Home /

IBM BigFix Interview Questions and Answers

Rating: 5.0Blog-star
Views: 60
by Vinod Kasipuri
Last modified: August 12th 2021

BigFix is gaining tremendous traction in business sectors, and if you want to advance your career, you must become an expert in BigFix management. After completing all of the training for BigFix, the next critical step is to successfully clear the interview panel in order to progress in your career.

Keeping this in mind, we've compiled the most critical BigFix interview questions and answers that will undoubtedly increase your understanding of the platform and help you land your ideal job.

If you want to enrich your career and become a professional in API Testing, then enroll in "IBM BigFix Training". This course will help you to achieve excellence in this domain.

Top 10 Frequently Asked IBM BigFix Interview Questions

  1. What exactly is Bigfix?
  2. How are security patches defined?
  3. Why is it necessary for the user to order LMT?
  4. How do one import a .wim file that was created?
  5. How does the user undelete a software fragment that was deleted?
  6. What is the distinction between ITAM and SAM?
  7. Which User Account Types Should One Create For Deployment?
  8. Why is the user unable to deploy any ESXi patches?
  9. Is It Possible To Install Two Management Connectors On A Single Relay?
  10. What Will IT Do With the Client's BigFix Server?

IBM BigFix Interview Questions and Answers

1. What Exactly Is Bigfix?

IBM BigFix is an endpoint control and security tool that enables collaboration between IT architecture and security experts. BigFix collects hardware/software data to aid IT in inventorying networked devices. It is important to understand what is linked to the UCSF network in order to detect and address security issues. At UCSF, PCs and laptops connecting to the network are registered using BigFix.

2. What is BigFix's locking configuration profile? Who has the authority to lock or unlock a system?

 When a system is locked, it is prevented from performing any actions such as fixing or installing programs. Apart from altering client-side settings, such as updating the BigFix client, only data-gathering actions are permitted. By default, both Linux/Unix workspace and client servers are locked.

Just the BigFix admins, a small band of IT specialists, have the power to freeze and release systems at the moment.

3. Will Bigfix Have Any Negative Effects On A Computer? Will It Remove Any Existing Programs?

 The BigFix program will not do any damage to the computer or remove any apps. In a very tiny percentage of cases, BigFix may be conflicting with software, resulting in a minor problem.

4. How are security patches defined? Will a patch cause the machine to reboot?

Regular software upgrades, referred to known as security patches, are required to keep the computer system and apps protected. BigFix is capable of remotely deploying fixes that are required to maintain the security of your system. Based on the patch, clients may be prompted to reset their computers. 

The computer will be compelled to restart without user permission only in exceptional situations (e.g., a serious security threat requiring quick action).

5. Why Does UCSF Require The Installation Of Bigfix Across All Networked Desktops And Laptops?

Having insight into all connected devices is important for UCSF's information and computational capabilities to be protected. This will give UCSF IT an accurate list of connected devices, their patching status, and who owns them.

MindMajix YouTube Channel

6. What To Anticipate After BigFix Is Installed?

The BigFix Application will operate in the background and send data to the BigFix Server about the initial state of your computer. You will be requested to approve the patching operation if the system requires it.

BigFix will operate in the background, utilizing little CPU resources and regularly communicating with the server to deliver continuous system status updates and to check for new jobs.

7. How Can The Uncontended Asset Importer Compare Earlier Scanned Resources to Recently Scanned Assets?

The algorithm used to determine if two scanned gadgets are identical is as follows:

  • If their mac addresses are identical, they match.
  • If their hostnames are identical, they correspond.
  • If neither has a mac address nor a hostname, both match if their IP addresses are the same.

Finally, if the freshly scanned object does not fit any of the aforementioned criteria, it will be treated as a new asset.

8. What Policies And Procedures Are Being Followed To Avoid Illegal Use Of The Bigfix System By External and Internal Users?

Administrator privileges are restricted to professional IT personnel that adhere to industry best practices, which includes accessing just the data necessary to do their duties. The BigFix system is physically located in the Datacentre and is monitored continuously. Patches are deployed on a regular basis to maintain the system's security.

9. Do Student Data Protection Standards and Tools Differ From Faculty and Staff Data?

No, the technologies are the same and provide parity and effectiveness in monitoring UCSF's security and risk status. All students, professors, and staff are subject to the same regulations and protocols.

10. How Does Use Of BigFix On The Client's Server Affect System Performance?

 The default CPU use parameters have been adjusted to minimize the over-utilization of the user's server's CPU. Clients should anticipate the BigFix program using little more than 2% of the CPU, computed on a single processor; however, if they have several processors, the overall percentage of agent CPU is considerably decreased.

→ Explore IBM BigFix Tutorial

11. How frequently should hard drive encryption to be monitored? And what are appropriate ways of disc encryption monitoring?

 Fortnightly to Monthly reporting is recommended as a best practice to assure that encryption standard are met. BigFix Data Security and Encryption monitoring ensure that the drive is protected, which is critical if it is compromised.

12. How functional is BigFix with the various operations and practices that most servers normally run?

BigFix is a commonly used system management solution with a demonstrated track record of causing no disruption to other service operations. UCSF has had little difficulties operating BigFix on hundreds of thousands of computers over the last few years.

13. Why Is It Necessary For The User To Order LMT?

 Even though LMT is a free product, an order is recommended to define an IBM authorization record for the license, software membership, and technical assistance.

14. Is It Necessary To Keep The LMT/BFI Server Running Always?

Yes. The LMT/BFI servers must be kept running at all times to ensure real-time data processing from terminals and reporting consistency. IBM pricing needs a capacity scan to be performed on all terminals every 30 mins for a sub-capacity license. The BigFix server retains capacity scans going back five days. As a result, the system should not be shut down for more than five days.

15. What Is The Distinction Between The Client And The Scanner In BigFix?

 The BigFix client is used by all IBM applications that are built on the BigFix infrastructure to conduct a variety of actions on terminals.

 Whereas, the scanner is a stand-alone element that LMT/BFI utilizes. It gathers data about the software and hardware installed on the machines that comprise your infrastructure. After being transmitted to the BigFix server, the data may be imported into the LMT/BFI server.

16. What Will IT Do With the Client's BigFix Server?

 BigFix will collect information about the user's system settings, including the OS, Processor, RAM, etc. BigFix does not gather any private information. Without contacting the system owner. IT will never deploy updates or make file changes. However, if the systems analyst does not reply in a timely way, IT has the authority to withdraw servers from the networks or install fixes.

17. What Really Is the Maintenance Service? Why Do It Display "In Progress" Notifications?

 To handle file uploads, the Maintenance service should be configured on the Enterprise Manager system. Whenever the server function is configured, the server's file status is immediately updated. It's possible that the user will need to reload the console to view the changes.

18. How Do One Import A .wim File That Was Created?

Users may import images from the Media Library dashboard, which is accessible via the Manage Images link in the navigating tree. They can enter the operating system, architectural design, and disc size manually.

In this example, the size on the disc refers to the uncompressed size of the .wim file. This is generally around double the size of the original .wim file.

19. How Can A User Decide Which Configuration Management Type Is Most Appropriate For Their Environment?

They can consult the IBM Terminal Controller for Wireless Remote Installation Instructions seeking pointers on how to design their installation.

20. How Does The User Undelete A Software Fragment That Was Deleted?

When viewing the Audit Log within Catalog Tools on the main window of the Product Catalog tab, users may see that items have been removed. A "Display Deleted" function is available at each level of the Catalog structure. To see and then recover lost items, click that button.

21. Does User Have To Re-import Each Time The Software Catalog Is Modified?

Yes. In the Settings menu, select Import Options under Data file and then click Start Now Certain modifications to the catalog demand that users Reset Import Segments, which is available via the Control Panel's Import Options tab.

22. Is SUA Intended To Serve As A Substitute For An Audit?

No. SUA procedures and apps are designed to safeguard the company from audits and to maintain continuous compliance.

23. What Is The Distinction Between ITAM and SAM?

ITAM is an acronym for Information Technology Asset Management, and it refers to the process of accounting for all information technology resources, including hardware, application, network infrastructure, communication, and digital products. SAM, on the other hand, is an acronym for Software Asset Management, a technique that focuses largely on the “software” asset category of IT Asset Management.

24. Which User Account Types Should One Create For Deployment?

 In an ideal world, each user would have a single domain user profile with the appropriate permissions:

  • Authorization for the program to be installed on the SUA server.
  • Authorization to access and establish databases on the database server.
  • Authorization to access and receive instructions from the IBM Terminal Manager server.

25. Is It Possible To Install Two Management Connectors On A Single Relay?

Yes. On the same channel, the user may have two distinct management connectors, but they should not be the same. For instance, a relay can support both iOS and Lotus Traveler connectors, but not two iOS connectors.

26. Why Does The Installed App's Name Appear As Incomprehensible Letters On An Android Device?

Even after enrollment, the Android Client will have no information on the TEM Deployment's code page. Unless otherwise adjusted, the default IANA client configuration for Android phones is English.

27. What Is The Distinction Between Proxied And Regular Servers On The TEM Console?

On normal computers, a complete TEM agent is installed, complete with all of the typical inspections and responses. Rather than running a complete TEM application, proxied servers use APIs to get hardware information and send it in to the terminal as a computer report.

28. Why is the user unable to deploy any ESXi patches?

Patches for ESXi include audit-only material. To address ESXi problems, customers may either utilize the VMware Update Client or directly download and install updates from the VMware webpage.

29. What Type Of Machine Is Appropriate For The Management Extender?

For installations of medium and large size, the primary limiting element will almost certainly be the CPU. As long as the computer has quad cores, it should be capable of handling all management extension duties.

30. Why Are Some Fields Dissimilar Between Reports From Proxied VMs And Reports From The TEM Agent?

The vCenter plug-in extracts data from the VMware Interfaces and converts it to TEM properties. However, because many of these variables are configured by the user, they may occasionally differ from what is provided by the TEM Agent.

About Author

author
NameVinod Kasipuri
Author Bio

Vinod Kasipuri writes about various IT platforms such as QlikView, Qlik Sense, and Perl Scripting, at Mindmajix. He loves to explain the concepts he writes in simple terms. He is also engaged in researching trends in AngularJS and LabView. Reach out to him via LinkedIn and Twitter.