Job Interview Questions and Answers. Anticipating the job interview questions is one of the best ways to prepare for an interview. Getting ready for an interview.
Hardware and Networking Interview Questions with Answers ~ Technical Support for Windows Server. Hardware and Networking Interview. Questions with Answers..- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Explain. How do they work?
Administrative. shares are usually created automatically for the root of each drive letter. The reverse address resolution protocol (RARP) allows a host to discover its. Internet address when it knows only its physical address. What. is Client/Server? Clients and Servers are separate. Many. systems with very different architectures that are connected together are also. Client/Server. What.
MAC address? It is the 4. LAN card. MAC address is usually stored in ROM on the network adapter card and. What. are the perquisites to configure server? LAN card should be connected: Root (partition on which window is installed) should in. NTFSServer should be configured with a static IP address. How. we will configure ADS?
DESKTOP ENGINEER Interview Questions and Answers pdf free download mcqs objective type lab viva manual online test DESKTOP engineer PDF engineering. Interview questions: Online Interview questions and answers for interview preparation (General, HR, Technical, GD), competitive examination and entrance test.Fully. The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical. Desktops - 0 Desktops interview questions and 4 answers by expert members with experience in Desktops subject. Discuss each question in detail for better.
Start ==> RUN ==> DCPROMOHow. LAN card? Ping 1. If getting reply its fine. What are the difference between DOMAIN and WORKGROUP?
Workgroup: -. (i)Every PC is responsible for its security own. This is a server that all computers on the local network have to.
Internet. By using a proxy. It. (Linux) has its own file system known as ext.
In window. it’s known as virtual memory and could be set as per retirement via this path. My Computer ==> properties ==> advance. In Linux it’s known as SWAP space and generally taken the double size of. RAM For example if you have 2. MB) DDR physical ram then swap space. MB. It will out the signal from all of its.
It is unable to detect the. It works on single collision and single broadcast domain.
Switch is layer 2 device. It maintains a CAM table that store the. MAC address of devices attached on its port.
CAM table is used to make the. It works on per port collision and single broadcast. Layer is a completely logical. PDU (protocol data unit) process. That define how the information. What. is TCP/IP? It is combination of two protocols. TCP and IP. It is used for reliable data transfer.
What. is operating system? An operating system (sometimes. It provides a platform to application software. What. is package software?
The collection of mostly used software. Form Company. For Example Ms- Office that contain word. Excel, etc. Full. COM - . . The 'IN' is a 2- letter country code for India. UTP cable is used in star topology. It has a single cover over.
Base. 5—An Ethernet term meaning a maximum transfer rate of 1. Megabits per second that uses baseband signaling, with 5 continuous segments. Base. T—An Ethernet term meaning a maximum transfer rate of 1. Megabits per second that uses baseband signaling and twisted pair cabling. A fully specified passive open has the server waiting for a.
Each. SNMP agent has the MIB database that contains information about the device's. The MIB is queried by. SNMP. Usually, anonymous FTP uses a login called anonymous or guest. ID for tracking purposes only. Without a pseudo tty, no connection can take place. The message is sent to the client from the. What is External Data Representation?
Once you. have activated windows XP, this icon disappears from the system tray. If you want to access internet with. NAT server (on normal cases. ISP.). If you do decide to implement. IP address range, you can use IP addresses from any of the following.
Class A 1. 0. 0. 0. Class B 1. 72. 1. Class C 1. 92. 1. What is public IP address? Broadcast traffic can be isolated within a single. With dynamic addressing, the IP address can.
What is APIPA? APIPA enables clients to still communicate with. IP address can be obtained.
DHCP server, allowing the machine to fully participate on the network. An LMHOSTS file is a text file that maps. Net. BIOS names to IP addresses; it must be manually configured and updated. It uniquely identifies a host within a DNS hierarchy.
What is the DNS forwarder? A forwarder is an entry that is used when a DNS server receives DNS.
It then forwards those requests to. DNS servers for resolution. It is speed up work with. Location of this folder is. C: \Documents and Settings\Default User\sendto. This is the protocol used for file.
Internet. And same rule apply on windows vista editions also. What are the client configurations? Program Sharing. Just as you can share files on a network, you can often also share program on a. For example, if you have the right type of software license, you can.
Microsoft Office, or some other program, and keep it on. What is network? Further it is divided in. All the hosts in a sub- network will have. Where. are the Windows NT Primary Domain Controller (PDC) and its Backup Domain. Controller (BDC) in Server 2.
The scheme of PDC and BDC is. The Active Directory in server 2. Now all domain. controllers share a multi master peer- to- peer read and write relationship that. Active Directory.
How. can group policy be refreshed? Restart the server. Leave the server ideal for 9. Run ==> gpupdate (server 2. What. is LILO? LILO stands for Linux boot loader. What happened? The 1. Windows machines running 9.
XP if the DHCP server is not available. The. name for the technology is APIPA (Automatic Private Internet Protocol. Addressing). Global groups provide access to resources in entire domains. Only native. NTFS provides extensive permission control on both remote and local files. TCP/IP networks perform this task at. When were OSI model developed and why its standard called 8.
XX and so on? Once you. XP, this icon disappears from the system tray. A source route may optionally be included in an IP datagram header. This will be done when the originating. Kerberos uses encryption to prevent intruders from discovering.
BGP enables this information to be shared with. This is newer than EGP (Exterior Gateway Protocol). This problem occurs when data.
TCP entity in large blocks, but an interactive. If hosts. could be made to transmit at a uniform rate, congestion would be less common. This is called traffic shaping. Those that fail the test. How does it get a message to the. IP address and the location of its operating system. The same message might.
If the boot. image location is not specified, the workstation sends another UDP message to. There are several. It is a better choice than.
TCP because of the improved speed a connectionless protocol offers. Of course. transmission reliability suffers with UDP. It is an alternative to the Routing Information Protocol. The fixed central table reduces the need to update each. Usually a dynamic table causes the.
MAC address is. usually stored in ROM on the network adapter card and is unique. NETBEUI is Net. BIOS extended user interface. A transport. protocol designed by Microsoft and IBM for the use on small subnets. The. stations on the network notify the other stations on the ring when they are not. Beaconing is used in Token ring and FDDI networks.
It belongs to application. It will operate in the data. The standard protocol has been defined between the.
PAD, called X. 2. PAD and the network, called X. Together, these three recommendations are. Subnet mask value 0 defines host partition in IP address and. Network address. Typically, WANs are used when the LANs that must be.
Metropolitan Area Networks A metropolitan area network. MAN) is a hybrid between a LAN and a WAN. Content Networks Content networks (CNs) were developed to. Internet resources.
Companies deploy basically two types. Caching downloaded Internet information. Distributing Internet traffic loads across multiple servers. Storage Area Networks Storage area networks (SANs) provide. In other words, users from within this company can find all of. An intranet can. include LANs, private WANs and MANs,Extranet An extranet is an extended intranet, where certain.
Internet An internet is used when unknown external users. In other words, your company. VPN A virtual private network (VPN) is a special type of. A VPN is used to provide a secure connection across a public. Extranets typically use a VPN to provide a secure.
Authentication. is provided to validate the identities of the two peers. Confidentiality. provides encryption of the data to keep it private from prying eyes. Integrity. is used to ensure that the data sent between the two devices or sites has not.
Interview Questions for Desktop Support. Interview Questions for Desktop Support Technician/Analyst.
General Questions. Q. What desktop operating systems are you familiar with? A. Before you answer this question, you should have some background information on what operating systems are used within the organization you are interviewing with. Undoubtedly, you will be asked to elaborate on your skill set with each of these operating systems so it’s best to tailor your elaboration to the operating systems that are relevant to the hiring manager. This being said, don’t leave out mentioning experience in other operating systems. You never know whether the company may be evaluating the migration to a different OS.
Q. Have you used imaging software before? How do you find these tools useful?
A. Automation tools are an important part of your job as a desktop support technician. Elaborate on the tools that you’ve used. Hiring managers want to assess your in- depth knowledge and experience with using these tools. This means talking about how you use their various feature sets. What are the pitfalls of using imaging software?
A. This question is meant to assess how well you know these products. For example, discussing the importance of testing the image demonstrates that you use these tools on a regular basis. Q. Have you used any software distribution tools? If so, which ones and how were theyused?
A. Like imaging software, software distribution tools are an important part of your job. Hiring managers are looking for knowledge that these tools exist and how they can be used to support your organization. Q. What do you like most about desktop support? A. Hiring managers are looking for what motivates you. Hopefully your answer will match the characteristics of the job: being busy, working with different people, and the challenges of learning new operating systems and configurations. Q. What do you like least about desktop support?
A. The hiring manager is testing whether you will fit in with the existing team. An appropriate answer here would be not being able to resolve a problem in a timely manner for reasons outside your control, such as hardware failure. Stick to things outside of your control for the best response. Q. When solving a desktop problem, do you prefer to work with the end- user, your peers,or on your own?
A. This is another question to determine your fit within the organization. Hiring managers understand that to be successful as a support technician you will have to work in a team environment.
This means working with other employees, vendors, and end- users on a constant basis. Q. Can you describe a situation where you have had to deal with a difficult person? Would you do anything differently? A. Desktop support can be very demanding some days. End- users only see their own priority needs and often are not interested in other demands on your time. This question explores how you deal with a difficult end- user by understanding their problem, assessing priorities, and communicating a timeframe for resolution. Often good communication can help both sides come to an agreement.
Make sure you have an example with a successful outcome. Q. How would you say you are able to handle stress? A. Hiring managers are looking to see what coping techniques you can draw on to deal with stress. Sometimes from the answer, they can also determine whether you are prone to stress. When responding, some techniques for handling stress that you may want to talk about include continually evaluating what’s on your plate and prioritizing, communicating with your manager on what your priorities are, and making sure that you take a break to reenergize, particularly at lunch time. Q. What do you see yourself doing two or three years from now? A. Hiring managers want you to stick around.
They realize that you will not be in this position forever, and they want to make sure there’s a desire to move up within the organization as well as the right fit. They ask this question to see whether there’s a growth path for you possible within the organization. As a desktop technician, natural growth paths are team leads, quality assurance, engineering positions, and entry- level development. Be honest about where you want to be in two to three years, and ask the interviewer whether they see your career path as a possibility. Q. How do you learn new technologies? A. Learning is an inherent part of the job. Hiring managers are looking for someone who enjoys learning technology on their own and who has the foresight to look for training opportunities.
Besides the traditional books and manuals, don’t forget to include user groups, e. Learning subscriptions, and IT professional sites such as Cram. Session. Q. How do you prioritize tasks and manage your time? A. What hiring managers want to know is whether you have time- management skills.
Everyone manages their time differently, but think about how you handle e- mail, when you check voice mail, how you respond to pages, when you research and document, and how you pick up new trouble tickets. Q. Imagine the following situation: you receive three simultaneous calls from three vicepresidentswho need assistance immediately. How do you manage these conflictingpriorities? A. Obviously this is a trick question.
What the hiring manager is trying to assess is how you set expectations with each of the individuals, knowing very well that you won’t be able to assist all of them at the same time. They are also looking for how you will prioritize each of these incidents, including seeking assistance from peers and supervisors in order to meet user expectations. Don’t allow the “tyranny of the urgent” to divert you from managementestablished support priorities. Q. How would you handle a user who continually misdiagnoses their PC issues?
A. By asking this question, the hiring manager is assessing your customer service skills. In this situation, you may want to discuss that the key is to not offend the user and turn them off to your support services. In handling this situation, you would pay particular attention to ways you can build trust with the user and lead them to the right resolution to their problem.
These components may include: Acknowledging the user’s diagnosis. Asking the user to reproduce the problem. Finding a solution that works. Q. How do you handle setting up new employees? A. This question is used by the hiring manager to assess your knowledge of common practices within the IT department, such as setting up new users. Obviously, the IT department plays a critical role in the productivity of the new employee.
The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly. In responding to this question, you may want to talk about some of the tools you’ve used inthe past to help users acquaint themselves with their new environment. Some tools that help are: A new- user welcome letter that is customized to the specific user with all their relevant information including telephone extension, how to access voice mail, and how to log in. It might also include a FAQ on getting help.
A “Getting to Know Your Helpdesk” document that provides an orientation to helpdesk service, such as how to contact the helpdesk, its hours of operation, what is and what is not supported by the helpdesk, and answers to common new- user questions. Technical Questions. Q. What questions would you ask to help isolate a user’s problem?
A. This question is used by the hiring manger to assess your problem- solving abilities. The following represent some of the common questions that you would ask the end- user to help diagnose a situation: When did the problem first start? Has the system ever worked properly? What was the last thing done to the system prior to the failure? Is the issue intermittent or ongoing/constant? Are there any error messages? If so, what are the specific error messages?
Has any new hardware been added to the system? Has any new software been added to the system, including downloads from the Internet? Has anything changed with the system (for example, has it been moved) since the issue presented itself? Has anyone else had access to the system? Are there any environmental factors that could be causing the issue?
Have you done any troubleshooting on the system on your own? Have you checked all the cables/connections for a tight fit? Q. What are the main differences between the following operating systems? A. Unfortunately, most companies have not been able to standardize the operating systems used by users. It’s always critical that you know more than just the current version because there will always be a user who has a problem with an older version. By asking this question, the hiring manager is actually testing your knowledge of different operating systems that you may need to support. The following provides a concise summary of some of the major differences.
Windows 2. 00. 0 and XPOverall, XP is a minor update with Windows 2. Windows 2. 00. 0 technology into the hands of consumers. The major changes include the following: Device driver rollback. Remote control (single- user terminal services)New Start menu, control panel, and user interface elements. Fast user switching.
Encrypted file system support for redirected folders. Better support for roaming wireless networking. Enhanced policies. Credential Manager.
Personal firewall. Q. What are typical virus sources and how do you prevent virus attacks? A. This is virus protection 1. Possible virus sources include e- mail attachments, Internet downloads, and infected floppy disks. To prevent virus infections: Use anti- virus software. Perform regular updates to the virus software definition files and scan engines.
Verify updates have succeeded. Perform regularly scheduled virus checks. Configure software to check all files, not just program files. Educate users on virus attacks, their consequences, and how to prevent them. Know where all software came from. Do regular backups.