Desktop Engineer -
IT Interview Questions
1)
What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.
2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.
3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.
5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different
in cross cable and normal LAN cable.
The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.
6) What would you use to connect two computers without using switches?
Cross cable.
7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.
8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.
9) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003. http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp
11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".
If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer
fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologi /directory/
18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so.
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.
2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.
3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.
5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different
in cross cable and normal LAN cable.
The theoretical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.
6) What would you use to connect two computers without using switches?
Cross cable.
7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.
8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.
9) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administrator computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003. http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp
11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express used odb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration".
If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer
fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the lates patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain" http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologi /directory/
18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so.
ardware
networking interview questions answers:
This is the best and updated collections of
hardware networking interview questions and answers:
What is the difference between Firewall and Proxy
Server?
Firewall is used to protect internal IT
infrastructure from being attacked from the internet. Cisco Pix or software
solutions like Checkpoint and Microsoft ISA are firewall products and widely
used today to protect internal IT infrastructure from Hackers.
Proxy Servers are used today for sharing the
internet connections and protecting internal user information like IP address
from the internet. Internal users in the company can access the internet with
the same connection using the proxy server.
Typically cyber café owners and similar sized
setups use proxies. Proxy servers work under application layer and firewall
works under networking layer.
How to determine whether Exchange Server 2003 is
running Standard or Enterprise Edition?
We can know this by event viewer. The following
event id will generate when exchange server is installed.
Standard Edition: event 1216
EnterpriseEdition: event id 1217
What is the function of Nat?
The objective of NAT is used to enable the two way
communication with internet of a machine which is not internet facing. This can
be used to access home computer via broadband internet connection.
What are different editions of Windows 2003 Sever?
Standard Edition
Web Edition
EnterpriseEdition
Data center Edition
What is the active directory database name and
where it is located?
The active directory database name is NTDS.Dit and
located in c:\windows\ntds
What is the expansion if .Dit?
Dit-Directory Information Tree and scalable up to
70 TB.
What is active directory?
A central component of windows, used to manage, and
administrator users, computers and printers in the network from active
directory.
What is DNS? What is “forward lookup zone” and
“reverse lookup zone”?
DNS is domain naming service and used to resolve
host names to IP addresses and IP addresses to host names. The computer
understands only numbers to communicate with each other. Its also easier way to
make access websites by assigning names to websites.
When we use web address e.g. http://ittechjobs.net
in browser, computer uses DNS for IP address to redirect the website.
Forward lookup: Converting names to IP address is
called forward lookup.
Reverse lookup: Resolving IP address to names is
called reverse lookup.
‘A’ record: It is called host record and it is used
to map name to IP address. This is the record in DNS with the help of which DNS
finds the host name.
‘MX’ Record: it is called mail exchanger record. It
is the record needed to locate the mail servers in the network. This record is
also found in DNS.
What is DHCP? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. It is
used to allocate IP addresses to large number of PCs in a network environment.
Scope: Scope contains IP address like subnet mask,
gateway IP, DNS server IP and exclusion range which a client can use to
communicate with the other PCs in the network.
Super scope: When we combine two or more scopes
together it is called super scope.
What are the types of LAN cables?
LAN cables are classified into CAT 5 and CAT 6.CAT
5 Supports 100 MBPS of speed while CAT 6 supports 1 GBPS of speed.
What is the difference between LAN cable and Cross
cable?
RJ45 connector connections are different in LAN
cable as compared to cross cable.
E.g.:
Straight Cable
Pin 1 White\Orange Pin 1 White\Orange
Pin 2 Orange Pin 2Orange
Pin3 White\Green Pin3 White\Green
Pin4 Blue Pin4 Blue
Pin5 White\Blue Pin5 White\Blue
Pin 6 Green Pin 6 Green
Pin 7 Brown Pin 7 Brown
Pin 8 White\Brown Pin 8 White\Brown
Cross Cable:
Wire Becomes
1———————-3
2———————-6
3———————-1
6———————-2
By default the LAN Cable is 100 Meters but you may
observe drop of signals after 80 Meters.
Cross cable is used to connect two computers
without using switch.
Describe in brief about IPCONFIG Command?
This command displays the information about IP
assigned to a computer. From the output we can know the information of IP
address, DNS IP address and Gateway address assigned to that computer.
What is APIPA Range?
When DHCP server is unavailable, windows client
computer assigns an IP address itself to communicate with other computers in
the network.
APIPA stands for automatic private IP addressing.
It is in the range of 169.254.X.X.
What are manageable and non manageable switches?
Manageable switches are those switches which can be administered so we can create VLAN etc while non manageable switches can not be managed.
Manageable switches are those switches which can be administered so we can create VLAN etc while non manageable switches can not be managed.
Global Address List(GAL)
A list containing all Exchange users, contacts,
Groups, Conferencing resources, and public folders in an organisation.
The list is retrieved from the global catalog servers in the active directory and is used by Outlook clients to address messages or find information about recipients within the organisation.
The list is retrieved from the global catalog servers in the active directory and is used by Outlook clients to address messages or find information about recipients within the organisation.
What is Lightweight Directory Access Protocol?
LDAP a Network protocol designed to work on TCP/IP
stacks to exact information from a hierarchical directory such as x.500 and
useful for searching through data to find a particular piece of information.
What is mail enabled?
An active directory object that has at least one
email address is assigned.
What is message transfer agent?
(MTA) An exchange component that routes messages to other Exchange MTAs,information stores,connectors, and third-party gateways.Also referred to as X.400 protocol in Exchange 2000 System Manager.
(MTA) An exchange component that routes messages to other Exchange MTAs,information stores,connectors, and third-party gateways.Also referred to as X.400 protocol in Exchange 2000 System Manager.
What is namespace?
A set of names associated with a domain or forest that identifies objects that belong to the domain or forest.
A set of names associated with a domain or forest that identifies objects that belong to the domain or forest.
Operation Master Types:
The following table lists the operation masters at
the domain and forest levels. Only one domain controller in the domain or
forest performs each role.
RID Master: RID master
ensures domain wide unique relative IDs.One domain controller in each domain
performs the role.The RID master allocates pools of IDs to each domain
controller. When a DC has used all the IDs,it gets a new pools of IDs.
PDC Emulator: Emulates a
Windows NT 4.0 primary domain controller (PDC).Replicates password changes
within a domain.Ensures synchronized time within the domain (and
between domains in the forest).
One domain controller in
each domain performs this role.
Infrastructure Master: Tracks moves and
renames of objects. Updates group membership changes.
Domain Naming Master: Ensures that
domain names are unique. Must be accessible to add or remove a domain from the
forest. One domain controller in the domain performs this role.
Schema Master: Maintains the
active directory schema for the forest. One domain controller in the
forest performs the role.
Operation Master roles are also called flexible
single master operation FSMO server. These are domain controllers that perform
operations on the network.
By default, the first domain controller in the forest holds
all information masters. When you create a domain controller holds the three
domain operation masters(RID master, PDC Emulator,Infrastructure Master).
Use Active Directory User and Computers
to transfer RID Master,PDC Emulator, and Infrastructure master.
Use Active Directory Domains and Trusts
to transfer the domain naming master.
Use Active directory Schema Snap-in to transfer the
Schema Master.
Brief about Routing.
Routers can forward packets through an internet
work by maintaining routing information in a database called a routing table.
The routing table typically contains the address of all known networks and
routing information about that network such as:
* Interface
* Routing Path
* Next Hop
* Route Metric (Cost)
* Route Timeout
* Routing Path
* Next Hop
* Route Metric (Cost)
* Route Timeout
Routers build and maintain their routing database
by periodically sharing information with other routers. The exact format of
these exchanges is based on the routing protocol. The routing protocol
determines:
* The information contained in the routing table
* How messages are routed from one network to another
* How topology changes (i.e. updates to the routing table) are communicated between routers
*
* How messages are routed from one network to another
* How topology changes (i.e. updates to the routing table) are communicated between routers
*
Changes in routing information take some time to be
propagated to all routers on the network. The term convergence is used to
describe the condition when all routers have the same (or correct) routing
information.
The following points illustrates about how a packet
is addressed as it travels through an internet work.
* On an Ethernet network, the Data Link layer address
is the MAC address. On an IP network, the IP address is the Network layer
address.
* Both Data Link physical addresses and Network logical addresses are used.
* The Network address contains both a logical network address and a logical device address. IP (Network) addresses are contained in the IP header; MAC (Data Link) addresses are contained in the Ethernet frame header.
* Both the source and destination Network and Data Link addresses are typically contained in the packet.
* The Data Link destination address indicates the physical address of the next hop on the route.
* Data Link addresses in the packet change as the packet is delivered from hop to hop.
* The Network destination addresses indicate the address of the final destination device.
* Network addresses remain constant as the packet is delivered from hop to hop.
* A router uses the logical network address specified at the Network layer to forward messages to the appropriate LAN segment.
* Both Data Link physical addresses and Network logical addresses are used.
* The Network address contains both a logical network address and a logical device address. IP (Network) addresses are contained in the IP header; MAC (Data Link) addresses are contained in the Ethernet frame header.
* Both the source and destination Network and Data Link addresses are typically contained in the packet.
* The Data Link destination address indicates the physical address of the next hop on the route.
* Data Link addresses in the packet change as the packet is delivered from hop to hop.
* The Network destination addresses indicate the address of the final destination device.
* Network addresses remain constant as the packet is delivered from hop to hop.
* A router uses the logical network address specified at the Network layer to forward messages to the appropriate LAN segment.
General Questions
Q. What desktop operating systems are
you familiar with?
A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS.
A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS.
Q. Have you used imaging software
before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.)
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in-depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. (If you have an opinion, you probably know the product pretty well.)
Q. What are the pitfalls of using
imaging software?
A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis.
A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis.
Q. Have you used any software
distribution tools? If so, which ones and how were they used?
A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization.
A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization.
Q. What do you like most about
desktop support?
A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations.
A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations.
Q. What do you like least about
desktop support?
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response.
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response.
Q. When solving a desktop problem, do
you prefer to work with the end-user, your peers, or on your
own?
A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis.
A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment. This means working with other employees, vendors, and end-users on a constant basis.
Q. Can you describe a situation where
you have had to deal with a difficult person? How did you
handle it? Would you do anything differently?
A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good communication can help both sides come to an agreement. Make sure you have an example with a successful outcome.
A. Desktop support can be very demanding some days. End-users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end-user by understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good communication can help both sides come to an agreement. Make sure you have an example with a successful outcome.
Q. How would you say you are able to
handle stress?
A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time.
A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time.
Q. What do you see yourself doing two
or three years from now?
A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility.
A. Hiring managers want you to stick around. They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry-level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility.
Q. How do you learn new technologies?
A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession.
A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities. Besides the traditional books and manuals, don’t forget to include user groups, eLearning subscriptions, and IT professional sites such as CramSession.
Q. How do you prioritize tasks and
manage your time?
A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets.
A. What hiring managers want to know is whether you have time-management skills. Everyone manages their time differently, but think about how you handle e-mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets.
Q. Imagine the following situation:
you receive three simultaneous calls from three vicepresidents who need assistance immediately. How do you manage these
conflictingpriorities?
A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities.
A. Obviously this is a trick question. What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities.
Q. How would you handle a user who
continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem.
These components may include:
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem.
These components may include:
·
Acknowledging the user’s diagnosis
·
Asking the user to reproduce the
problem
·
Finding a solution that works
Q. How do you handle setting up new
employees?
A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee. The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used in
the past to help users acquaint themselves with their new environment. Some tools that help are:
A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee. The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used in
the past to help users acquaint themselves with their new environment. Some tools that help are:
·
A new-user welcome letter that is
customized to the specific user with all their relevant information including
telephone extension, how to access voice mail, and how to log in. It might also
include a FAQ on getting help.
·
A “Getting to Know Your Helpdesk”
document that provides an orientation to helpdesk service, such as how to
contact the helpdesk, its hours of operation, what is and what is not supported
by the helpdesk, and answers to common new-user questions.
Technical Questions
Q. What questions would you ask to help
isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation:
A. This question is used by the hiring manger to assess your problem-solving abilities. The following represent some of the common questions that you would ask the end-user to help diagnose a situation:
·
When did the problem first start?
·
Has the system ever worked properly?
·
What was the last thing done to the
system prior to the failure?
·
Is the issue intermittent or
ongoing/constant?
·
Are there any error messages? If so,
what are the specific error messages?
·
Has any new hardware been added to
the system?
·
Has any new software been added to
the system, including downloads from the Internet?
·
Has anything changed with the system
(for example, has it been moved) since the issue presented itself?
·
Has anyone else had access to the
system?
·
Are there any environmental factors
that could be causing the issue?
·
Have you done any troubleshooting on
the system on your own?
·
Have you checked all the
cables/connections for a tight fit?
Q. What are the main differences
between the following operating systems?
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences.
A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences.
Windows 2000 and XP
Overall, XP is a minor update with Windows 2000 designed to get Windows
2000 technology into the hands of consumers. The major changes include the
following:
·
Device driver rollback
·
Remote control (single-user terminal
services)
·
New Start menu, control panel, and
user interface elements
·
Fast user switching
·
Encrypted file system support for
redirected folders
·
Better support for roaming wireless
networking
·
Enhanced policies
·
Credential Manager
·
Personal firewall
Q. What are typical virus sources and
how do you prevent virus attacks?
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:
A. This is virus protection 101 just to ensure that you understand the basics of protecting against viruses. Possible virus sources include e-mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections:
·
Use anti-virus software.
·
Perform regular updates to the virus
software definition files and scan engines. Verify updates have succeeded.
·
Perform regularly scheduled virus
checks.
·
Configure software to check all
files, not just program files.
·
Educate users on virus attacks, their
consequences, and how to prevent them.
·
Know where all software came from.
·
Do regular backups.
·
Develop reporting mechanisms to
inform server administrators of observed desktop infections and how these could
impact the server environment (such as deletions or corruption of files on
public shares, hidden payload files that might have been uploaded to servers,
and so on).
Q. What are some of the guidelines
you would recommend for implementing security at the user
level?
A. Security is a major part of the desktop technician’s day-to-day
responsibilities. As the closest point of contact to the end-users, technicians
need to be savvy on the different methods for enforcing security. Some of the
top techniques are included below.
Anti-virus software:
·
Ensure that all users install and
regularly use anti-virus software on their PCs.
·
Instruct users to immediately notify
the helpdesk when they suspect they’ve contracted a virus.
Password security:
·
Instruct users not to give out their
passwords.
·
Instruct users not to write down
their passwords.
·
Instruct users to make sure their
password cannot be easily guessed by using a combination of alphanumeric
characters, including special characters (~ ! @ # $ % ^ & * ( ) + = [ ] { }
/ ? <> , ; : \ | ` ’ ” .).
·
Instruct users to change their
password if they think there is even a slight chance someone knows it.
·
Instruct users to ensure their
password is at least eight characters long.
·
Instruct users not to use a variation
of their user ID.
·
Regularly change passwords on Administrator
accounts on PCs (NT, Windows 2000 and XP)
Desktop security:
·
Instruct users not to leave their
workstation logged in overnight.
·
Instruct users to enable screen
savers that automatically lock their PC when there is no activity on it for
more than five minutes.
A) Tell
me something about yourself.
Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.
B) Technical Questions:
1) What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.
2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.
For in depth learning of DNS, please download, extract and watch the videos available here.
3) What is DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.
5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable.
The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.
6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.
8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.
9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp
11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express usedsodb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB: http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
Install another system. Insall the OS with the latespathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/domxppro.mspx
18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can't do so.
Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.
B) Technical Questions:
1) What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.
2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.
For in depth learning of DNS, please download, extract and watch the videos available here.
3) What is DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.
4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.
5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable.
The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.
6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.
8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.
9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.
10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp
11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express usedsodb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.
13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.
14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB: http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
Install another system. Insall the OS with the latespathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/domxppro.mspx
18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.
19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.
20) What are manageable and non manageable switches?
Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can't do so.
Did you like these useful knowledge about these questions & answers ? If Yes, then share with us via your comments…
No comments:
Post a Comment