300+ [REAL TIME] Mobile Security Interview Questions

  1. 1. What Are The Minimum System Requirements To Install Mobile Security For Android?

    The following are the minimum system requirements for Mobile Security:

    Operating System—Android OS 4.0 and above
    Storage space—40MB (minimum)
    Memory—25MB – 90MB
    Others—Internet Connection

  2. 2. Why Do I Need A Trend Micro Account?

    A Trend Micro account is required for the following features:

    • Parental Controls – keeps your settings secure.
    • Lost Device Protection – securely locates your mobile device, lock it, delete all of its data, or sound an alarm from a web portal.
  3. Manual Testing Interview Questions

  4. 3. What Does Activation Do?

    Activating your Mobile Security enables you to use the following premium features:

    • Safe Surfing
    • Parental Controls
    • Data Theft Scanner
    • Call & Text Blocker
    • Lost Device Protection
    • App Manager
    • Pre-Installation Scan
  5. 4. My Sim Was Not Removed And I Never Trigger The Remote Lock, But Why Does Mobile Security Lock My Device?

    On some devices, SIM lock is triggered when your device is on airplane or flight mode. Use your Trend Micro password to unlock your device.

  6. Network Security Tutorial

  7. 5. Why Do I Need An Alternate Email Address And How Can I Set It?

    You need an alternate email address to receive an unlock key in case your mobile device gets locked. By default, Mobile Security will use your Gmail account as an alternate email address.

    To set up an alternate email address, go to Settings, then tap Set up alternate email address.

  8. Mobile Plant Operator Interview Questions

  9. 6. What Is Lost Device Protection In Mobile Security?

    Lost Device Protection is a feature in Mobile Security that protect your mobile devices and its data. Enabling the feature allows you to remotely trigger alert, locate, lock & wipe your data in case of loss.

    You will get the following messages when you want to enable this feature:

    • “Please activate Mobile Security in ‘Device administrators’ to enable remote wipe and uninstall protection. NOTE: You will need to deactivate it before uninstalling Mobile Security”.
    • “Activating this administrator will allow the application Mobile Security to perform the following operations: Erase All Data erase the phone’s data without warning, by performing a factory data reset.”

    Activating Mobile Security in Device Administrators will grant necessary permissions/rights to enable this feature.

  10. 7. How Does Lost Device Protection Work?

    For Lost Device Protection to work properly, make sure GPS and Data/Wifi connections are turned on.

  11. Selenium Tutorial
    Network Security Interview Questions

  12. 8. Why Didn’t Mobile Security Detect All The Threats In My Device?

    Mobile Security is detecting and blocking threats in your device. By default, it only shows the Virus Scan result. To see the Data Theft Scan result, tap the arrow.

  13. 9. Can I Use The Serial Number Of My Trend Micro Security Program For Mobile Security?

    Yes, you can use the serial number of Maximum Security for your Mobile Security program.

  14. Selenium Interview Questions

  15. 10. What Is System Tuner?

    System Tuner is a feature in Mobile Security which optimizes your device’s performance, extending its’ battery life, ending applications on the background to free up some memory.

  16. Mobile Testing Tutorial

  17. 11. How Can App Developers Ensure Better Client Mobile Security?

    The mobile industry is booming like never before. This has created a number of types of mobile devices, mobile OS’ and apps for the same. Individual app developers and companies are now busy developing apps for multiple devices such as the iPhone, iPad, Android and BlackBerry. While this is great news for developers, manufacturers and end-users alike, the mobile boom is not without its risks.

  18. Mobile Testing Interview Questions

  19. 12. Is It More Risky To Develop Software For Mobile Devices Than Developing Enterprise Software?

    It is definitely a lot more risky developing software for mobile devices. The major danger with apps for mobile devices is that they are extremely vulnerable to external attack and can be jailbroken at point of time.

    This happens especially with devices such as Android and the iPhone. A jailbroken device gives an experienced hacker access to the source code, thus possibly enabling him or her to change and redevelop the whole mobile app itself.

  20. Manual Testing Interview Questions

  21. 13. Do Mobile Apps Keep Constant Interaction With Internal Servers?

    Yes, mobile apps are always connected to the internal server.

    While this is good for the end-user, as it provides him a number of conveniences, it is also disadvantageous, since an experienced hacker can easily get access to this internal server, once he succeeds in jailbreaking it. Hence, while manufacturers need to look into the hardware part of mobile security, that is, the security features provided in the handset itself; developers need to figure out how and to what extent they want their mobile app to interact with the internal server.

  22. Security Testing Tutorial

  23. 14. Who Can I Contact In Order To Know More About Mobile Security And Security Breaches?

    You may not be able to find too many mobile app developers specializing in mobile security and mobile anti-virus. Nevertheless, there are several experts in the field who can advice you about several aspects of mobile security. Many of these individuals can also help you detect a possible security breach in your mobile app, re-program your app in order to clean it up and also advice you on the actions you can take to prevent similar future attacks. It is desirable for all mobile app development companies to keep a team of such personnel ready at all times.

  24. 15. How Can I Ensure That Sensitive Client Data Will Not Be Disclosed On Their Smartphones After Session Expiry?

    The only way to protect your client’s sensitive smartphone data is to develop a particular code that will erase the private data as soon as his or her browsing session expires. Otherwise, the data will continue to remain on the device, causing a potential mobile security hazard. As mobile technology and mobile security techniques keep advancing, hackers too are developing better and more foolproof techniques to gain entry into a mobile system. Hence, manufacturers and developers have to constantly watch over their mobile OS or mobile app and keep checking the system for errors, so as to minimize chances of security breaches.

  25. Mobile Device Management Interview Questions

  26. 16. How Can I Enhance My Knowledge Of Mobile Security?

    Mobile security is a fairly new industry, which is now evolving at a rapid rate. There is much to learn about the dynamics of a mobile app and how hackers can gain access into a mobile device. What you can do to enhance your knowledge on the subject is to keep abreast of the latest aspects of mobile security, participate in forums and workshops and keep in constant touch with experts on the subject.

  27. Mobile Security Tutorial

  28. 17. What Are The Main Benefits?

    • For users, mobile security settings can be enabled to provide additional protection when accessing Box from their mobile devices.
    • For admins, Box mobile app management features provide visibility into all account activity—including users and their files—and let admins manage how content is shared and accessed both inside and outside the company.
  29. Security Testing Interview Questions

  30. 18. How Is This Different Than What Mobile Device Management Providers Like Mobileiron And Good Technology Offer?

    The settings help admins customize user access and file sharing options within Box’s mobile apps. However, many enterprises need MDM solutions to secure content across the entire mobile device (not just content on Box).

    We have strong relationships with providers like MobileIron, Good Technology and Enterproid to help solve those challenges.

  31. Mobile Plant Operator Interview Questions

  32. 19. What Types Of Customers Can Use These Settings?

    • All the admin security options above are available in Business, Enterprise, and Elite accounts.
    • Admins with business accounts have the ability to enable device pinning and require 2-step login verification.
  33. Mobile Marketing Tutorial

300+ TOP IMS DC Interview Questions [LATEST]

  1. 1. What Is Ims Tm Region?

    The IMS TM control region is a z/OS address space that can be initiated as a z/OS started task or as a job by submitting JCL. The terminals, Fast Path databases, message queues, and logs are all attached to this control region.

  2. 2. The Ims Tm Control Region Uses Z/os Access Methods For Terminal And Database Access?

    After the IMS TM control region is started, it starts the system regions, DL/I separate address space (DLISAS), and Database Recovery Control (DBRC).

    Then you can start the message processing regions (MPRs) and batch message processing (BMP) regions through the use of the following:

    – z/OS commands (START xxxxxxxx)

    – IMS commands (/START REGION xxxxxxxx)

    – Job submission – Automated operator commands.

  3. IBM DB2 Interview Questions

  4. 3. What Is Dcctl In Ims Dc?

    The Data Communications Control (DCCTL, pronounced “DC control”) environment enables you to use IMS TM independently of IMS DB. DCCTL provides system performance in terms of throughput, system availability, and integrity. DCCTL can coexist with IMS TM application programs and installed terminals.

  5. 4. What Are The 3 Different Terminals In Ims Dc?

    Static terminal, Dynamic terminal, extended terminal option.

  6. IBM DB2 Tutorial

  7. 5. What Is Static Terminal?

    A static terminal is defined in the IMS system definition (SYSGEN), and the definition determines the physical terminal name (called the node name) and logical terminal name (LTERM) available for use.

  8. Management Information systems

  9. 6. What Is Dynamic Terminal?

    • A dynamic terminal is not statically defined in the IMS system definition. IMS can create a dynamic terminal definition. This type requires either the IMS ETO, which is a separately priced feature of IMS TM, or other third-party vendor products. Definitions for dynamic terminals are generated when the user logs on.
    • If a terminal user attempts to connect to IMS using a terminal that is defined to IMS as static, the user will use the defined node name and LTERM name combination.
    • If a terminal user attempts to connect to IMS using a terminal that is not defined to IMS as static, and dynamic terminal support is available, a dynamic terminal product (such as ETO) is used to determine the LTERM name and whether the name is based on the user ID, the node name, or some other value.
  10. 7. What Is Extended Terminal Options?

    • IMS Extended Terminal Option (ETO) provides dynamic terminal and local and remote logical terminal support for IMS TM.
    • You can add terminal hardware and TERMs to the IMS system without first defining them. ETO gives you the option of eliminating macro statements in the IMS system definition of VTAM terminals and TERMs. TO enhance the availability of your IMS by eliminating the need for you to bring the system down to add terminals and LTERMs.
    • ETO also enhances security for the IMS TM user by associating all output with a specific user, instead of with a device. ETO requires the user to sign on.
    • ETO reduces the IMS system definition time for those systems where the terminal network is defined dynamically.
  11. Management Information systems Tutorial
    Data Center Management

  12. 8. What Are The Phases Involved In Ims Dc Program?

    Initialization is the clearing of application program working storage. Retrieve a transaction input message segment A Data Language/Interface (DL/I) message call (GU) to IMS TM is used to retrieve an input message segment from the IMS Queue Manager. Status code check The application checks the status code from IMS TM that indicates whether the input message was successfully retrieved or if no more input messages are available to process.

    Input message syntax check IMS TM performs a basic syntax check of the input message before delivery to the application program. The application program performs any additional data validation checks. Database processing Database processing is performed, preferably in one phase, which means that the retrieval of a database segment is immediately followed by its update.

    An example of database processing in more than one phase is to initially retrieve all the segments that the program requires and then perform a second retrieve and then update. Output processing The application builds an output response message and uses the DL/I message ISRT call to return the results to the originator of the transaction input request.

  13. 9. What Are The Different Calls Involved In Ims Dc Program?

    • U (Get Unique) Retrieve the first, or only, segment of the input message.
    • GN (Get Next) Retrieve second and subsequent message segments.
    • LIST (Insert) insert an output message segment into the output message queue. These output messages are not sent until the transaction unit-of-work synchronization point has occurred.
    • CHNG (Change Destination) – Set the output destination for subsequent Insert calls.
  14. IBM AIX

  15. 10. How Psb Should Be In Ims Dc Program?

    In addition to database program control blocks (PCBs), the program specification block (PSB) contains one or more message PCBs. The message I/O PCB identifies the originating logical device. The I/O PCB must be referenced in the Get Unique (GU) and Insert message (ISRT) calls. In addition, one or more alternate output PCBs (TP PCBs) can be defined. Their logical destination can be defined in the PCBs or set dynamically by the application program using the Change destination (CHNG) calls.

  16. 11. How Do We Code Segments In Ims Dc Program?

    The messages that application programs receive and send consist of one or more message segments. Single-segment messages contain only one segment. A single GU and ISRT call is used for processing single segment message.

    For multisegment input message processing, the application program uses a GU call to retrieve the first segment of a message, and GN calls to retrieve the remaining segments. For multisegment output messages, the application program uses multiple ISRT calls.

  17. IBM WAS Administration

  18. 12. What Is The Role Of Scratch Pad Area(spa) In Conversational Program?

    • IMS provides support for conversational message processing. The conversational programming model processes transactions comprised of several steps. A conversational application program divides the transaction processing work into a connected series of interactions and uses the IMS-managed scratch pad area (SPA) to maintain the conversational state.
    • The conversational application program issues the message GU call to retrieve the SPA to determine the next transactional interaction and the message GN call to retrieve an input message entered from a conversational mode device. The conversational application program updates the conversation state in the SPA with a message ISRT call.
    • When an application program wants to terminate the conversation, it can indicate this by inserting a blank transaction code to the SPA.
  19. IBM DB2 Interview Questions

  20. 13. How Many Message Queues Are There In Ims Dc Program?

    I/O PCB Response messages (messages that are generated as a direct response to an input message from this device).

  21. 14. What Is Command Responses?

    Alternate TP PCB alternate output messages (messages inserted to an alternate PCB).

  22. 15. How Message Switching Happens In Ims Dc Program?

    • A message switch occurs when a user wants to send a message to another user. The basic format of a message switch is the destination LTERM name, followed by a blank and the message text.
    • A program-to-program switch or program-to-program message switch is a program that is already executing that requests a new transaction be put on the IMS message queues for standard scheduling and execution.
    • This new transaction can do the following: Continue the processing of the first transaction and respond to the originating logical device
    • Process as an independent transaction unit of work.
  23. IBM Cloud Computing Infrastructure Architect V1

  24. 16. How Many Ways A Program Will Be Terminated In Ims Dc Programs?

    Normal Termination:

    Normal termination involves the program returning control to IMS TM when it finishes processing.

    Abnormal Termination:

    When an IMS-managed application program abnormally terminated, IMS prevents the rescheduling of the application program, any uncommitted database changes are dynamically backed out, and any uncommitted output messages are cancelled.

  25. 17. How Checkpoint Restart Happens In Ims Dc Program?

    To ensure database and message integrity, IMS uses logging and checkpoint/restart processing. In case of a hardware or software system failure, IMS can be restarted. This restart includes reading the IMS log to reposition the databases and messages to recover from the point of failure.

  26. IBM Websphere Application Server

  27. 18. Will Imsdb/dc Supports Multi Threading Like Cics?

    NO.

  28. Management Information systems

  29. 19. How Integrity Is Maintained In Ims Dc Programs?

    • The IMS program isolation function ensures database integrity. All database modifications and message creation by an application program is isolated from any other application programs running in the IMS system until an application program completes a synchronization point. This ensures that only committed data can be used by concurrent application programs. A synchronization point is established with a message Get Unique (GU) call for a new input message, a checkpoint call, or application program normal termination.
    • Program isolation allows two or more application programs to concurrently run with common data segment types, even when the processing intent is to update, add, or delete.
    • With program isolation and dynamic back out, it is possible to resolve potential database deadlock situations transparent to the application programs.

    The following sequence of events is an example of a deadlock:

    • Program A updates database element X.
    • Program B updates database element Y.
    • Program A requests Y and must wait for the synchronization point of program B.
    • Program B in turn requests X and must wait for the synchronization point of program A.

300+ [UPDATED] Spray Tanning Interview Questions

  1. 1. How Does A Spray Tan Work?

    The ingredient that tans your skin is dihydroxyacetone (DHA), a colorless sugar that interacts with dead skin cells to create the tanned color. The DHA causes a chemical reaction with the proteins in the outer most layers of the skin, which causes the color of the skin to change, producing a beautiful natural tan. A spray tan does not dye the skin; the immediate color you see when your tan is applied is a color guide or bronzer that helps the technician not miss any sections and allows you to instantly see your tan. The DHA starts to react with the skin within 1 hours of the tan application and continues to do so for a total of 8 hours.

    A spray gun is used to spray a combination of air and tanning solution directly onto the skin, which dries almost immediately. In less than 30 minutes with custom spraying you can have a flawless tan that will develop over the next 8 hours.

  2. 2. Spray Tan Solution Safe To Use?

    Our tanning solution has been extensively tested and is very safe and all skin types.

    The solution we use has less than 13 ingredients with these key features: 

    • Hypoallergenic
    • ECOCERT Certified DHA, highest quality (organic)
    • Oil-Free
    • Alcohol-Free
    • Fragrance-Free
  3. Beauty Therapist Interview Questions

  4. 3. How Soon Will I See The Tanning Result?

    You will receive an immediate, all natural looking tan as our product has a built in bronzer. Your tan will continue to develop over the specified time for the solution you choose.  This will vary from as little as 30 minutes up to 12 hours depending on the original formula or an express formula.

  5. 4. Will A Spray Tan Cause Freckles In People Who Usually Freckle When Tanning?

    No. There is nothing in the tanning solution that will cause more freckles to break out. In fact, in most cases, freckles and blemishes will become less pronounced because the lighter skin areas will darken and reduce the color differentiation between the blemishes and the rest of the skin.

  6. 5. How Long Will My Spray Tan Last?

    • There are a number of factors that determine how long a tan will last. Preparation and aftercare is very important if you want to extend the life of your spray tan. This means exfoliating before hand and moisturizing afterwards. Depending on your skin type and how each solution reacts with your skin your tan can last anywhere from 5-10 days on average.
    • It is best to use exfoliators that are especially customized for spray tan preparation, as they will not contain any oils or moisturizers, and so will not stop the tanning solution getting through. Wait at least 8 hours after spray application before bathing or exercising. Moisturize skin daily to help extend tanning results. 
    • We give each client a take home after care sheet for reminders to prolong their tan.  We also have a number of products that will prepare, maintain and allow you to get the most from your spray tan.  Please check out our spray tan prep page.
  7. Cosmetology

  8. 6. How Long Should I Wait After A Tanning Session Before Showering, Swimming Or Exercising?

    To give your spray tan enough time to fully develop, it is recommended waiting a minimum of 8 hours after your spray tan (unless otherwise instructed). Showering, swimming or exercising sooner may diminish the intensity of the tan.

  9. 7. Will Swimming Affect My Spray Tan?

    Swimming in chlorinated water or salt water will fade your tan and could cause possible streaking. When swimming try to only go for short dips and rinse off in fresh water afterwards.  Remember to apply your sunscreen.

  10. Gym Instructor

  11. 8. Should I Shave Or Wax Before Or After I Get My Spray Tan?

    Whether you shave or wax is completely up to you, both should be done before the application of the tan. Ideally shaving should be done 8 hours before and waxing at least the day before. When waxing ensures that all wax is removed otherwise the tan will stick to the wax and will appear very dark where the wax has not been removed. Shaving after the application will take off some of your tan, so shave on days when you really need to and ensure that your blade is sharp. You will be sprayed with the solution containing bronzer so it is best to shave or wax one day before, as the bronzer gets into the newly created pores and can give you “spotty” look.

  12. 9. Does A Spray Tan Provide Spf Protection?

    No although your skin looks like it is well protected, spray tans do not mean that you will not get overexposed. It is very important to remember to use a sunscreen with SPF if you will be outdoors.

  13. Makeup Artist

  14. 10. How Do I Prepare For A Spray Tan Session?

    For the maximum result, before your session, shower and exfoliate the skin. The spray tanning solution affects only the dead skin cells. Your skin has a buildup of dead skin cells on top of it. The thicker the layer, the sooner it will fade. If you exfoliate, the layer will be very shallow, and it will take days for your skin to “build up”. Your tan will last longer. 

    Make sure your skin is free of perfumes, lotions, oils, deodorants, gels or any product on the skin that would create a barrier or cause the tan to develop unevenly. We have products and cloths at our studio for our clients if they are coming from work etc and have some of these products on their skin.

  15. 11. What Should I Wear?

     You may wear whatever you feel comfortable in whether you wear nothing, underwear, thong bottoms or a swim suit; it is completely up to you.  Our solution washes out of your clothing so their is no need to worry.  You may also want to take into account clothing that you will be wearing over the next few days. Think about the styles of clothing that you will be wearing for your special occasion or your vacation to determine where you do or don’t want tan lines. Men are required to wear some sort of short.  

    After your tan, wear loose, dark and preferably cotton clothing.  Your tan will be dry but there may be residue on your body (the hairs on your arms for example)   It is best to wear clothes and shoes as loose as possible, to make sure nothing rubs off. Ensure any clothing that is worn immediately after the application of the tan is dark in color to prevent the risk of staining it.  Our solution is water soluble so any residue will wash out of your clothing.

  16. 12. Will A Spray Tan Ruin Light Clothing Such As A Wedding Dress?

    No, the tan will not ruin any light clothing but ensure that you have the tan applied the day or two before you intend to wear any light coloured clothing. Also remember to shower twice to ensure that all the bronzer has washed off.

  17. Beauty Therapist Interview Questions

  18. 13. What Else Can I Do To Extend And Beautify My New Tan?

    Moisturize, moisturize, moisturize!!  Avoid shaving your legs with a heavy hand, pat your skin dry instead of rubbing, stay away from creams with AHA and try to avoid chlorine.  We offer a wide range of products that will help you prolong your new tan. Including custom self tanning moisturiser to use throughout the week after your session. These products help to maintain your tan intensity for a longer period. Our suggestion is to use your high spf sunscreen by day and yourself tanner at night while you are out for dinner and sleeping.  It’s like reversing your tanning while saving your skin!!  You will look great your whole vacation!

  19. 14. How Is Suva’s Spray Tan Applied?

    One of the many benefits of Suva’s spray tanning is the efficient, personalized application.  Our solution is professionally applied in minutes by an experienced technician using an HVLP (High Volume, Low Pressure) System with a spray gun. The gun applies a soft mist with compressed air. Because each Client will have slightly different results with sunless tanners, the application can be tailored to a Client’s specific needs (a darker application for a more tropical glow, tanning of legs only, a light application during the winter, etc). Special care is taken around hands, feet, elbows, and knees to make sure they are not too dark. The result is a natural look, not orange or streaky, creating a uniform golden tan.

  20. 15. How Do Spray On Tanning Solutions Work?

    The solution that we use at Suva contains the active ingredient dihydroxyacetone (DHA), a sugar cane derivative which reacts with the amino acids in the top layer of your skin.  DHA combines with the amino acids to form a brown color. The “tan” from our bronzer gives you instant gratification after application, and can continue to develop for up to 12 hours.

  21. 16. How Long Will It Take To Get My Spray Tan?

    The actual custom spray tanning process only takes about 15 minutes. You can expect to be at our salon for approximately 30 minutes, including filling out our client profile (first time clients) undressing, having the spray tan applied, drying, and re-dressing. 

  22. 17. What Are The Advantages Of Spray Tanning?

    Tanning via the sun or tanning beds causes damage to the skin, leading to premature aging, fine lines, wrinkles, pigmented spots and potentially skin cancer. You have made the safe choice by deciding to sunless tan. You can have a beautiful bronze glow and take care of your skin as you can never get your skin back!

  23. 18. How Dark Will I Get After One Session?

    Sunless spray tanning is not a perfect science. Results will vary based on each individual’s skin type and we have different strengths of solutions that can be used according to each Client’s skin type. We help our clients determine the look that they are wanting taking into consideration of the event, place, or surrounding.  We want our clients to be glowing on the inside and out!!

  24. Cosmetology

  25. 19. What Is A Cosmetic Bronzer?

    This is the component of sunless products that gives you immediate color for an “instant gratification, just off the beach” look. The ingredients used in cosmetic bronzers are similar to those used in cosmetic foundations or powder bronzers.

  26. 20. Will I Get That Fake “orange” Colour?

    No. We use the highest quality tanning solution that will give you that “kissed by the sun” look and will transition smoothly into your DHA color that will develop later.

  27. 21. Will It Stain My Hair?

    No. Most people will not see any affect on the color of their hair. People with gray or blond hair may see some discoloration initially, but will wash out with your first shower. We can supply a shower cap to protect your hair.

  28. 22. Will The Colour Wash Off In The Shower?

    The cosmetic bronzer that is visible immediately when you are sprayed will wash off with your first shower (after waiting 8 hours), revealing sunless tan.

  29. 23. What Should I Wear During My Spray Tan Session?

    What you wear during your session is your choice.  The preference of most Clients is to wear bottoms only; however, we understand that each Client’s comfort level is different.  Tan lines are optional for female Clients.  For the comfort of our Technicians, we ask that male Clients wear bottoms of their choice.

  30. 24. How Long Will It Take The Dha To Develop?

    You will see an immediate tan. This is due to the natural cosmetic bronzer that is used as a color guide to see where your Technician has applied the solution.  It also gives you the immediate gratification of having a beautiful tan. Your actual tan will take at least 8 hours to begin developing and can continue to develop up to 12 hours. The developed tan will be visible once you have showered off the bronzer.

  31. Gym Instructor

  32. 25. How Can I Prevent My Tan From Fading Unevenly And Looking Patchy?

    Applying a good moisturizer at least twice a day will prolong your tan and reduce the appearance of uneven fading and patchiness. Using a tan extender will help and exfoliating between maintenance sessions is very important.

  33. 26. Can I Tan If I Am Pregnant?

    Pregnant women have been using sunless tanners for over 40 years with no problems or reports of side effects on mother or child.  The FDA put DHA on its list of safe cosmetic ingredients in 1973, yet some sunless tanning companies take precautions.  Suva Spray Tan Studio is one of those companies! Please advise the Studio if you are pregnant as we can supply a list of Ingredients for you or your doctor upon request.

  34. 27. What About Spraying Over A Tattoo?

    If a tattoo or piercing is fully healed, your spray tan will not affect the area.  Sunless tanning does not fade a tattoo the same way exposing the area to UV tanning does.  You will not need to remove piercing jewelry prior to your session, however, you may need to clean the jewelry and you may experience a tan line depending on the nature of the piercing.

  35. Makeup Artist

  36. 28. Are There Any Medical Conditions That Would Prevent Me From Getting A Spray Tan?

    When you book your appointment, please let us know if you are pregnant or nursing or have any allergies, medical conditions and/or physical limitations.  This will prepare your Technician in advance so we may provide the best service to meet your individual needs.  We ask that you be courteous by canceling or not booking your appointment if you have open wounds or any communicable diseases such as a cold or flu.  This is for your own comfort as well as the protection of our Technicians and other Clients.

  37. 29. My Last Spray Tan Was Different Than The Previous One, Even Though It Was Done In The Same Spray Tan Salon?

    Again, it comes down to your skin. Your skin is a living thing, and is affected by many things like: time of the month, season, food you eat, stress, medication you take etc. If your tan is different, even though solution used was the same, the most probable cause is the condition of your skin.

  38. 30. Will I Spray Tan Evenly If I Have Hair On My Legs/arms?

    Hair is not a problem. At the end of the tanning cycle you will notice droplets of solution on your hair, just towel this excess solution off with a towel provided.

  39. 31. Does The Solution Have Unpleasant Smell Like Some Self-tanners On The Market?

    No, the solution that Suva uses is fragrance free.

  40. 32. I Had Bad Experience With A Spray Tan Before. Should I Assume That Spray Tanning Is Not For Me?

    No, there are many factors that could affect your tan; the skill of the technician (of tanned with hand held gun), the quality of solution, your skin condition at a time.

    Also remember, that the spray tanning solution is a cosmetic, and so the particular one that you had used, might not be acceptable to your skin.

  41. 33. What Is The Difference Between A Machine Spray Tan & A Customized Airbrush Tan Applied By A Person?

    The spray tan booths cannot change the % based on skin types or there are only a couple different levels. This is why people may get orange from a booth. They are getting sprayed with the wrong % for their skin type. There are up to 6 different skin types so this % can vary drastically and the machine will not adjust, nor will it look as flawless as an airbrush by a person.

  42. 34. Will I Turn Orange After My Spray Tan?

    This is dependent on the education and the technicians knowledge of understanding percentages and skin types. All our technicians understand this to an extreme. We can guarantee no orange color.

  43. 35. I Am Pregnant Or Breast Feeding; Can I Get An Airbrush Spray Tan?

    Although our solution is non toxic & not known to have any detrimental effects on an expected mother, we do recommend an approval from your doctor during the first trimester. If you are within 4 days of your due date we have a right to refuse the tan in case a c-section needs to be performed. You can still get an airbrush tan when breast feeding we just recommend you wears a bra.

  44. 36. Should I Get Beauty Services Before Or After My Airbrush Tan?

    We recommend scheduling all beauty and spa appointments such as pedicures, manicures, waxing appointments, hair appointments and massages all before your airbrush tan as these can interfere with your tan if you schedule them after.

  45. 37. What If I Don’t Have 8 Hours To Let The Tan Develop?

    We have a rapid spray tan solution that can be rinsed off in 1 to 5 hours depending on your skin type. This is great for last minute events.

  46. 38. What Is The Advantage To Purchasing Body Wash, Body Exfoliation & Tan Extender?

    Our retail products are made to interact with our solution. So purchasing these from us will make your tan last a lot longer. These products will last for multiple tans and will probably only need to be purchased once or twice a year.

  47. 39. What Kind Of Solution Do You Use?

    Green Sun Organics spray tan carries 4 different products, 2 of which are vegan and the other two are certified organic & PETA approved vegan.

  48. 40. What Is Dha?

    This is what creates the browning of the skin. DHA (Dihydroxyacetone) is an ingredient derived from sugar cane and beets, which reacts with the amino acids in the protein of the outer layer of the skin. DHA is safe & non toxic & is FDA approved for external application.

  49. 41. What Do I Wear For An Airbrush Tan?

    You can wear whatever YOU are comfortable in. We have sprayed people in one piece bathing suits all the way down to a thong. The FDA requires an undergarment be worn as well as protective eye wear, nose filters, ear protection & lip balm all of which we supply.

  50. 42. How Long Does My Spray Tan Take To Dry?

    You will dry almost instantly. We spray with such a fine mist & there is a built in blower in the gun which allows drying as we are spraying. You will not feel wet and it is a fast drying technique. You can get your tan and then get dressed and go on with your busy life.

  51. 43. My Spray Tan Lasted 1-2 Days Or Appeared Streaky, What Happened?

    There are many factors that can contribute to this problem. The PH balance of your skin may have been off so the DHA did not properly react with your skin. PH balancing spray is available for purchase at your next session to see if that helps. Certain cleansers & or lotions may contain mineral oil. Any products with mineral oil will strip the tan faster. That is why we recommend our products for pre and post tan application. Also your skin may have been too dry due to not exfoliating properly.

  52. 44. What Is The Right Way To Exfoliate?

    Exfoliate the skin gently. Doing this too rough will take off too many dead skin cells and the DHA will not interact correctly with your skin. We highly recommend our exfoliation products which you can purchase in our studio. Any oil based exfoliator can interfere if used 48 hours within your session. Our exfoliating products are used by most people with best results.

  53. 45. Should I Purchase A Tan Extender Lotion?

    This is the best form of lotion to use during your airbrush tan. Start these on day 2 or 3 as too much in the beginning can create an unnatural look. These are used best after your shower every other day for sensitive skin and every day for non sensitive skin. If you experience dryness space the extender out a bit more.

  54. 46. I Am Not As Dark As I Hoped To Be, What Would Cause This?

    • You showered too soon and the tan was not fully developed.
    • You rinse off with too hot of water.
    • The PH balance of your skin was off.
    • You used bar soap to rinse off, only use water to rinse off the bronzer on your first shower after the tan.
    • Your skin was too dry due to rough exfoliation and or oil in your exfoliators.
    • You had lotion / makeup/ deodorant or anything on your skin and it acted as a barrier.
  55. 47. I Have A Sun Burn; Can I Get A Airbrush Tan?

    We do not recommend this because as your skin peels off you will have new skin under neath and you will appear patchy. Gently exfoliate the edges and apply a lotion that does not contain mineral oil and a bronze to blend the lighter areas.

  56. 48. How Can I Prevent Uneven Color Wear-off?

    Daily application of tan extender lotion and every other day application for sensitive skin. These tan extenders not only extend the tan and prevent uneven fading but they also have the latest skin firming technology delivering dynamic copper to the skin.

  57. 49. Will This Protect Me From Uva And Uvb Rays?

    NO. There is no sunscreen in the solution. It is recommended to follow regular precautions when being in the sun.

300+ TOP RichFaces Interview Questions [UPDATED]

  1. 1. What Are The Features Of Richfaces?

    RichFaces has following features:

    • JSF Integration
    • Error handling
  2. 2. What Is Richfaces Tool-tip?

    It is used to provide an informational tool-tip. We can attach tool-tip to any control and is displayed when hovering the mouse cursor over the control.


  3. J2EE Interview Questions

  4. 3. How To Implement Richfaces Progress Bar In Jsf?

    Progress Bar is used to display the status of a process. It can update either through Ajax or on the client side, and the look and feel can be fully customized.

  5. 4. What Is Richfaces Notifystack?

    It is used to define the position of messages at the web page. Messages displayed by or are displayed in top-right corner of the web page by default.


  6. J2EE Tutorial

  7. 5. What Is Difference Between Richfaces Message And Messages?

    The component works similar to the component and automatically rendered after an Ajax request. It is used to display all the validation messages of the current web page collectively.


  8. JavaServer Faces (JSF) Interview Questions

  9. 6. How To Create Richfaces Toolbar In Jsf?

    • The component is used to create a horizontal toolbar. Any JavaServer Faces ( JSF) component can be added to the toolbar.
    • The component does not require any attributes to be defined for basic usage.
  10. 7. How To Create Richfaces Drop-dow Menu In Jsf?

    The component is used to create a drop-down or a hierarchical menu. We can use it with the component to create menus in an application?s toolbar.


  11. JavaServer Faces (JSF) Tutorial
    Java Interview Questions

  12. 8. How To Implement Richfaces Tree In Jsf?

    The component is used to create a hierarchical tree. It uses as a child component.

    We can create customize tree according to our requirement.

  13. 9. How To Make Table Scrollable Using Richfaces?

    The is used for navigate through multiple pages of tables. It must be places in a facet of the table. We can also use the for attribute to bind parent tables to the scroller.


  14. JBOSS Interview Questions

  15. 10. What Is Richfaces List?

    RichFaces provides to render a list of items. We can create numerically ordered list, an un-ordered, bullet-point list etc. It uses a data model for managing the list items which can be updated dynamically.


  16. Java Tutorial

  17. 11. What Is Difference Between Richfaces Datatable And Collapsiblesubtable?

    This component acts as a child element to the . It iterates through the child collections in the currently iterated object to create detailed tables.


  18. Eclipse (software) Interview Questions

  19. 12. How To Implement Richfaces Datatable In Jsf?

    It is used to render a table which displays data in tabular form. It works with the and components to list the contents of a data model.


  20. J2EE Interview Questions

  21. 13. What Is The Richfaces Panel?

    It is a bordered panel with an optional header. For basic usage, it does not require any attribute. A without any attributes defined renders a bordered region with no header.

    We should use header attribute to specify the text to appear in the header.


  22. JBOSS Tutorial

  23. 14. What Is The Richfaces Picklist?

    It is used to select items from a list. It allows us to change order of selected items at client-side. We can add, remove items from the source list to the target list and vice-versa.

  24. 15. What Is The Richfaces Orderinglist?

    RichFaces provides component for ordering items in a list at client-side. We need to use the value attribute to the list to be ordered.


  25. jBPM Interview Questions

  26. 16. How To Use Richface Select In Jsf?

    We can use it in an auto-completing mode, where the values in the drop-down list are provided dynamically using either the autocompleteMethod or autocompleteList attributes.


  27. jBPM Tutorial

  28. 17. What Is Richfaces Inputnumberspinner?

    This component is a single-line input field with buttons to increase and decrease a numerical value. It is used to input values by using provided spinner.


  29. Eclipse Interview Questions

  30. 18. What Is Richfaces Inputnumberslider?

    It provides a slider for changing numerical values. It is used to select numerical value by selecting from the slider’s range.


  31. JavaServer Faces (JSF) Interview Questions

  32. 19. What Is Difference Between Inplaceinput And Inplaceselect?

    InplaceSelect component is similar to the component, except that it uses a drop-down selection box to enter text instead of a text field.


  33. Eclipse Tutorial

  34. 20. What Is Richfaces Inplaceinput?

    RichFaces provides component which is used to create a editable text box. It allows text to be entered in-line in blocks of text.


  35. GlassFish Interview Questions

  36. 21. How To Upload File Using Richfaces?

    RichFaces provides the component which is used to upload files to the server. It provides lots of attributes that we can use in our application.

  37. 22. How To Implement Richfaces Editor In Jsf?

    RichFaces provides the component which is used to create a WYSIWYG editor in the HTML page.

    The component is based on the CKEditor implementation.


  38. JAVA Persistence API (JPA) Tutorial

  39. 23. How To Implement Richfaces Calendar In Jsf?

    RichFaces provides calendar component that we can implement in the JSF file.

  40. 24. Why Do We Use Richfaces Outputpanel?

    This component is used to group components together to update that as a whole rather than specify the components individually.


  41. Java Interview Questions

  42. 25. Why Do We Use Richfaces Component?

    The component generates JavaScript that opens a debug window, logging application information such as requests, responses, and DOM changes.

  43. 26. How To Send Ajax Request In Richfaces ?

    • RichFaces provides tag libraries which are capable to send Ajax request from JavaServer Faces pages.
    • The and tags are used to send an Ajax request on the click JavaScript event.
  44. 27. What Is The Architecture Of Richfaces?

    Architecture of RichFaces consist of the following components:

    • Ajax Action Components.
    • Ajax Containers

  45. JBOSS Interview Questions

  46. 28. How To Configure Richfaces In Jsf?

    To configure RichFaces, we need to download JARs provided by Jboss. After downloading, we can add that in our project.

  47. 29. What Are The Advantages Of Richfaces?

    RichFaces provides numerous advantages like:

    • Provides rich user interface components library.
    • Allows to create custom components with built in ajax support.
  48. 30. What Is Richfaces?

    RichFaces is an open source, advanced user interface component framework which is used to easily integrate Ajax capabilities into JavaServer application.

300+ TOP Web Graphics Design Interview Questions – Answers

  1. 1. What Does Proximity Refer To In The Design Theory?

    It is a way to make a group of objects feel like a single unit.

  2. 2. Which Is An Advantage Of Liquid-width Layout?

    This layout adapts to most screen resolutions and devices.


  3. HTML 5 Interview Questions

  4. 3. Which Font Should Be Used For Illustrations And Art Work That Is To Be Incorporated Into The Design Of A Website?

    Dingbat font.

  5. 4. Which Is The Type Of Symmetry Which Is Applied To Web Site Layouts By Centering The Content Or Balancing In Between Columns?

    Horizontal symmetry.


  6. HTML 5 Tutorial

  7. 5. By Which ‘magical Number’ Should A Line’s Length Be Divided So That It Can Be Bisected Using The Golden Ratio?

    1.62


  8. Web Designing Interview Questions

  9. 6. By Combining Black With Which Color Can A Design Get A Technical Feel?

    White.

  10. 7. What Is The ‘core Purpose’ Of Web Designing?

    Communication.


  11. Web Designing Tutorial
    MULTIMEDIA Interview Questions

  12. 8. What Is The Bowl Of A Letter?

    It is the rounded curve that encloses negative space in a letter form.

  13. 9. What Is The Term Given To The Process Of Cropping, Resizing And Modifying The Pictures Found While Searching With Search Engines And Using Them For One’s Own Site?

    Google Ganking.


  14. Adobe Photoshop Interview Questions

  15. 10. What Is A Split-complementary Color Scheme?

    It is a color scheme that uses the two colors adjacent to the base color’s complement.


  16. MULTIMEDIA Tutorial

  17. 11. What Is An Analogous Color Scheme?

    It is a color scheme that consists of colors that are adjacent to one another on the color wheel.


  18. PHP and Jquery Interview Questions

  19. 12. Which Of These Color Mixtures Creates The Color Vermilion?

    Red-orange.


  20. HTML 5 Interview Questions

  21. 13. For Which Purpose Has The Jpeg Format Been Developed?

    It has been developed to store photographic images.


  22. Adobe Photoshop Tutorial

  23. 14. What Does The ‘brightness’ Of An Image Refer To?

     It refers to the overall amount of light or darkness in the image.

  24. 15. What Is The ‘rule Of Thirds’?

    A line bisected by the golden ratio and divided into two sections, one of which is approximately twice the size of the other.


  25. Computer Graphics Interview Questions

  26. 16. What Does The Saturation Of A Color Mean?

    The saturation of a color is determined by a combination of light intensity and how much it is distributed across the spectrum of different wavelengths.


  27. PHP and Jquery Tutorial

  28. 17. What Does Sifr Stand For?

    Scalable Inman Flash Replacement


  29. Graphic Design Interview Questions

  30. 18. What Is A Comprehensive Dummy?

    It is a complete simulation of a printed layout that is created before the layout goes to the press.


  31. Web Designing Interview Questions

  32. 19. What Does The Term ‘typo’ Stand For?

    Writing mistakes.


  33. Computer Graphics Tutorial

  34. 20. What Is Typography?

    It is the arrangement of familiar sets of shapes to make words, sentences, and paragraphs.


  35. Dreamweaver Interview Questions

300+ TOP Veritas Cluster Server (VCS) Interview Questions – Answers

  1. 1. What Are The Different Service Group Types?

    Service groups can be one of the 3 type :

    1. Failover – Service group runs on one system at a time.
    2. Parallel – Service group runs on multiple systems simultaneously.
    3. Hybrid – Used in replicated data clusters (disaster recovery setups). SG behaves as Failover within the local cluster and Parallel for the remote cluster.
  2. 2. Where Is The Vcs Main Configuration File Located ?

    The main.cf file contains the configuration of the entire cluster and is located in the directory /etc/VRTSvcs/conf/config.


  3. Red Hat Linux System Administration Interview Questions

  4. 3. How To Set Vcs Configuration File (main.cf) Ro/rw ?

    To set the configuration file in read-only/read-write :

    • # haconf -dump -makero     (Dumps in memory configuration to main.cf and makes it read-only)
    • # haconf -makerw           (Makes configuration writable)
  5. 4. Where Is The Vcs Engine Log File Located ?

    The VCS cluster engine logs is located at /var/VRTSvcs/log/engine_A.log. We can either directly view this file or use command line to view it:

    # hamsg engine_A


  6. Unix/Linux Tutorial

  7. 5. How To Check The Complete Status Of The Cluster?

    To check the status of the entire cluster :

    # hastatus -sum


  8. Solaris Interview Questions

  9. 6. How To Verify The Syntax Of The Main.cf File?

    To verify the syntax of the main.cf file just mention the absolute directory path to the main.cf file :

    # hacf -verify /etc/VRTSvcs/conf/config

  10. 7. What Are The Different Resource Types?

    • Persistent : VCS can only monitor these resources but can not offline or online them.
    • On-Off : VCS can start and stop On-Off resource type. Most resources fall in this category.
    • On-Only : VCS starts On-Only resources but does not stop them. An example would be NFS daemon. VCS can start the NFS daemon if required, but can not take it offline if the associated service group is take offline.

  11. SSRS(SQL Server Reporting Services) Interview Questions

  12. 8. Explain The Steps Involved In Offline Vcs Configuration?

    • Save and close the configuration :
      # haconf -dump -makero
    • Stop VCS on all nodes in the cluster :
      # hastop -all
    • Edit the configuration file after taking the backup and do the changes :
      # cp -p /etc/VRTSvcs/conf/config/main.cf /etc/VRTSvcs/conf/config/main.cf_17march
      # vi /etc/VRTSvcs/conf/config/main.cf
    • Verify the configuration file syntax :
      # hacf -verify /etc/VRTSvcs/conf/config/
    • start the VCS on the system with modified main.cf file :
      # hastart
    •  start VCS on other nodes in the cluster.

    Note
    : This can be done in another way by just stopping VCS and leaving services running to minimize the downtime. (hastop -all -force GAB, LLT and HAD)

  13. 9. What Is Gab, Llt And Had And What’s Their Functionalities ?

    GAB, LLT and HAD forms the basic building blocks of vcs functionality:

    • LLT (low latency transport protocol)
      – LLT transmits the heartbeats over the interconnects. It is also used to distribute the inter system communication traffic equally among all the interconnects.
    • GAB (Group membership services and atomic broadcast)
      – The group membership service part of GAB maintains the overall cluster membership information by tracking the heartbeats sent over LLT interconnects. The atomic broadcast of cluster membership ensures that every node in the cluster has same information about every resource and service group in the cluster.
    • HAD (High Availability daemon)
      – the main VCS engine which manages the agents and service group. It is in turn monitored by a daemon named hashadow.

  14. Logical Volume Manager (Linux) Interview Questions

  15. 10. What Are The Various Gab Ports And Their Functionalities ?

    • a : gab driver
    • b : I/O fencing (to ensure data integrity)
    • d : ODM (Oracle Disk Manager)
    • f  : CFS (Cluster File System)
    • h : VCS (VERITAS Cluster Server: high availability daemon, HAD)
    • o : VCSMM driver (kernel module needed for Oracle and VCS interface)
    • q : QuickLog daemon
    • v : CVM (Cluster Volume Manager)
    • w : vxconfigd (module for cvm)
  16. 11. How To Check The Status Of Various Gab Ports On The Cluster Nodes?

    To check the status of GAB ports on various nodes :

    # gabconfig -a


  17. Unix/Linux Interview Questions

  18. 12. Whats The Maximum Number Of Llt Links (including High And Low Priority) Can A Cluster Have ?

    A cluster can have a maximum of 8 LLT links including high and low priority LLT links.


  19. Red Hat Linux System Administration Interview Questions

  20. 13. How To Check The Detailed Status Of Llt Links ?

    The command to check detailed LLT status is :

    # lltstat -nvv

  21. 14. What Are The Various Llt Configuration Files And Their Function ?

    LLT uses /etc/llttab to set the configuration of the LLT interconnects.
    # cat /etc/llttab
    set-node node01
    set-cluster 02
    link nxge1 /dev/nxge1 – ether – –
    link nxge2 /dev/nxge2 – ether – –
    link-lowpri /dev/nxge0 – ether – –

    Here, set-cluster -> unique cluster number assigned to the entire cluster [ can have a value ranging between 0 to (64k – 1) ]. It should be unique across the organization.

    set-node -> a unique number assigned to each node in the cluster. Here the name node01 has a corresponding unique node number in the file /etc/llthosts. It can range from 0 to 31.

    Another configuration file used by LLT is – /etc/llthosts. It has the cluster-wide unique node number and nodename as follows:

    # cat /etc/llthosts
    0 node01
    1 node02

    LLT has an another optional configuration file : /etc/VRTSvcs/conf/sysname. It contains short names for VCS to refer. It can be used by VCS to remove the dependency on OS hostnames.

  22. 15. What Are Various Gab Configuration Files And Their Function ?

    The file /etc/gabtab contains the command to start the GAB.

    # cat /etc/gabtab
    /sbin/gabconfig -c -n 4

    here -n 4 –> number of nodes that must be communicating in order to start VCS.


  23. Windows Clustering Interview Questions

  24. 16. How To Start/stop Gab?

    The commands to start and stop GAB are :

    # gabconfig -c        (start GAB)
    # gabconfig -U        (stop GAB)

  25. 17. How To Start/stop Llt?

    The commands to stop and start LLT are :

    # lltconfig -c       -> start LLT
    # lltconfig -U       -> stop LLT (GAB needs to stopped first)


  26. Solaris Administrator Interview Questions

  27. 18. What’s A Gab Seeding And Why Manual Gab Seeding Is Required ?

    The GAB configuration file /etc/gabtab defines the minimum number of nodes that must be communicating for the cluster to start. This is called as GAB seeding.

    In case we don’t have sufficient number of nodes to start VCS [ may be due to a maintenance activity ], but have to do it anyways, then we have do what is called as manual seeding by firing below command on each of the nodes.

    # gabconfig -c -x


  28. Solaris Interview Questions

  29. 19. How To Start Had Or Vcs ?

    To start HAD or VCS on all nodes in the cluster, the hastart command need to be run on all nodes individually.

    # hastart

  30. 20. What Are The Various Ways To Stop Had Or Vcs Cluster ?

    In general, to add a service group named SG with 2 nodes (node01 and node02) :

    • haconf –makerw
    • hagrp –add SG
    • hagrp –modify SG SystemList node01 0 node02 1
    • hagrp –modify SG AutoStartList node02
    • haconf –dump -makero

  31. Volumetric Analysis Interview Questions

  32. 21. How To Check The Configuration Of A Service Group – Sg ?

    To see the service group configuration :

    # hagrp -display SG

  33. 22. How To Bring Service Group Online/offline ?

    To online/offline the service group on a particular node :

    # hagrp -online [service-group] -sys [node]      (Online the SG on a particular node)

    # hagrp -offline [service-group] -sys [node]        (Offline the SG on particular node)

    The -any option when used instead of the node name, brings the SG online/offline based on SG’s failover policy.

    # hagrp -online [service-group] -any

    # hagrp -offline [service-group] -any

  34. 23. How To Switch Service Groups ?

    The command to switch the service group to target node :

    # hagrp -switch [service-group] -to [target-node]


  35. Red Hat Certified Engineer (RHCE) Interview Questions

  36. 24. How To Freeze/unfreeze A Service Group And What Happens When You Do So ?

    When you freeze a service group, VCS continues to monitor the service group, but does not allow it or the resources under it to be taken offline or brought online. Failover is also disable even when a resource faults. When you unfreeze the SG, it start behaving in the normal way.

    To freeze/unfreeze a Service Group temporarily :

    # hagrp -freeze [service-group]
    # hagrp -unfreeze [service-group]

    To freeze/unfreeze a Service Group persistently (across reboots) :

    # hagrp -freeze -persistent[service-group]
    # hagrp -unfreeze [service-group] -persistent 
    Communication failures : Jeopardy, split brain


  37. SSRS(SQL Server Reporting Services) Interview Questions

  38. 25. Whats A Jeopardy Membership In Vcs Clusters?

    When a node in the cluster has only the last LLT link intact, the node forms a regular membership with other nodes with which it has more than one LLT link active and a Jeopardy membership with the node with which it has only one LLT link active.

  39. 26. How To Recover From A Jeopardy Membership ?

    To recover from jeopardy, just fix the failed link(s) and GAB automatically detects the new link(s) and the jeopardy membership is removed from node.


  40. ZFS Interview Questions

  41. 27. Whats A Split Brain Condition ?

    Split brain occurs when all the LLT links fails simultaneously. Here systems in the cluster fail to identify whether it is a system failure or an interconnect failure. Each mini-cluster thus formed thinks that it is the only cluster thats active at the moment and tries to start the service groups on the other mini-cluster which he think is down. Similar thing happens to the other mini-cluster and this may lead to a simultaneous access to the storage and can cause data corruption.


  42. Logical Volume Manager (Linux) Interview Questions

  43. 28. Whats The Difference Between Multinica And Multinicb Resource Types ?

    MultiNICA and IPMultiNIC:

    • supports active/passive configuration.
    • Requires only 1 base IP (test IP).
    • Does not require to have all IPs in the same subnet.

    MultiNICB and IPMultiNICB:

    • supports active/active configuration.
    • Faster failover than the MultiNICA.
    • Requires IP address for each interface.
    • Troubleshooting
  44. 29. How To Flush A Service Group And When Its Required ?

    Flushing of a service group is required when, agents for the resources in the service group seems suspended waiting for resources to be taken online/offline. Flushing a service group clears any internal wait states and stops VCS from attempting to bring resources online.

    To flush the service group SG on the cluster node, node01 :

    # hagrp -flush [SG] -sys node01

  45. 30. How To Clear Resource Faults ?

    To clear a resource fault, we first have to fix the underlying problem.

    • For persistent resources : Do not do anything and wait for the next OfflineMonitorInterval (default – 300 seconds) for the resource to become online.
    • For non-persistent resources : Clear the fault and probe the resource on node01 :

    # hares -clear [resource_name] -sys node01
    # hares -probe [resource_name] -sys node01

  46. 31. How To Clear Resources With Admin_wait State ?

    If the ManageFaults attribute of a service group is set to NONE, VCS does not take any automatic action when it detects a resource fault. VCS places the resource into the ADMIN_WAIT state and waits for administrative intervention.

    To clear the resource in ADMIN_WAIT state without faulting service group :

    # hares -probe [resource] -sys node01

    To clear the resource in ADMIN_WAIT state by changing the status to OFFLINE|FAULTED :

    # hagrp -clearadminwait -fault [SG] -sys node01

  47. 32. How To Check The Status Of Veritas Cluster Server? Or How To Check The Status Of Vcs Cluster?

    hastatus –sum

  48. 33. Which Is The Main Config File For Vcs And Where It Is Located? Or What Is The Main Vcs Configuration File?

    main.cf is the main configuration file for VCS and it is located in /etc/VRTSvcs/conf/config/.


  49. Unix/Linux Interview Questions

  50. 34. Which Command You Will Use To Check The Syntax Of The Main.cf? Or How To Verify The Syntax Of Main.cf Configuration File?

    hacf -verify /etc/VRTSvcs/conf/config

  51. 35. How Will You Check The Status Of Individual Resources Of Vcs Cluster? Or How To Check The Individual Resources Status In Vcs Cluster?

    hares –state

  52. 36. What Is Service Group In Vcs?

    Service group is made up of resources and their links which you normally requires to maintain the HA of application.


  53. Windows Clustering Interview Questions

  54. 37. What Is The Use Of Halink Command? Or What Is Halink In Veritas Cluster?

    halink is used to link the dependencies of the resources.

  55. 38. What Is The Difference Between Switchover And Failover? Or What Is Switchover And Failover?

    Switchover is an manual task where as failover is automatic. You can switchover service group from online cluster node to offline cluster node in case of power outage, hardware failure, schedule shutdown and reboot. But the failover will failover the service group to the other node when VCS heartbeat link down, damaged, broken because of some disaster or system hung.

  56. 39. What Is The Use Of Hagrp Command? Or How To Manage The Service Group In Vcs?

    hagrp is used for doing administrative actions on service groups like online, offline, switch etc.

  57. 40. How To Switchover The Service Group In Vcs? Or How To Move The Service Group From One Node To Other Node In Vcs?

    hagrp –switch -to nodename


  58. Solaris Administrator Interview Questions

  59. 41. How To Online The Service Groups In Vcs? Or How To Bring The Service Online In Particular Node?

    hagrp –online -sys nodename

  60. 42. Shutdown Vcs Cluster But Keep The Services Up.

    hastop -all -force


  61. Volumetric Analysis Interview Questions

  62. 43. How To Check The Gab Status In Vcs Cluster? Or Confirm Vcs Has Shut Down On Each System?

    gabconfig -a

  63. 44. How To Shutdown Gab And Confirm It’s Down On Each System?

    • gabconfig -U
    • gabconfig -a
  64. 45. How To Identify The Gab Kernel Module And Remove It From Each System In Linux?

    lsmod | grep gab

    rmmod gab

  65. 46. How To Shutdown Llt On Each System In Vcs Cluster?

    lltconfig -U

  66. 47. How To Identify The Llt Kernel Module And Remove It From Each System On Linux?

    lsmod | grep llt

    rmmod ltt

  67. 48. How To Unfreeze All Service Groups?

    haconf -makerw

    hagrp -unfreeze -persistent

    haconf -dump -makero

  68. 49. What Is Jeopardy In Vcs? Or What Is Jeopardy State?

    The state in which a node is missing one of the two required heartbeat connections. When a node is running with one heartbeat only (in jeopardy), VCS does not restart the applications on a new node. This action of disabling failover is a safety mechanism that prevents data corruption.

  69. 50. What Is Split Brain In Vcs? Or What Is Split Brain Syndrome In Vcs Cluster?

    A split brain occurs when two independent systems configured in a cluster assume they have exclusive access to resource. this scenario can be caused when all cluster heartbeat links are simultaneously lost. Each cluster node will then mark the other cluster node as FAULTED. , usually resulting in data corruption.

  70. 51. What Is The Cluster Log File For Vcs Cluster?

    /var/VRTSvcs/log/engine_A.log14

  71. 52. Which Daemons Are Required For Ldap Server?

    slapd and slurpd