Desktop Engineer -
IT Interview Questions
1)
What is Active Directory?
A central component of the Windows platform, Active Directory directory service
provides the means to manage the identities and relationships that make up
network environments. For example we can create, manage and administrator
users, computers and printers in the network from active directory.
2) What is DNS? Why it is used? What is "forward lookup" and
"reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and
IP addresses to names. The computer understands only numbers while we can
easily remember names. So to make it easier for us what we do is we assign
names to computers and websites. When we use these names (Like yahoo.com) the
computer uses DNS to convert to IP address (number) and it executes our
request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP
address. This is the record in DNS with the help of which DNS can find out the
IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate
the mail servers in the network. This record is also found in DNS.
3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to
large number of PCs in a network environment. This makes the IP management very
easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP
and exclusion range which a client can use to communicate with the other PCs in
the network.
Superscope: When we combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat
6". "Cat 5" can support 100 Mbps of speed and "CAT 6"
can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a
switch/hub so that they can communicate.
5) What is the difference between a normal LAN cable and cross cable? What
could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different
in cross cable and normal LAN cable.
The theoretical length is 100 meters but after 80 meters you may see drop in
speed due to loss of signal.
6) What would you use to connect two computers without using switches?
Cross cable.
7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. From
the output we can find out the IP address, DNS IP address, gateway IP address
assigned to that computer.
8) What is APIPA IP address? Or what IP address is assigned to the computer
when the DHCP server is not available?
When DHCP server is not available the Windows client computer assigns an
automatic IP address to itself so that it can communicate with the network
computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of
169.254.X.X.
9) What is a DOMAIN? What is the difference between a domain and a
workgroup?
Domain is created when we install Active Directory. It's a security boundary
which is used to manage computers inside the boundary. Domain can be used to centrally
administrator computers and we can govern them using common policies called
group policies.
We can't do the same with workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and
outlook 2003. http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp
11) What is a PST file and what is the difference between a PST file and OST
file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003.
OST file is used when we use outlook in cached exchanged mode. Outlook express
used odb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How
do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due
to which the windows OS can run it give a blue screen with a code. Best way to
resolve it is to boot the computer is "Last known good
configuration".
If this doesn't work than boot the computer in safe mode. If it boots up than
the problems with one of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a
windows server and then we use RIS to install the configured on in the new
hardware. We can use it to deploy both server and client OS. Imaging or
ghosting also does the same job of capturing an installed image and then
install it on a new hardware when there is a need. We go for RIS or
imaging/ghosting because installing OS every time using a CD can be a very time
consuming task. So to save that time we can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate
network to access the resources like mail and files in the LAN. VPN can be
configured using the steps mentioned in the KB:
http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer
fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the lates patches, Antivirus with
latest updates. Connect the infected HDD as secondary drive in the system. Once
done scan and clean the secondary HDD. Once done copy the files to the new
system.
17) How to join a system to the domain? What type of user can add a system
to the domain?
Please visit the article below and read "Adding the Workstation to the
Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologi
/directory/
18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the
traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic.
It also receives the traffic and sends it across but it uses the routing
protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be administered are called manageable switches. For example
we can create VLAN for on such switch. On no manageable switches we can't do
so.
ardware
networking interview questions answers:
This is the best and updated collections of
hardware networking interview questions and answers:
What is the difference between Firewall and Proxy
Server?
Firewall is used to protect internal IT
infrastructure from being attacked from the internet. Cisco Pix or software
solutions like Checkpoint and Microsoft ISA are firewall products and widely
used today to protect internal IT infrastructure from Hackers.
Proxy Servers are used today for sharing the
internet connections and protecting internal user information like IP address
from the internet. Internal users in the company can access the internet with
the same connection using the proxy server.
Typically cyber café owners and similar sized
setups use proxies. Proxy servers work under application layer and firewall
works under networking layer.
How to determine whether Exchange Server 2003 is
running Standard or Enterprise Edition?
We can know this by event viewer. The following
event id will generate when exchange server is installed.
Standard Edition: event 1216
EnterpriseEdition: event id 1217
What is the function of Nat?
The objective of NAT is used to enable the two way
communication with internet of a machine which is not internet facing. This can
be used to access home computer via broadband internet connection.
What are different editions of Windows 2003 Sever?
Standard Edition
Web Edition
EnterpriseEdition
Data center Edition
What is the active directory database name and
where it is located?
The active directory database name is NTDS.Dit and
located in c:\windows\ntds
What is the expansion if .Dit?
Dit-Directory Information Tree and scalable up to
70 TB.
What is active directory?
A central component of windows, used to manage, and
administrator users, computers and printers in the network from active
directory.
What is DNS? What is “forward lookup zone” and
“reverse lookup zone”?
DNS is domain naming service and used to resolve
host names to IP addresses and IP addresses to host names. The computer
understands only numbers to communicate with each other. Its also easier way to
make access websites by assigning names to websites.
When we use web address e.g. http://ittechjobs.net
in browser, computer uses DNS for IP address to redirect the website.
Forward lookup: Converting names to IP address is
called forward lookup.
Reverse lookup: Resolving IP address to names is
called reverse lookup.
‘A’ record: It is called host record and it is used
to map name to IP address. This is the record in DNS with the help of which DNS
finds the host name.
‘MX’ Record: it is called mail exchanger record. It
is the record needed to locate the mail servers in the network. This record is
also found in DNS.
What is DHCP? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. It is
used to allocate IP addresses to large number of PCs in a network environment.
Scope: Scope contains IP address like subnet mask,
gateway IP, DNS server IP and exclusion range which a client can use to
communicate with the other PCs in the network.
Super scope: When we combine two or more scopes
together it is called super scope.
What are the types of LAN cables?
LAN cables are classified into CAT 5 and CAT 6.CAT
5 Supports 100 MBPS of speed while CAT 6 supports 1 GBPS of speed.
What is the difference between LAN cable and Cross
cable?
RJ45 connector connections are different in LAN
cable as compared to cross cable.
E.g.:
Straight Cable
Pin 1 White\Orange Pin 1 White\Orange
Pin 2 Orange Pin 2Orange
Pin3 White\Green Pin3 White\Green
Pin4 Blue Pin4 Blue
Pin5 White\Blue Pin5 White\Blue
Pin 6 Green Pin 6 Green
Pin 7 Brown Pin 7 Brown
Pin 8 White\Brown Pin 8 White\Brown
Cross Cable:
Wire Becomes
1———————-3
2———————-6
3———————-1
6———————-2
By default the LAN Cable is 100 Meters but you may
observe drop of signals after 80 Meters.
Cross cable is used to connect two computers
without using switch.
Describe in brief about IPCONFIG Command?
This command displays the information about IP
assigned to a computer. From the output we can know the information of IP
address, DNS IP address and Gateway address assigned to that computer.
What is APIPA Range?
When DHCP server is unavailable, windows client
computer assigns an IP address itself to communicate with other computers in
the network.
APIPA stands for automatic private IP addressing.
It is in the range of 169.254.X.X.
What are manageable and non manageable switches?
Manageable switches are those switches which can be administered so we can
create VLAN etc while non manageable switches can not be managed.
Global Address List(GAL)
A list containing all Exchange users, contacts,
Groups, Conferencing resources, and public folders in an organisation.
The list is retrieved from the global catalog servers in the active directory
and is used by Outlook clients to address messages or find information about
recipients within the organisation.
What is Lightweight Directory Access Protocol?
LDAP a Network protocol designed to work on TCP/IP
stacks to exact information from a hierarchical directory such as x.500 and
useful for searching through data to find a particular piece of information.
What is mail enabled?
An active directory object that has at least one
email address is assigned.
What is message transfer agent?
(MTA) An exchange component that routes messages to other Exchange
MTAs,information stores,connectors, and third-party gateways.Also referred to
as X.400 protocol in Exchange 2000 System Manager.
What is namespace?
A set of names associated with a domain or forest that identifies objects that
belong to the domain or forest.
Operation Master Types:
The following table lists the operation masters at
the domain and forest levels. Only one domain controller in the domain or
forest performs each role.
RID Master: RID master
ensures domain wide unique relative IDs.One domain controller in each domain
performs the role.The RID master allocates pools of IDs to each domain
controller. When a DC has used all the IDs,it gets a new pools of IDs.
PDC Emulator: Emulates a
Windows NT 4.0 primary domain controller (PDC).Replicates password changes
within a domain.Ensures synchronized time within the domain (and
between domains in the forest).
One domain controller in
each domain performs this role.
Infrastructure Master: Tracks moves and
renames of objects. Updates group membership changes.
Domain Naming Master: Ensures that
domain names are unique. Must be accessible to add or remove a domain from the
forest. One domain controller in the domain performs this role.
Schema Master: Maintains the
active directory schema for the forest. One domain controller in the
forest performs the role.
Operation Master roles are also called flexible
single master operation FSMO server. These are domain controllers that perform
operations on the network.
By default, the first domain controller in the forest holds
all information masters. When you create a domain controller holds the three
domain operation masters(RID master, PDC Emulator,Infrastructure Master).
Use Active Directory User and Computers
to transfer RID Master,PDC Emulator, and Infrastructure master.
Use Active Directory Domains and Trusts
to transfer the domain naming master.
Use Active directory Schema Snap-in to transfer the
Schema Master.
Brief about Routing.
Routers can forward packets through an internet
work by maintaining routing information in a database called a routing table.
The routing table typically contains the address of all known networks and
routing information about that network such as:
* Interface
* Routing Path
* Next Hop
* Route Metric (Cost)
* Route Timeout
Routers build and maintain their routing database
by periodically sharing information with other routers. The exact format of
these exchanges is based on the routing protocol. The routing protocol
determines:
* The information contained in the routing table
* How messages are routed from one network to another
* How topology changes (i.e. updates to the routing table) are communicated
between routers
*
Changes in routing information take some time to be
propagated to all routers on the network. The term convergence is used to
describe the condition when all routers have the same (or correct) routing
information.
The following points illustrates about how a packet
is addressed as it travels through an internet work.
* On an Ethernet network, the Data Link layer address
is the MAC address. On an IP network, the IP address is the Network layer
address.
* Both Data Link physical addresses and Network logical addresses are used.
* The Network address contains both a logical network address and a logical
device address. IP (Network) addresses are contained in the IP header; MAC
(Data Link) addresses are contained in the Ethernet frame header.
* Both the source and destination Network and Data Link addresses are typically
contained in the packet.
* The Data Link destination address indicates the physical address of the next
hop on the route.
* Data Link addresses in the packet change as the packet is delivered from hop
to hop.
* The Network destination addresses indicate the address of the final
destination device.
* Network addresses remain constant as the packet is delivered from hop to hop.
* A router uses the logical network address specified at the Network layer to
forward messages to the appropriate LAN segment.
General Questions
Q. What desktop operating systems are
you familiar with?
A. Before you answer this question, you should have some background information
on what operating systems are used within the organization you are interviewing
with. Undoubtedly, you will be asked to elaborate on your skill set with each
of these operating systems so it’s best to tailor your elaboration to the
operating systems that are relevant to the hiring manager. This being said,
don’t leave out mentioning experience in other operating systems. You never
know whether the company may be evaluating the migration to a different OS.
Q. Have you used imaging software
before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support
technician. Elaborate on the tools that you’ve used. Hiring managers want to
assess your in-depth knowledge and experience with using these tools. This
means talking about how you use their various feature sets. (If you have an
opinion, you probably know the product pretty well.)
Q. What are the pitfalls of using
imaging software?
A. This question is meant to assess how well you know these products. For
example, discussing the importance of testing the image demonstrates that you
use these tools on a regular basis.
Q. Have you used any software
distribution tools? If so, which ones and how were they used?
A. Like imaging software, software distribution tools are an important part of
your job. Hiring managers are looking for knowledge that these tools exist and
how they can be used to support your organization.
Q. What do you like most about
desktop support?
A. Hiring managers are looking for what motivates you. Hopefully your answer
will match the characteristics of the job: being busy, working with different
people, and the challenges of learning new operating systems and
configurations.
Q. What do you like least about
desktop support?
A. The hiring manager is testing whether you will fit in with the existing
team. An appropriate answer here would be not being able to resolve a problem
in a timely manner for reasons outside your control, such as hardware failure.
Stick to things outside of your control for the best response.
Q. When solving a desktop problem, do
you prefer to work with the end-user, your peers, or on your
own?
A. This is another question to determine your fit within the organization.
Hiring managers understand that to be successful as a support technician you
will have to work in a team environment. This means working with other
employees, vendors, and end-users on a constant basis.
Q. Can you describe a situation where
you have had to deal with a difficult person? How did you
handle it? Would you do anything differently?
A. Desktop support can be very demanding some days. End-users only see their
own priority needs and often are not interested in other demands on your time.
This question explores how you deal with a difficult end-user by understanding
their problem, assessing priorities, and communicating a timeframe for
resolution. Often good communication can help both sides come to an agreement.
Make sure you have an example with a successful outcome.
Q. How would you say you are able to
handle stress?
A. Hiring managers are looking to see what coping techniques you can draw on to
deal with stress. Sometimes from the answer, they can also determine whether
you are prone to stress. When responding, some techniques for handling stress
that you may want to talk about include continually evaluating what’s on your
plate and prioritizing, communicating with your manager on what your priorities
are, and making sure that you take a break to reenergize, particularly at lunch
time.
Q. What do you see yourself doing two
or three years from now?
A. Hiring managers want you to stick around. They realize that you will not be
in this position forever, and they want to make sure there’s a desire to move
up within the organization as well as the right fit. They ask this question to
see whether there’s a growth path for you possible within the organization. As
a desktop technician, natural growth paths are team leads, quality assurance,
engineering positions, and entry-level development. Be honest about where you
want to be in two to three years, and ask the interviewer whether they see your
career path as a possibility.
Q. How do you learn new technologies?
A. Learning is an inherent part of the job. Hiring managers are looking for
someone who enjoys learning technology on their own and who has the foresight
to look for training opportunities. Besides the traditional books and manuals,
don’t forget to include user groups, eLearning subscriptions, and IT
professional sites such as CramSession.
Q. How do you prioritize tasks and
manage your time?
A. What hiring managers want to know is whether you have time-management
skills. Everyone manages their time differently, but think about how you handle
e-mail, when you check voice mail, how you respond to pages, when you research
and document, and how you pick up new trouble tickets.
Q. Imagine the following situation:
you receive three simultaneous calls from three vicepresidents who need assistance immediately. How do you manage these
conflictingpriorities?
A. Obviously this is a trick question. What the hiring manager is trying to
assess is how you set expectations with each of the individuals, knowing very
well that you won’t be able to assist all of them at the same time. They are
also looking for how you will prioritize each of these incidents, including
seeking assistance from peers and supervisors in order to meet user
expectations. Don’t allow the “tyranny of the urgent” to divert you from
managementestablished support priorities.
Q. How would you handle a user who
continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer
service skills. In this situation, you may want to discuss that the key is to
not offend the user and turn them off to your support services. In handling
this situation, you would pay particular attention to ways you can build trust
with the user and lead them to the right resolution to their problem.
These components may include:
·
Acknowledging the user’s diagnosis
·
Asking the user to reproduce the
problem
·
Finding a solution that works
Q. How do you handle setting up new
employees?
A. This question is used by the hiring manager to assess your knowledge of
common practices within the IT department, such as setting up new users.
Obviously, the IT department plays a critical role in the productivity of the
new employee. The role of the desktop technician is to help ease the new
employee into the resources available to them and get them up to speed quickly.
In responding to this question, you may want to talk about some of the tools
you’ve used in
the past to help users acquaint themselves with their new environment. Some
tools that help are:
·
A new-user welcome letter that is
customized to the specific user with all their relevant information including
telephone extension, how to access voice mail, and how to log in. It might also
include a FAQ on getting help.
·
A “Getting to Know Your Helpdesk”
document that provides an orientation to helpdesk service, such as how to
contact the helpdesk, its hours of operation, what is and what is not supported
by the helpdesk, and answers to common new-user questions.
Technical Questions
Q. What questions would you ask to help
isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem-solving
abilities. The following represent some of the common questions that you would
ask the end-user to help diagnose a situation:
·
When did the problem first start?
·
Has the system ever worked properly?
·
What was the last thing done to the
system prior to the failure?
·
Is the issue intermittent or
ongoing/constant?
·
Are there any error messages? If so,
what are the specific error messages?
·
Has any new hardware been added to
the system?
·
Has any new software been added to
the system, including downloads from the Internet?
·
Has anything changed with the system
(for example, has it been moved) since the issue presented itself?
·
Has anyone else had access to the
system?
·
Are there any environmental factors
that could be causing the issue?
·
Have you done any troubleshooting on
the system on your own?
·
Have you checked all the
cables/connections for a tight fit?
Q. What are the main differences
between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the
operating systems used by users. It’s always critical that you know more than
just the current version because there will always be a user who has a problem
with an older version. By asking this question, the hiring manager is actually
testing your knowledge of different operating systems that you may need to
support. The following provides a concise summary of some of the major
differences.
Windows 2000 and XP
Overall, XP is a minor update with Windows 2000 designed to get Windows
2000 technology into the hands of consumers. The major changes include the
following:
·
Device driver rollback
·
Remote control (single-user terminal
services)
·
New Start menu, control panel, and
user interface elements
·
Fast user switching
·
Encrypted file system support for
redirected folders
·
Better support for roaming wireless
networking
·
Enhanced policies
·
Credential Manager
·
Personal firewall
Q. What are typical virus sources and
how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics
of protecting against viruses. Possible virus sources include e-mail
attachments, Internet downloads, and infected floppy disks. To prevent virus
infections:
·
Use anti-virus software.
·
Perform regular updates to the virus
software definition files and scan engines. Verify updates have succeeded.
·
Perform regularly scheduled virus
checks.
·
Configure software to check all
files, not just program files.
·
Educate users on virus attacks, their
consequences, and how to prevent them.
·
Know where all software came from.
·
Do regular backups.
·
Develop reporting mechanisms to
inform server administrators of observed desktop infections and how these could
impact the server environment (such as deletions or corruption of files on
public shares, hidden payload files that might have been uploaded to servers,
and so on).
Q. What are some of the guidelines
you would recommend for implementing security at the user
level?
A. Security is a major part of the desktop technician’s day-to-day
responsibilities. As the closest point of contact to the end-users, technicians
need to be savvy on the different methods for enforcing security. Some of the
top techniques are included below.
Anti-virus software:
·
Ensure that all users install and
regularly use anti-virus software on their PCs.
·
Instruct users to immediately notify
the helpdesk when they suspect they’ve contracted a virus.
Password security:
·
Instruct users not to give out their
passwords.
·
Instruct users not to write down
their passwords.
·
Instruct users to make sure their
password cannot be easily guessed by using a combination of alphanumeric
characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { }
/ ? <> , ; : \ | ` ’ ” .).
·
Instruct users to change their
password if they think there is even a slight chance someone knows it.
·
Instruct users to ensure their
password is at least eight characters long.
·
Instruct users not to use a variation
of their user ID.
·
Regularly change passwords on Administrator
accounts on PCs (NT, Windows 2000 and XP)
Desktop security:
·
Instruct users not to leave their
workstation logged in overnight.
·
Instruct users to enable screen
savers that automatically lock their PC when there is no activity on it for
more than five minutes.
A) Tell
me something about yourself.
Tell about your eductaion,
place you belong to, some struggle in life which shows that you have positive
attitude and will to fight the odds.
B) Technical Questions:
1) What is Active Directory?
A central component of the
Windows platform, Active Directory directory service provides the means to
manage the identities and relationships that make up network environments. For
example we can create, manage and administor users, computers and printers in
the network from active directory.
2) What is DNS? Why it is
used? What is "forward lookup" and "reverse lookup" in DNS?
What are A records and mx records?
DNS is domain
naming service and is used for resolving names to IP address and IP addresses
to names. The computer understands only numbers while we can easily remember
names. So to make it easier for us what we do is we assign names to computers
and websites. When we use these names (Like yahoo.com) the computer uses DNS to
convert to IP address (number) and it executes our request.
Forward lookup: Converting
names to IP address is called forward lookup.
Reverse lookup: Resolving
IP address to names is called reverse lookup.
'A' record: Its
called host record and it has the mapping of a name to IP address. This is the
record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its
called mail exchanger record. Its the record needed to locate the mail servers
in the network. This record is also found in DNS.
For in depth learning of DNS, please download, extract and watch the videos available here.
3) What is DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used
to allocate IP addresses to large number of PCs in a network environment. This
makes the IP management very easy.
Scope: Scope
contains IP address like subnet mask, gateway IP, DNS server IP and exclusion
range which a client can use to communicate with the other PCs in the network.
Superscope: When we
combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat
6". "Cat 5" can support 100 Mbps of speed and "CAT 6"
can support 1Gbps of speed.
Cross cable: Its used to
connect same type of devices without using a switch/hub so that they can
communicate.
5) What is the difference between a normal LAN cable and cross cable? What
could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different in
cross cable and normal LAN cable.
The theoritical length is
100 meters but after 80 meters you may see drop in speed due to loss of signal.
6) What would you use to connect two computers without using switches?
Cross cable. 7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used
to display the IP information assigned to a computer. Fromthe output we can
find out the IP address, DNS IP address, gateway IP address assigned to that
computer.
8) What is APIPA IP address? Or what IP address is assigned to the
computer when the DHCP server is not available?
When DHCP server is not
available the Windows client computer assignes an automatic IP address to
itself so that it can communicate with the network cmputers. This ip address is
called APIPA. ITs in the range of 169.254.X.X.
APIPA stands
for Automatic private IP addressing. Its in the range of 169.254.X.X.
9) What is a
DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we
install Active Directory. It's a security boundary which is used to manage
computers inside the boundary. Domain can be used to centrally administor
computers and we can govern them using common policies called group policies.
We can't do the same with
workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a
user?
Please visit the link
below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp
11) What is a PST file and what is the difference between a PST file and
OST file? What file is used by outlook express?
PST file is used to store
the mails locally when using outlook 2000 or 2003. OST file is used when we use
outlook in cached exchanged mode. Outlook express usedsodb file.
12) What is BSOD? What do you do when you get blue screen in a computer?
How do you troubleshoot it?
BSOD stands for blue
screen of Death. when there is a hardware or OS fault due to which the windows
OS can run it give a blue screen with a code. Best way to resolve it is to boot
the computer is "LAst known good configuration". If this doesn't work
than boot the computer in safe mode. If it boots up than the problemis with one
of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote
installation services. You save the installed image on a windows server and
then we use RIS to install the configured on in the new hardware. We can use it
to deploy both server and client OS. Imaging or ghosting also does the same job
of capturing an installed image and then install it on a new hardware when
there is a need. We go for RIS or iamging/ghosting because installing OS
everytime using a CD can be a very time consuming task. So to save that time we
can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual
private network. VPN is used to connect to the corporate network to access the
resources like mail and files in the LAN. VPN can be configured using the
stepsmentioned in the KB: http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer
fixes the problem. What to do to resolve this issue?
Update the network card
driver.
16) Your system is infected with Virus? How to recover the data?
Install another system.
Insall the OS with the latespathces, Antivirus with latest updates. Connect the
infected HDD as secondary drive in the system. Once done scan and clean the
secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a
system to the domain?
Please visit the article
below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/domxppro.mspx
18) What is the difference between a switch and a hub?
Switch sends the traffic
to the port to which its meant for. Hub sends the traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which
uses routing protocols to process and send the traffic. It also receives the
traffic and sends it across but it uses the routing protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be
administered are calledmanageable switches. For example we can create VLAN for
on such switch. On no manageable swiches we can't do so.
Did you like these useful knowledge about these questions & answers ? If Yes, then share with us via your comments…