Browse [LATEST] ATG System Interview Questions & Answers - 2020
ATG System Interview Questions and Answers

Browse [LATEST] ATG System Interview Questions & Answers

Last updated on 04th Jul 2020, Blog, Interview Questions

About author

Pradeep (Sr Project Manager )

He is Possessing 7+ Years Of Experience in ATG. His Passion lies in Developing Entrepreneurs & Activities. Also, Rendered his intelligence to the Enthusiastic JOB Seekers.

(5.0) | 17547 Ratings 615

These ATG SYSTEM Interview Questions have been designed specially to get you acquainted with the nature of questions you may encounter during your interview for the subject of ATG SYSTEM. As per my experience good interviewers hardly plan to ask any particular question during your interview, normally questions start with some basic concept of the subject and later they continue based on further discussion and what you answer.we are going to cover top 100 ATG SYSTEM Interview questions along with their detailed answers. We will be covering ATG SYSTEM scenario based interview questions, ATG SYSTEM interview questions for freshers as well as ATG SYSTEM interview questions and answers for experienced

1. According to an HTTP monitor, a website is down. You’re able to telnet to the port, so how do you resolve the issue?


 Technical skills matter a lot in systems administrator jobs. Thus, many of your interview questions should deal with assessing candidates’ hard skills, and this question covers several areas of required knowledge. Look for:

  • Identifying the problem instead of just telling hardware techs something is wrong
  • Ability to troubleshoot
  • Curiosity to figure out the “why”

“Assuming the web page is up, I would investigate what could be wrong with the monitor. It could be a system overload or flapping, among other issues. Identifying the problem helps me prevent it in the future.”

2. Suppose you try to fix a problem such as passwords not working for a group of users, but your attempt fails. What would you do?  


It is important for systems administrators to be unafraid of failure and experimentation. In fact, it can be rare for a first attempt at fixing a problem to succeed, and your candidates should have logical strategies for coming up with solutions. Look for:

  • A real strategy instead of trying things randomly
  • Recognition that multiple attempts are often necessary
  • A walk through the process

“I’ve learned from experience that a first attempt doesn’t always work. I always make sure to have at least two other backup plans. Here’s something that happened at my previous job …”

3. What are three attributes that make you a great systems administrator?


This question lends insight into candidates’ self-awareness skills as well as whether their values match those of your business. Look for:

  • Answers that match areas of emphasis in your job description
  • At least one soft skill
  • Attributes that fit your company culture

“I’m analytical and curious. I always dig to find out why a problem occurred. Otherwise, it is liable to happen again and hurt the business. I am also a great communicator, able to share my insight with anyone in jargon-free language.”

4. Why is it a bad idea to restore a DC last backed up seven months ago?


This question gets to candidates’ technical knowledge. DC means domain controller, and your candidates should know what it is. Look for:

  • Use of lingo or jargon
  • A mention of lingering objects
  • Knowledge of 180 days

“If you back up a DC seven months old, you could encounter lingering objects that lead to inconsistent data. Backup files, as a general rule, shouldn’t be over 180 days old.”

5. What are you especially proud of in your experience with support for users and endpoint systems?  


Many systems administrator jobs require interaction with users and knowledge of remote techniques and ticketing systems. This question ensures that the candidate will be able to do the customer service you require. Look for:

  • Ability to help and please clients
  • Specific examples) of accomplishments
  • Recognition of the value of a good client experience

“I’m particularly proud of the fact that I can effectively identify a problem and the best tools to resolve it. My clients often refer me to others and talk about how I quickly restore their functionality. In fact, here’s something that happened while I was at HTWW company …”

6. Tell something about the Light-Weight Directory Access Protocol?


The Light-Weight Directory Access Protocol is responsible for the naming of the objects which are under the Active Directory. It is basically the industry standard directory access protocol. Its main aim is to enhance the reachability of the Active Directory.

7. Tell something about the group policy and why does that matter?


The implementation of the specific configurations is implemented for the nodes as well as for the users through the Group Policy. There are GPO’s (Group Policy Objects) which contain the settings of the group policy. They are generally made linked to the sites, unites or with the domains directly.

8. What do you mean by the Lingering Objects in the System?


 While performing tasks, there is often need to erase or to delete the Active Directory from the system. A deleted or an erased Active Directory file can be considered as a Lingering object. They are called Lingering because of their presence when the same is on the Domain Controller. After creating the system backups, there are changes on the directories and the same is responsible for the creation of the same. There is actually a limit on the backup file and i.e. it should be older than 180 days. All those are older than this, get deleted automatically and are called as Lingering objects.

9. Name the command which you can use to remove the Lingering object? Why removing them is important?


They can be removed easily through the command REPADMIN.EXE. It is basically a console utility command. In case the Lingering objects are not deleted, they can put an extra burden of the system’s Random Access Memory and can create problems such as limited space availability and slow performance.

10. Why an Active Directory Back up is important?


It is important mainly due to the proper functionality of the Active Directory Database. Without creating the backup, the system cannot let you work on the older modules and users cannot keep up the pace simply with the registered domains that are essential for performing several important tasks. In case the backup is not created, the troubleshooting process is to be adopted by the users.

11.  What are Forests in the Domain?


The Forests are nothing but the dynamic collection of the trees with a catalog which is common to all of them. Generally, a forest defines the security policies that bind all the users and computers on a network.

12. As a system administrator, what do you think is the more critical factor associated with the hardware components?


Something that is very important about the hardware components is their proper installation, maintenance, as well as the replacement. They are actually the essential operations that the users have to perform with the hardware. The most critical one could be the replacement or building of a component. 

13. Name one important skill that you think a System Administrator should have?


Well, one thing which is common among all the tasks performed by a system administrator is problem-solving. Thus, he/she should be good in the same and this is one of the essential skills of a system admin. 

14. What according to you could be the characteristics of someone administrating the System?


 A System Administrator should know who to handle the operations related to hardware. He/she must also be good with the software domain. Although they have to work individually, they must know what and when to discuss with others. Gathering information, problem formulation, troubleshooting and managing the technical problems are some of the other important characteristics that an expert should have. Upgrading the systems and reducing the down-time of the servers is also their responsibility. Because they have to take several important decisions quickly, so good decision-making ability is another prime characteristic they must bear.

15. How FAT and NTFS are different from one another according to you?


FAT is basically an old approach and is a file system that was common with the older versions of the Windows. It has a limit on the memory and users are not in a position to run the files that are heavy and of HD quality. Therefore it doesn’t have a wide scope in the present scenario. On the other side, the NTFS is common these days. The best thing about the same is it enables users to have a better command over the files due to better security policies when compared with the FAT. Some of the key features that make it simply the best are Shadowing, Quotas as well as Troubleshooting. 

16. How Firewall and antivirus are different from one another?


Well, they both have a similar objective and i.e. to enhance the overall security of the network. The antivirus obviously keeps a system safe from the computer viruses. It simply reports, erase and notifies the users aim case of an infected file enter the system memory and always make sure that the system data remains safe. On the other side, a firewall is an approach or a program that simply don’t let hackers and intruders to steal information from a system. Firewall approach simply doesn’t let the hackers govern the control on the system partially or fully. Whereas the antivirus is only available as a software, the Firewall is available in both hardware as well as software form.

 17. What is WINS Server and how it is useful?


It is basically a server with the help of which the users can simply make sure of accessing the resources through the name of the nodes in the network than using the IP. It can be configured in the system for keeping a track record of IP addresses and node names. 

18. How well can you explain the Active Directory concept in the System administration?


 When it comes to network security and administration, something that largely matters is nothing but the centralized control of everything. The same can easily be assured through the Active Directory. The nodes which are associated with the server are generally configured with the Active Directory. Generally, they act as controllers for all the domains concerned with the network. All the settings and the information related to the development is generally stored in the central database. The Directory makes sure that the administrators to enable the deployment and policies. Depending upon the nature of the task, it is also responsible for the other tasks that are related to the operating system. 

19. What does APIPA stand for?


APIPA means Automatic Private IP Addressing. IT enables users to locate the IP addresses when the DHCP servers fail to perform their task.

20. What do you know about the Domain controller and how it is significant?


It is also known as a network domain controller and is basically a computer system which is often based on Windows. All the data and the information that is related with the user account are stored on a central database with the Domain controller. It is also regarded as the central unit for the Active Directory in the Windows. It is mainly responsible for matching the authentication details and making sure that the security policies are not getting violated. 

    Subscribe For Free Demo

    21. Name a few email ports you are familiar with?


    These are HTTP, SMTP, IMAP4, POP3, Secure POP3 and Secure IMAP

    22. How the access to a user is granted or rejected for accessing the information?


    This is generally done through the Domain controller. Generally, the users who have the access to the information are given a unique ID and a password.

    23. What is the significance of VOIP?


    It is basically an approach that is helpful for enabling the users to adopt modern techniques over the traditional infrastructure. It stands for Short for Voice over Internet Protocol which is a basically a special type of Software and hardware with the help of which users can clearly use the transmission medium which is designed for the telephone calls by delivering the voice packets.

    24. What do you mean by Group Policy Objects and how they are significant?


    A GPO is nothing but an array of settings that is responsible for assuring the proper control of the working environment of a user, as well as nodes account. There are policies that are important and GPO’s are responsible for the implementation of the same. In addition to this, a GPO performs another important task and i.e. it redirects the folder options. Generally, the GPOs are of two types and they are Local and Non Local Group.

    25. What exactly do you know about a Domain?


    Basically, it’s nothing but the logical group of network objects that generally include users, computers, as well as the devices among which the Active Directory database is pretty common. In a tree which generally defines how the nodes are connected, there can be multiple domains and each is responsible for the functioning of a specific one

    26. What you can store at the location C.WindowsNTDSNTD.DIT?


     At this location, the Ad database is stored

    27. Explain the differences of droplet, FormHandler and servlet:


    Servlet is a java class whereas Droplet is from ATG

    1. Droplet has been developed to render or put data in the database.

    2. Servlet uses for submiting data, as it acts like a controller and is will not use for put data.

    3. Servlet renders the segment of JSP page.

    4. FormHandlers are utilized during forms to carry out authentication of the forms.

    28. What is the difference between dsp and dspel tags?


    1. The DSP tag is a library of tags which supports runtime expressions, such as suggestions while scripting variables. These tags use an id characterized by name while scripting the variables.

    2. DSPEL tag library supports JSTL Expression Language (EL) fundamentals that are assessed during runtime. These tags regularly generate a result entity codenamed by the var attribute.

    3. For customized tags we need to write the properties file and a class file to define the purpose. We should also include a tag file with extension .tld, which means tag library definition, and in the droplet consisting of the path of tag uri<% tag uri…..%>

    4. For example we can write a custom tag to compute the shipping charge with promotion and save it and pull it as & when required.

    29. What are the 2 methods of component?


    These are the 2 methods of component: setters & getters. These components helps the setter to keep their data in private while exposing their article to any public repositories.

    30. What do you mean by item descriptor?


    Item descriptor can be detailed with the help of SQL Repository. For example, each database table has a unique repository item descriptor. Sometimes multiple tables are joined into a single item descriptor. Since ATG supports Java collections, hence we can store a list, map or arrays. ATG repositories allow one-by-one, one-many, many-many relationship.

    Course Curriculum

    Learn Expert-led ATG System Training with Experienced Instructors

    • Instructor-led Sessions
    • Real-life Case Studies
    • Assignments
    Explore Curriculum

    31. What are the differences between dsp. include and jsp. Include?


    1. dsp.include are basically dynamic server pages which pulls in all stuff of the type class too, whereas jsp better known as java server pages pulls in only the primitive ones.

    2. The other differences between them is that JSP include directive is dynamic where as DSP include is for data lesser than 64 kb.

    3. DSP tag library was created by ATG for accessing all types of data including those from ATG’s Nucleus Framework too. 

    4. Other functions available through these tags manage transactions and analyses how the data is to be rendered in JSP. 

    5. It’s good to utilize these tags from DSP tag library for jobs involving Dynamo Application Framework (DAF) resources. 

    6. Dsp tag supports the carrying of object parameters in between the pages. 

    7. To be particular, one should use dsp:include instead of using jsp:include, and apply dsp:param instead of jsp param.

    32.  How is shopping cart implemented?


     In ATG it’s very simple as we need to use the ShoppingCartFormHandler, available amongst formhandlers.

    33.  What are the main formhandler to be used for shopping cart?


    Basically ShoppingCartFormHandler & CartModifierFormHandler are the two main formhandler that are being used by while making a shopping cart.

    34. What are the benefits of DAF?


    1. It is generally used to maintain a large pool of data. 

    2. Repositories are included in it which help to pull data anywhere during building of an architecture.

    3. It can script any object of any type which is requested for the db.

    4. Dynamo messaging generally uses patch jms and bay for better efficiency.

    35.  What is ATG DPS & its elements?


    ATG Dynamo personalization system is abbreviated to as ATG DPS. It’s works on the basis of the user’s Profile Data and the rules have been fabricated to deliver the right content as per the request of the user. There are basically three key elements are associated with ATG DPS which are as follows:

    1. User Profile Management – when a visitor approaches to the website for the first time, the user is allowed to create their own profile. After they submit their customized data DPS stores the visitors profile in its database repository. This repository best describes the preferences and characteristics of the user. Accordingly the content is customized and shown to the visitor.

    2. Content Targeting – Content are customized for specific user at a specific time in a specific context and set of rules.

    3. E-mail Targeted – DPS includes targeted mail services not only for delivering, but customizes in composing of the mail too. Scenarios can be conveyed to the user too. It sends a confirmation mail to each and every single user after they register on the site. it also ends notifications to all users who haven’t logged in to the site for long and their account might be shut down soon.

    Course Curriculum

    Get ATG System Training & Certification Course to Enhance Your Career

    Weekday / Weekend BatchesSee Batch Details

    36.  Mention the extent of Dynamo Components?


    The extent of Dynamo Components are as follows:-

    1. Session

    2. Request

    3. Worldwide being the default scope.

    37.  What do you mean by scenarios?


     Scenario predicts and tracks the activities of the website visitors and acts accordingly, for e.g., customizing the content of the page visited and offering exclusive promotions on offer, or sending targeted massages through an e-mail.

    38.  What do you mean by pipeline?


     It’s simply a variant of Servlet Pipeline. In an ATG pipeline the order of Programs are implemented in a sequence. It initiates with the DynamoHandler which add the definitive dynamo request and responds accordingly. The lists of servlets seen are dependent on the module being used. This is how Dynamo Application Server adds more servlets to its pipeline.

    39. Is DAS applicable for high volume or low volume traffic?


    Dynamo Application Server (DAS) is generally used to manage high volume of traffic. 

    40. What are the problems faced with ATG’s performance?


     know that issues comes in all shapes and sizes, which means that the performances of the task is not going as expected, which was previously observed to be functioning smoothly. Issues include CPU utilization, sluggish responses, database activity of high levels, long running SQL queries, slow CA deployments are some of the few.

    41.Why is Eclipse used with ATG?


    The component available as Eclipse IDE is of huge utility in ATG.

    42. Which IBM products are used with ATG?


    IBM’s Web Sphere Application Server is of of great use to enhance the performance of ATG. Apart from Eclipse IDE, which is an open source platform used for developing web applications

    ATG Sample Resumes! Download & Edit, Get Noticed by Top Employers! Download

    43. What do you understand by derived properties?


    Derived properties means enabling of extracting the property value from one repository article to another repository article or from another property to the same repository article.

    44. What is the difference between Item Cache and Query cache?


    For description of each article in repository, an SQL repository manages two caches: Item Cache & Query Cache

    • Item caches preserve the values of repository items, which are indexed by the respective repository IDs. Item caching facilitates each & every single item descriptor.
    • Query caches preserve the repository IDs of articles that matches the given queries. As soon as the query returns the repository articles in response, item descriptor enables query caching and as a result, the set is cached as follows: 
    • Query cache preserving the repository IDs
    • Item cache preserving the parallel repository items

    45. Can ATG applications be installed on a cluster of servers?


    If any such situation arises when the ATG applications have to be installed on a cluster of servers, then it is preferred to select from either distributed caching or locked caching.

    46.What are the different modes of caching in ATG?


    The various approaches to Caching are set at the item descriptor stage, through the tag’s cache-mode attribute. The default caching mode is simple caching. To modify the default caching mode on an item descriptor, we can set cache-mode to any one of the following values:

    1.  Simple

    2. Locked

    3. Distributed TCP caching

    4. Distributed JMS caching

    5. Distributed Hybrid caching

    47.What are the handleX technique?


    HandleX technique contains the definite function to be performed which is a method, just like ProfileFormHandler- handleLogin

    48.What are pricelists?


    Price Lists allows any developer to aim for a specific range of prices for a specific group of consumers. Price lists are managed through a single interface in ACC. For e.g., price lists can be used to execute B2B pricing where each client can have their own unique pricing for products based on contracts at negotiated prices, and can be changed as & when required too.

    Are you looking training with Right Jobs?

    Contact Us
    Get Training Quote for Free