0% found this document useful (0 votes)
156 views12 pages

BigFix Interview Q&A Guide

The document contains answers to interview questions about BigFix, an endpoint management tool. It describes what BigFix is, how it operates, how it impacts systems, security procedures for the system, and differences between related concepts.

Uploaded by

mahesh singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views12 pages

BigFix Interview Q&A Guide

The document contains answers to interview questions about BigFix, an endpoint management tool. It describes what BigFix is, how it operates, how it impacts systems, security procedures for the system, and differences between related concepts.

Uploaded by

mahesh singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Interview Questions and Answers

• Question - What Exactly Is Bigfix?


• Answer - BigFix is an endpoint control and security tool that enables collaboration
between IT architecture and security experts. BigFix collects hardware/software data
to aid IT in inventorying networked devices.
• It is important to understand what is linked to the network in order to detect and
address security issues.

• Question - What is BigFix's locking configuration profile? Who has the authority to
lock or unlock a system?
• Answer - When a system is locked, it is prevented from performing any actions such
as fixing or installing programs. Apart from altering client-side settings, such as
updating the BigFix client, only data-gathering actions are permitted. By default, both
Linux/Unix workspace and client servers are locked.
• Just the BigFix admins, a small band of IT specialists, have the power to freeze and
release systems at the moment.
• Question - Will Bigfix Have Any Negative Effects On A Computer? Will It Remove
Any Existing Programs?
• Answer – The BigFix program will not do any damage to the computer or remove any
apps. In a very tiny percentage of cases, BigFix may be conflicting with software,
resulting in a minor problem.

• Question - How are security patches defined? Will a patch cause the machine to
reboot?
• Answer – Regular software upgrades, referred to known as security patches, are
required to keep the computer system and apps protected. BigFix is capable of
remotely deploying fixes that are required to maintain the security of your system.
Based on the patch, clients may be prompted to reset their computers. The
computer will be compelled to restart without user permission only in exceptional
situations (e.g., a serious security threat requiring quick action).
• Question - What To Anticipate After BigFix Is Installed?
• Answer –The BigFix Application will operate in the background and send data to the
BigFix Server about the initial state of your computer.
• You will be requested to approve the patching operation if the system requires it.
• BigFix will operate in the background, utilizing little CPU resources and regularly
communicating with the server to deliver continuous system status updates and to
check for new jobs.

• Question - How Can The Uncontended Asset Importer Compare Earlier Scanned
Resources to Recently Scanned Assets?
• Answer - The algorithm used to determine if two scanned gadgets are identical is as
follows:
• If their mac addresses are identical, they match.
• If their hostnames are identical, they correspond.
• If neither has a mac address nor a hostname, both match if their IP addresses are the
same.
• Finally, if the freshly scanned object does not fit any of the aforementioned criteria,
it will be treated as a new asset
• Question - What Policies And Procedures Are Being Followed To Avoid Illegal Use
Of The Bigfix System By External and Internal Users?
• Answer - Administrator privileges are restricted to professional IT personnel that
adhere to industry best practices, which includes accessing just the data necessary to
do their duties.
• The BigFix system is physically located in the Datacentre and is monitored
continuously. Patches are deployed on a regular basis to maintain the system's
security.
• Question - How Does Use Of BigFix On The Client's Server Affect System
Performance?
• Answer - The default CPU use parameters have been adjusted to minimize the over-
utilization of the user's server's CPU. Clients should anticipate the BigFix program
using little more than 2% of the CPU, computed on a single processor; however, if
they have several processors, the overall percentage of agent CPU is considerably
decreased.
• Question - How frequently should hard drive encryption to be monitored? And
what are appropriate ways of disc encryption monitoring?
• Answer – Fortnightly to Monthly reporting is recommended as a best practice to
assure that encryption standard are met. BigFix Data Security and Encryption
monitoring ensure that the drive is protected, which is critical if it is compromised.

• Question - What Is The Distinction Between The Client And The Scanner In BigFix?
• Answer - The BigFix client is used by all IBM applications that are built on the BigFix
infrastructure to conduct a variety of actions on terminals.Whereas, the scanner is a
stand-alone element that LMT/BFI utilizes. It gathers data about the software and
hardware installed on the machines that comprise your infrastructure. After being
transmitted to the BigFix server, the data may be imported into the LMT/BFI server.
• Question - What Will IT Do With the Client's BigFix Server?
• Answer - BigFix will collect information about the user's system settings, including
the OS, Processor, RAM, etc. BigFix does not gather any private information. Without
contacting the system owner. IT will never deploy updates or make file changes.
However, if the systems analyst does not reply in a timely way, IT has the authority to
withdraw servers from the networks or install fixes.

• Question - What Really Is the Maintenance Service? Why Do It Display "In


Progress" Notifications?
• Answer - To handle file uploads, the Maintenance service should be configured on
the Enterprise Manager system. Whenever the server function is configured, the
server's file status is immediately updated. It's possible that the user will need to
reload the console to view the changes.
• Question - How Do One Import A .wim File That Was Created?
• Answer - Users may import images from the Media Library dashboard, which is
accessible via the Manage Images link in the navigating tree. They can enter the
operating system, architectural design, and disc size manually.In this example, the
size on the disc refers to the uncompressed size of the .wim file. This is generally
around double the size of the original .wim file.

• Question - How Does The User Undelete A Software Fragment That Was Deleted?
• Answer - When viewing the Audit Log within Catalog Tools on the main window of
the Product Catalog tab, users may see that items have been removed. A "Display
Deleted" function is available at each level of the Catalog structure. To see and then
recover lost items, click that button.
• Question - What Is The Distinction Between ITAM and SAM?
• Answer - ITAM is an acronym for Information Technology Asset Management, and it
refers to the process of accounting for all information technology resources,
including hardware, application, network infrastructure, communication, and digital
products. SAM, on the other hand, is an acronym for Software Asset Management, a
technique that focuses largely on the “software” asset category of IT Asset
Management.

• Question - Does User Have To Re-import Each Time The Software Catalog Is
Modified?
• Answer – Yes. In the Settings menu, select Import Options under Data file and then
click Start Now Certain modifications to the catalog demand that users Reset Import
Segments, which is available via the Control Panel's Import Options tab.
• Question - Is It Possible To Install Two Management Connectors On A Single Relay?
• Answer – Yes. On the same channel, the user may have two distinct management
connectors, but they should not be the same. For instance, a relay can support both
iOS and Lotus Traveler connectors, but not two iOS connectors.

• Question - What Is The Distinction Between Proxied And Regular Servers On The
TEM Console?
• Answer - On normal computers, a complete TEM agent is installed, complete with all
of the typical inspections and responses. Rather than running a complete TEM
application, proxied servers use APIs to get hardware information and send it in to
the terminal as a computer report.
Thanks for Watching

• Share
• Like
• Subscribe

You might also like