Infrastructure Engineer
30+ Infrastructure Engineer Interview Questions and Answers

Asked in Sopra Steria

Q. What type of ticketing tool was used in your previous organization?
We used ServiceNow as our ticketing tool in my previous organization.
ServiceNow was used for incident management, problem management, and change management.
It allowed for easy tracking and management of tickets, with customizable workflows and automation.
We also used it for asset management and CMDB.
ServiceNow provided detailed reporting and analytics for performance and SLA tracking.
It integrated with other tools like JIRA and Slack for seamless communication and collaborati...read more

Asked in Sopra Steria

Q. What are DHCP and DNS what are their uses?
DHCP and DNS are network protocols used for assigning IP addresses and translating domain names to IP addresses respectively.
DHCP stands for Dynamic Host Configuration Protocol and is used for assigning IP addresses to devices on a network.
DNS stands for Domain Name System and is used for translating domain names to IP addresses.
DHCP and DNS are both essential components of a network infrastructure.
Without DHCP, network administrators would have to manually assign IP addresse...read more
Infrastructure Engineer Interview Questions and Answers for Freshers

Asked in Sopra Steria

Q. Do you know about Office 365 and Active Directory?
Yes, I am familiar with both Office 365 and Active Directory.
I have experience in managing user accounts, groups, and permissions in Active Directory.
I have worked with Office 365 applications such as Exchange Online, SharePoint Online, and OneDrive for Business.
I am familiar with configuring and troubleshooting Office 365 services using PowerShell.
I have experience in integrating on-premises Active Directory with Office 365 using Azure AD Connect.
I am aware of the security a...read more

Asked in Kaseya Software

Q. Regarding patch management and software management, why is it important?
Patch and software management are crucial for security, stability, and performance in IT infrastructure.
Enhances security by fixing vulnerabilities; for example, applying patches to prevent exploits like ransomware.
Improves system stability and performance; regular updates can resolve bugs and enhance functionality.
Ensures compliance with industry regulations; many standards require up-to-date software to protect sensitive data.
Reduces downtime; proactive patch management can...read more

Asked in Siemens

Q. Define any type of thermodynamic cycle along with diagram. Define power plant engineering? Difference between steam engine and steam turbine.
Answering questions related to thermodynamic cycle, power plant engineering, steam engine and steam turbine.
A thermodynamic cycle is a series of processes that convert heat into work.
Power plant engineering deals with the design, construction, and operation of power plants.
Steam engine uses steam to produce mechanical work while steam turbine uses steam to produce electrical power.
Difference between steam engine and steam turbine is that steam engine is an external combustion...read more

Asked in Thoughts2Binary

Q. What steps would you take to diagnose connectivity issues when unable to connect to your EC2 instance?
Diagnosing EC2 connectivity issues involves checking security groups, network ACLs, and instance status.
Check the instance's public IP or DNS name to ensure you're using the correct address.
Verify that the security group associated with the EC2 instance allows inbound traffic on the required ports (e.g., port 22 for SSH).
Examine the network ACLs to ensure they are not blocking traffic to or from the instance.
Ensure the EC2 instance is in a running state and not in a stopped o...read more
Infrastructure Engineer Jobs




Asked in Sopra Steria

Q. Do you know about GitLab?
Yes, GitLab is a web-based Git repository manager that provides continuous integration, deployment, and monitoring.
GitLab is an open-source platform for managing Git repositories
It provides features like continuous integration, deployment, and monitoring
It offers a web-based interface for managing repositories and projects
GitLab also includes features like issue tracking, wikis, and code review
Examples of companies using GitLab include NASA, IBM, and Alibaba

Asked in Accenture

Q. How do you recall information and formulate responses?
I use techniques like visualization, repetition, and association to recall sentences effectively.
Practice visualization by creating mental images of the sentences
Repetition helps reinforce memory of the sentences
Association with familiar concepts or personal experiences aids in recall
Share interview questions and help millions of jobseekers 🌟

Asked in Egen (Formerly SpringML)

Q. What is IaC? Do you have used it in your project
IaC stands for Infrastructure as Code, which is the practice of managing and provisioning infrastructure through code instead of manual processes.
IaC allows for infrastructure to be defined and managed using code, providing consistency and repeatability.
Popular tools for IaC include Terraform, Ansible, and Chef.
I have used Terraform in my project to define and provision cloud infrastructure resources.

Asked in Kaseya Software

Q. What is an Active Directory?
Active Directory is a directory service that stores information about objects on a network.
It is used to manage users, computers, and other resources on a network.
It provides a centralized authentication and authorization mechanism.
It allows administrators to assign policies, deploy software, and apply updates to network resources.
It uses a hierarchical structure of domains, trees, and forests to organize network resources.
It is a key component of Microsoft's Windows Server o...read more

Asked in Thoughts2Binary

Q. Write the Terraform scripts needed to create an EC2 instance, RDS database, and VPC.
Terraform scripts to provision an EC2 instance, RDS database, and VPC in AWS.
Define the provider: Use 'provider "aws" { region = "us-east-1" }' to specify the AWS region.
Create a VPC: Use 'resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" }' to define a VPC.
Set up subnets: Use 'resource "aws_subnet" "subnet1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" }' for subnets.
Launch an EC2 instance: Use 'resource "aws_instance" "web" { ami = "ami-12345678" instance_type...read more

Asked in Wipro Infrastructure Engineering

Q. Infrastructure experience with prior knowledge
I have extensive infrastructure experience and prior knowledge in various technologies.
I have worked with virtualization technologies such as VMware and Hyper-V.
I have experience with cloud platforms such as AWS and Azure.
I am familiar with networking technologies such as TCP/IP, DNS, DHCP, and VLANs.
I have worked with storage technologies such as SAN and NAS.
I have experience with configuration management tools such as Ansible and Puppet.
I am familiar with monitoring tools s...read more

Asked in Sutherland Global Services

Q. What is a backup, and what are the different types of backups?
Backup is the process of creating copies of data to prevent data loss, with types including full, incremental, and differential backups.
Backup is the process of creating copies of data to prevent data loss.
Types of backups include full, incremental, and differential backups.
Full backup: A complete copy of all data at a specific point in time.
Incremental backup: Copies only the data that has changed since the last backup.
Differential backup: Copies all changes since the last f...read more

Asked in CGI Group

Q. How do P2V and V2V migrations work?
P2V and V2V migrations involve converting physical servers to virtual servers and vice versa.
P2V migration converts a physical server to a virtual server by copying the contents of the physical server to a virtual machine.
V2V migration involves transferring a virtual machine from one virtualization platform to another.
Both migrations require careful planning, testing, and validation to ensure data integrity and minimal downtime.
Tools like VMware Converter, Microsoft Virtual M...read more

Asked in DVR Softek

Q. What are iLO and iDRAC?
iLO and iDRAC are remote management technologies for servers.
iLO stands for Integrated Lights-Out and is a remote management technology for HP servers.
iDRAC stands for Integrated Dell Remote Access Controller and is a remote management technology for Dell servers.
Both technologies allow administrators to remotely manage and monitor servers, including power cycling, firmware updates, and hardware health monitoring.
They also provide remote console access, allowing administrator...read more

Asked in AgreeYa Solutions

Q. How do you whitelist an email in Outlook?
To whitelist any mail in Outlook, you can add the sender's email address to the Safe Senders list.
Open Outlook and go to the Home tab.
Click on the Junk dropdown menu and select Junk E-mail Options.
In the Junk E-mail Options window, go to the Safe Senders tab.
Click on the Add button and enter the email address you want to whitelist.
Click OK to save the changes.
Any emails from the whitelisted address will now be delivered to your inbox.

Asked in Walmart

Q. What are the different ways to ingest data into BigQuery?
Various ways to ingest data in BigQuery include batch loading, streaming, and using third-party tools.
Batch loading: Uploading data in bulk using tools like Cloud Storage or Data Transfer Service.
Streaming: Sending data in real-time using APIs like Dataflow or Pub/Sub.
Third-party tools: Using tools like Talend or Informatica for data ingestion.

Asked in Accenture

Q. What are your strengths?
My strength lies in my ability to troubleshoot complex infrastructure issues efficiently and effectively.
Strong problem-solving skills
Extensive knowledge of infrastructure systems
Ability to work well under pressure
Excellent communication skills
Experience with various troubleshooting tools and techniques

Asked in Zellis

Q. Tell us about the sticky bit.
Sticky bit is a permission in Unix systems that allows only the owner of a file to delete or rename it.
Sticky bit is represented by a 't' in the permissions of a file or directory.
It is commonly used on directories to prevent users from deleting files owned by other users.
An example of sticky bit usage is on the /tmp directory in Unix systems.

Asked in Amazon

Q. Describe a challenging situation you faced while developing a React Native application and how you resolved it.
Faced a performance issue in a React Native app due to heavy image loading, resolved by optimizing images and using lazy loading.
Identified performance lag during testing, especially on older devices.
Used tools like React Native Performance Monitor to pinpoint slow components.
Optimized images by compressing them and using appropriate formats (e.g., WebP).
Implemented lazy loading for images to improve initial load time.
Conducted A/B testing to compare performance before and af...read more

Asked in T-Systems ICT India

Q. What is application packaging?
Application packaging is the process of creating a deployable package containing all necessary files and configurations for an application.
Involves bundling all files, libraries, and dependencies required for an application to run
Ensures consistency and ease of deployment across different environments
Common tools used for application packaging include MSI, RPM, and Docker images

Asked in Zellis

Q. What is SeLinux and umask
SeLinux is a security module for Linux systems that enforces access control policies. Umask is a command that sets default permissions for new files and directories.
SeLinux stands for Security-Enhanced Linux and provides access control security policies for Linux systems.
It restricts access to files, directories, and processes based on defined security policies.
Umask is a command that sets default permissions for new files and directories created by users.
It is represented as...read more
Asked in Websenor Infotech

Q. What is your expected stipend amount?
I expect a competitive stipend based on industry standards and my experience.
I have researched industry standards for Infrastructure Engineer stipends
I have considered my level of experience and qualifications
I am open to negotiation based on the specific job responsibilities and benefits package
I am primarily interested in finding a position that aligns with my career goals and offers opportunities for growth

Asked in SgurrEnergy

Q. Various Road pavement layers
Road pavement layers include subgrade, subbase, base, and surface layers.
Subgrade is the native soil underneath the road.
Subbase is a layer of gravel or crushed stone placed on top of the subgrade.
Base is a layer of asphalt concrete or concrete placed on top of the subbase.
Surface layer is the top layer of asphalt or concrete that vehicles drive on.

Asked in Sutherland Global Services

Q. What is snapshot-based backup?
Snapshots based backup is a method of backing up data by capturing the state of a system at a specific point in time.
Snapshots are essentially a 'picture' of the data at a particular moment, allowing for easy restoration if needed.
They are commonly used in virtual environments to create point-in-time copies of virtual machines.
Snapshots can be taken manually or automatically on a scheduled basis.
They are typically stored separately from the original data to prevent corruption...read more

Asked in Eze Castle Integrations

Q. What is the TCP/IP protocol?
TCP/IP is a set of rules governing the exchange of data over the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
It is a suite of communication protocols used to connect devices over the internet.
TCP ensures that data packets are delivered error-free and in sequence.
IP is responsible for routing packets to their destination.
Examples of TCP/IP applications include web browsing, email, and file transfer.

Asked in Accenture

Q. Tell me about drive failure.
Drive failure refers to the malfunction or breakdown of a storage drive, resulting in data loss or inaccessibility.
Drive failure can be caused by physical damage, such as overheating or mechanical issues.
It can also be due to logical errors, like file system corruption or bad sectors.
Regular backups are essential to prevent data loss in case of drive failure.
Replacing the failed drive and restoring data from backups is the typical solution.
RAID configurations can help mitigat...read more

Asked in Zellis

Q. Tell us about DNS.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps in routing internet traffic efficiently by directing requests to the correct servers.
DNS records include A records (for IPv4 addresses), AAAA records (for IPv6 addresses), MX records (for mail servers), and more.

Asked in Zellis

Q. What is LVM and NTP
LVM stands for Logical Volume Manager, used for managing disk storage in Linux. NTP stands for Network Time Protocol, used for time synchronization.
LVM allows for dynamic resizing of logical volumes
NTP ensures accurate time synchronization across networked devices
LVM can be used to create snapshots for backups
NTP servers can be configured to sync time with external time sources

Asked in Qurinom Solutions

Q. Describe the end-to-end deployment process.
Deployment end-end process involves planning, testing, executing, and monitoring the deployment of software or infrastructure changes.
Planning the deployment process including identifying resources, scheduling downtime, and creating a rollback plan
Testing the deployment in a staging environment to ensure compatibility and functionality
Executing the deployment by pushing changes to production servers or infrastructure
Monitoring the deployment for any issues or errors, and addr...read more
Interview Questions of Similar Designations
Interview Experiences of Popular Companies








Reviews
Interviews
Salaries
Users

