Computer Systems Analyst Interview Questions & Answers

3 avg. rating (60% score) - 3 votes

Computer Systems Analyst Interview Questions & Answers

If you are interested in Computer System Analyst jobs then our site wisdomjobs.com is going to be very useful for your job preparation. Wisdomjobs provide you complete Computer Systems Analyst interview Question and Answers and well as reading material as well. A systems analyst is an information technology professional who specializes in analysing, designing and implementing information systems. If you are expertise at Computer System Analyst then there are several opportunities for the roles like Computer Systems Analyst, Senior Computer Systems Analyst, Navision Systems Analyst, .Net Developer (System Analyst/Sr. Software Engineer) and many other roles too. To be succeeded in any interview one must prepare well for interview one should be able to answer the questions asked. So, for making things easy we have provided lot of information on our site Wisdomjobs.com.

Computer Systems Analyst Interview Questions

Computer Systems Analyst Interview Questions
    1. Question 1. Mention What Is The Basic Role Of A Computer System Analyst?

      Answer :

      • Provide assistance to users solving computer related problems
      • Test, maintain and monitor systems and computer programs
      • Co-ordinate and connect the computer systems within an organization to increase compatibility
      • Modify system to improve work flow
      • Training and assisting staff and users to work with computer systems
      • Recommend new equipment or software packages
      • Determine computer software or hardware required in an organization
      • Good understanding of company’s database
      • Publish weekly report which identify progress made towards implementing monitoring by application and by environment.

    2. Question 2. Mention What Are The Skills Required To Become A Computer Analyst?

      Answer :

      • Good learning and listening skills
      • Complex problem-solving abilities
      • Time management
      • Troubleshooting
      • Good knowledge of software application and networking
      • Quality control analysis
      • Critical thinking

    3. Question 3. Mention What Is Dhcp Server?

      Answer :

      DHCP server stands for dynamic host configuration protocol; that is designed as the functional extension of the Bootstrap network Protocol. It is a server or client protocol that automatically caters an internet protocol (IP) host with its IP address and other configuration as the subnet mask and default gateway.

    4. Question 4. Mention Why To Use Dhcp Server?

      Answer :

      DHCP server allowed entire process to be auto-mated and managed centrally. DHCP server maintains the IP addresses in bulk and assign an address to any DHCP enabled client when he switch on to the network. As such the addresses are dynamic rather than static, so the addresses which are no more in use are automatically return to the bulk for re-allocation.

    5. Question 5. Mention What Is Sub-netting?

      Answer :

      Sub-netting is the procedure of partitioning a single TCP/IP network into a number of distinct network segments called subnets.

    6. Question 6. Mention What Computer System Analyst Document?

      Answer :

      Computer system analyst can document what is going in current systems, and what can be expected in systems that have not been built yet. Documenting is often done in collaboration with technical writers, system designers and system architects.

      List of thing that computer analysts document include:

      • User Scenarios
      • Functional activities
      • Data flows
      • Classes
      • Interfaces between Systems

    7. Question 7. Mention What Are The Types Of Requirements That A System Analyst Should Gather And Analyze?

      Answer :

      System analyst should gather requirements like:

      Technical requirements: It includes the detail about what the system is built, including which language it will be programmed in, what standards are to maintained, etc.

      Functional requirements: It includes the detail about what needs to be delivered, which is generally read by software engineers, project managers and business analyst.

    8. Question 8. Explain What Is Spoofed Packet?

      Answer :

      Spoofed packet is an internet protocol packet that is created from a fake IP address, but behaves as a legitimate and authenticated sender. It is usually used in denial of service attacks and are used to defeat the security mechanism of the network and bye-pass service which are based on IP authentication.

    9. Question 9. Mention What Are Some Organization Software Usage Policies That Computer Analyst Can Implement In An Organization?

      Answer :

      • Disallowing the use of external drives for employees to access organization’s data
      • Not allowing to download pirated software and electronic files that are copyrighted or unauthenticated
      • No sharing of confidential material, proprietary information or trade secrets outside the organization
      • Not allowing them to hack into unauthorized websites or download contents
      • Not allowing them to post or send information that is offensive to the company or organization
      • Preventing downloading of any malicious software onto the company network
      • Not allowing employees to pass off personal views as representing those of the organization.

    10. Question 10. Mention What Does The Software Audit Includes?

      Answer :

      Software audit includes:

      • Looking into an employee’s computer system for violation of security and company’s policy
      • Regular audits of all servers and computers to check whether they are updated in streamlined with all software licenses
      • Adapting audit system that is least bothering to employee and their task
      • Apart from regular audits, random audit should be done to check whether there is any deletion or addition of software to the system.

    11. Question 11. Mention What Are The Steps For Record Keeping For Software?

      Answer :

      A register should be maintained that includes the detail of software like:

      • Software’s publisher name and title
      • Source and date of software acquisition
      • Location of the software installation as well as the serial number of the hardware on which copy of the software is installed
      • Location and existence of back-up copies
      • Serial number of software products

    12. Question 12. Mention How To Do The Registration Of Software?

      Answer :

      • When an organization receives purchased software, the designated department must receive the software first to complete registration and inventory requirement before installations
      • And in the event the software is shrink-wrapped, the software receiving department must complete the registration forms and return it to the software publisher
      • Software must be registered on the name of the organization and not an individual user.

    13. Question 13. Mention What The Difference Is Between Ssh And Ssl?

      Answer :

      SSL and SSH both are special encryption and protocol technologies used to connect two computers:

      • SSH: SSH stands for “Secure Shell” which commonly uses port 22 to connect your system on another system via internet. It is often used by network administrators as a remote login or remote control to manage their business servers.
      • SSL: SSL stands for “Secure Sockets Layer” it commonly uses port 443 to connect your system to a secure system on the Internet. It is often used for transmitting information like tax, banking, credit card, personal information to a business server somewhere.

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

System Analysis and Design Tutorial