • Example: If a bean is defined with prototype scope, a new instance will be created every time it is injected or requested.

Add your answer

Q73. What is networking? What is IPV4? Explain network layer Implement networking layer concept in real life

Ans.

Networking is the practice of connecting computers and other devices to share resources and communicate with each other.

  • Networking involves the use of protocols and technologies like TCP/IP, Ethernet, and Wi-Fi.

  • IPV4 is a version of the Internet Protocol that uses a 32-bit address scheme.

  • The network layer is responsible for routing data packets from the source to the destination.

  • Implementing networking layer concept in real life can be seen in how data is transmitted over the ...read more

Add your answer

Q74. There are n seats and m people are seated randomly. Write a program to get the minimum number of hops to make them seated together.

Ans.

Given n seats and m people seated randomly, find the minimum number of hops to seat them together.

  • Find all possible contiguous groups of m seats

  • Calculate the number of hops required to move each group to the center seat of that group

  • Return the minimum number of hops required

Add your answer

Q75. If you already have a memory buffer, how would you use that memory to allocate a new object (using placement new)?

Ans.

Use placement new to construct an object in an existing memory buffer without allocating new memory.

  • 1. Ensure the memory buffer is properly aligned for the type of object being created.

  • 2. Use placement new syntax: `new (buffer) TypeName(args);` to construct the object.

  • 3. Example: `char buffer[sizeof(MyClass)]; MyClass* obj = new (buffer) MyClass();`

  • 4. Remember to call the destructor manually when done: `obj->~MyClass();`

Add your answer
Q76. What is load average in Linux?
Ans.

Load average in Linux is a measure of system activity, indicating the average number of processes waiting in the run queue over a period of time.

  • Load average is displayed as three numbers representing the average number of processes in the system run queue over the last 1, 5, and 15 minutes.

  • A load average of 1.0 means the system is at full capacity, while a load average of 0.5 means the system is half as busy.

  • High load averages indicate a system under heavy load, potentially ...read more

Add your answer

Q77. What is the difference between the Top and ESXTOP commands?

Add your answer
Q78. What is Inversion of Control?
Ans.

Inversion of Control is a design principle where the control flow of a program is inverted, with the framework controlling the flow.

  • Inversion of Control allows for decoupling of components, making the code more modular and easier to maintain.

  • Common examples of Inversion of Control include dependency injection and event listeners.

  • Frameworks like Spring and Hibernate make use of Inversion of Control to manage object lifecycles and dependencies.

Add your answer
Q79. What are Terraform modules?
Ans.

Terraform modules are reusable components used to organize and manage resources in Terraform configurations.

  • Modules help in organizing Terraform configurations into reusable components

  • They allow for better code reusability and maintainability

  • Modules can be shared and reused across different Terraform configurations

  • They encapsulate a set of resources and their configurations

  • Modules can have input and output variables for customization

Add your answer
Q80. What are the types of connection release supported by TCP?
Ans.

TCP supports four types of connection release: active close, passive close, simultaneous close, and abortive close.

  • Active close: Client initiates the connection release process by sending a FIN packet.

  • Passive close: Server initiates the connection release process by sending a FIN packet.

  • Simultaneous close: Both client and server send FIN packets to each other simultaneously.

  • Abortive close: Connection is terminated abruptly without following the normal connection release proce...read more

Add your answer

Q81. Given a singly linked list with unsorted elements, how would you delete repeated elements in O(n) time complexity without using extra space?

Ans.

Delete duplicates from a singly linked list in O(n) time without extra space.

  • Use two pointers: current and runner.

  • Current traverses the list, while runner checks for duplicates.

  • If a duplicate is found, adjust pointers to skip the duplicate.

  • Example: For list 1 -> 2 -> 3 -> 2 -> 1, result is 1 -> 2 -> 3.

Add your answer

Q82. What are the primary and secondary functions of an HCC appliance?

Add your answer

Q83. Given two strings, write an efficient algorithm in Java to compare them. Your algorithm should handle all cases.

Ans.

An efficient algorithm in Java to compare two strings.

  • Use the equals() method to compare two strings for equality.

  • Consider using compareTo() method for comparing strings lexicographically.

  • Handle null strings separately to avoid NullPointerException.

  • Use equalsIgnoreCase() method for case-insensitive comparison.

Add your answer

Q84. Given an array of positive numbers, rearrange the array such that even numbers are placed on the left side and odd numbers are placed on the right side. Do this in-place without using an extra array.

Add your answer
Q85. Can you explain cloud computing in layman’s terms?
Ans.

Cloud computing is like renting a computer over the internet instead of owning one.

  • Cloud computing allows users to access and store data and applications over the internet instead of on their own physical computer.

  • It offers scalability, flexibility, and cost-effectiveness as users can easily adjust their storage and computing needs.

  • Examples include services like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Add your answer
Q86. What is the difference between TELNET and SSH?
Ans.

TELNET is insecure, while SSH is secure for remote access to servers.

  • TELNET sends data in plain text, while SSH encrypts data for secure communication

  • SSH uses public-key cryptography for authentication, TELNET does not

  • SSH provides secure remote access to servers, TELNET does not prioritize security

  • TELNET operates on port 23, while SSH operates on port 22

Add your answer

Q87. What is the command used to restart SSH, NTP, and VMware Web access?

Ans.

The command to restart SSH, NTP, and VMware Web access is service.

  • To restart SSH, use the command 'service ssh restart'

  • To restart NTP, use the command 'service ntp restart'

  • To restart VMware Web access, use the command 'service vmware-webaccess restart'

Add your answer

Q88. What is the default number of ports configured with the Virtual Switch?

Add your answer
Q89. What is the Java Executor Framework?
Ans.

Java Executor Framework is a framework provided by Java for managing and executing tasks asynchronously.

  • It provides a way to manage threads and execute tasks concurrently.

  • It includes interfaces like Executor, ExecutorService, and ScheduledExecutorService.

  • It allows for better control over thread management and task execution compared to manually managing threads.

  • Example: Executors.newFixedThreadPool(5) creates a thread pool with 5 threads for executing tasks.

Add your answer
Q90. How do you dynamically allocate a 2D array in C?
Ans.

Use double pointer to dynamically allocate memory for array of strings in C.

  • Declare a double pointer to hold the 2D array of strings.

  • Allocate memory for the rows first using malloc.

  • Then allocate memory for each string in the row using malloc.

  • Assign values to the strings in the array.

  • Example: char **array = malloc(rows * sizeof(char *));

  • Example: array[i] = malloc(strlen(str) + 1); strcpy(array[i], str);

Add your answer
Q91. What are the different protocols used in the transport layer?
Ans.

Different protocols used in the transport layer include TCP, UDP, SCTP, and DCCP.

  • TCP (Transmission Control Protocol) - reliable, connection-oriented protocol used for most internet communication

  • UDP (User Datagram Protocol) - connectionless protocol used for applications where speed is more important than reliability

  • SCTP (Stream Control Transmission Protocol) - supports multiple streams of data, used for telecommunication signaling

  • DCCP (Datagram Congestion Control Protocol) - ...read more

Add your answer

Q92. Given an array, delete every third element until only one element remains. Determine the index of the remaining element with O(1) time complexity.

Add your answer
Q93. What are the challenges of cloud computing?
Ans.

Challenges of cloud computing include security concerns, data privacy issues, and potential downtime.

  • Security concerns: Data breaches and unauthorized access are major risks in cloud computing.

  • Data privacy issues: Ensuring compliance with regulations like GDPR can be challenging when data is stored in the cloud.

  • Potential downtime: Dependence on internet connectivity and cloud service providers can lead to downtime affecting operations.

  • Cost management: Cloud services can becom...read more

Add your answer
Q94. What are the benefits of cloud computing?
Ans.

Cloud computing offers scalability, cost-efficiency, flexibility, and improved collaboration.

  • Scalability: Easily scale resources up or down based on demand without the need for physical infrastructure.

  • Cost-efficiency: Pay only for the resources you use, reducing upfront costs and maintenance expenses.

  • Flexibility: Access data and applications from anywhere with an internet connection, enabling remote work and collaboration.

  • Improved collaboration: Teams can work together in rea...read more

Add your answer

Q95. How would you debug Apache and Nginx issues?

Ans.

Debugging Apache Nginx issues involves checking logs, configuration files, and server status.

  • Check error logs for any relevant error messages

  • Verify the configuration files for syntax errors

  • Check server status and resource usage

  • Use tools like curl or telnet to test connectivity and response times

  • Check firewall rules and network settings

  • Consider load balancing and caching configurations

Add your answer

Q96. What protocols are you familiar with at the MAC layer?

Ans.

MAC layer protocols are used for communication between devices in a network.

  • Ethernet (IEEE 802.3)

  • Wi-Fi (IEEE 802.11)

  • Bluetooth (IEEE 802.15.1)

  • Token Ring (IEEE 802.5)

  • Zigbee (IEEE 802.15.4)

Add your answer

Q97. How does a Virtual Machine communicate with other servers on a network?

Ans.

Virtual machines communicate with other servers in a network through various networking protocols and technologies.

  • Virtual machines use network adapters to connect to the network.

  • They can communicate with other servers using IP addresses and domain names.

  • Virtual machines can send and receive data packets over the network using protocols like TCP/IP or UDP.

  • They can establish connections with other servers using protocols like HTTP, FTP, SSH, etc.

  • Virtual machines can also commu...read more

View 1 answer

Q98. Implement a min heap using a priority queue.

Ans.

A min heap can be implemented using a priority queue, where the smallest element has the highest priority.

  • Use a priority queue data structure to implement the min heap.

  • Ensure that the smallest element has the highest priority.

  • Implement the necessary operations like insert, delete, and extract min.

  • Maintain the heap property by percolating up or down as needed.

Add your answer

Q99. Write a LinkedList implementation that accepts binary numbers and another method to output the decimal equivalent.

Add your answer

Q100. What are the types of port groups in ESX/ESXi?

Ans.

ESX/ESXi supports several port group types for managing network traffic in virtual environments.

  • Standard Port Group: Basic network connectivity for VMs, used in vSphere Standard Switch.

  • Distributed Port Group: Allows centralized management across multiple hosts in a vSphere Distributed Switch.

  • VMkernel Port Group: Used for VMkernel traffic such as vMotion, NFS, and management traffic.

  • Private VLAN (PVLAN) Port Group: Provides isolation between VMs on the same VLAN, enhancing sec...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Top HR Questions asked in null

Q1. Will you be ok working in shifts
Q2. What do you do in your free time except studies?
Q3. What extra curricular activities did you do?
Q4. what is the thing you wanna improve
Q5. Would you like to join at the Bangalore Office?

Interview Process at null

based on 101 interviews
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 356 Interview Questions
3.5
 • 233 Interview Questions
4.2
 • 130 Interview Questions
3.8
 • 105 Interview Questions
3.6
 • 92 Interview Questions
3.7
 • 88 Interview Questions
View all
Top VMware Software Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter