Desktop Support Engineer Interview Questions Answers Tutorial
Desktop Support Engineer Interview Questions Answers Tutorial:-In this cyberpoint9 tutorial we are going to describe about the Desktop Support Engineer and Server Engineer Interview Questions Answers which is asked in ethical hacking cyber programming or in Desktop Support Engineer. And also we will describe that how can we crack interview of various examination in ethical hacking and computer Science. When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of Desktop Support Engineer and Server Engineer course with examples in the light of cyberpoint9.com best Short tutorial using simple and best possible example. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law or Desktop Support Engineer can easily learn and understand How the Desktop Support Engineer works in our today’s Technical Field. This is the best tutorial/Study Material very beneficial for beginners as well as Professional.
Interview Question
Part – 3
1- Name of the Boot files required to boot the system.
2- What are the steps to join the system in Domain?
3- What are the steps to configure the MS Outlook?
4- Difference between OST & PST and default location of both the files
5- Tool name to repair the PST
6- What steps you will follow if mails are receiving but not Sending
7- Maximum permitted size for PST in MS Outlook 2013
8- Steps to remove the Virus from System
9- Difference between Win7.0 32bit and 64 bit OS
10- How to recall the send message in outlook
11- DHCP full form and how it works
12- What is the function of DNS
13- Command to release and renew the IP address
14- Where do we use ipconfig-a and traceart command
15- IPV4 & IPV6 address is of how many bits
16- What should be the minimum and maximum size of Page file
17- What is the minimum RAM requirement for 32 bit and 64 bit OS
18- What are the possible causes of Blue dump error and what steps you will follow to rectify blue dump error?
19- What is the benefit of Domain?
20- Full form BIOS and what is the use of BIOS in System
21- SMTP, POP3 & IMAP Default Secure Port
22- Why we use VPN
23- How to configure the Wi-Fi
24- What is the difference between Network and Shared Printer and drawback of shared printer?
25- How to check whether SMPS is OK or not
26- What is the Incident, Service Request and SLA?
27-What is the POP and IMAP and difference between POP and IMAP?
28-Which version outlook you are working and its configuration process and difference between different version?
29-What is classes, how many types of Networking classes and function?
30-What is DHCP and DNS? What is the difference between TCP and UDP?
31-Port number, POP3, IMAP, SMTP, DHCP, DNS?
32-What is hard disk and what is the normal speed of hard disk?
33-What APIPA?
34-What is Domain & Work group?
35:- Not able to login system how you will resolve this issue?
36:-Outlook configuration process? Incoming, Outgoing issues, How you will resolve?
37-What is PST & OST? What is the difference and if PST file crashed how you will recover?
38-System working slow, Reason behind this and how you will resolve?
39-What is BSOD, Blue screen error? And what is the reason behind this and how you will resolve?
40-What is trust screen error?
41-User not able to connect with Wife or LAN, How you will resolve?
42-Configuration process on Network printer?
43:-If user not able to take print out through Network printer what you will do ?
44:- Do you have any experience on VC
Q: Describe some commonly used LAN cables. What is the maximum length of LAN cable for proper communication?
A: There are mainly two types:
- Cat 5 (Category 5 where 5 indicates twists per inch) & Cat 5e (5e indicates 5 twists per inch per pair which leads to reduced cross talk). Both Cat 5 & 5e are UTP cables that can support up to 100 Mbps.
- Cat 6 & 6e are UTP cables that can support up to 1 Gbps.
After about 80 meters (260 feet), you will usually see a reduction in speed.
Q: Windows cannot currently check for updates; what could be the possible reasons?
A: There could be two possible reasons:
- Missing/corrupted files
- Update services down
Method 1: Contact Microsoft: http://support.microsoft.com/mats/windows_update/
Method 2: Please follow the steps below:
- Go to Run, type “services.msc” without quotes and press Enter.
- Locate Windows Update.
- Right click on Service and select Properties.
- In Start-up type, select Enable.
- Click Start under Service status.
- Click OK.
Q: What is the SysWOW64 folder?
A: It is normally found in a 64-bit OS, for example 64bit Win7. This folder is very similar to the system32 folder of the 32-bit OS.
Q: What do you mean by NTLDR Error?
A: NTLDR is known as the Network Loader. It helps in loading the operating system. If any system is showing “NTLDR is missing” then you need to copy the NTLDR file from operating system CD.
- What are the types of operating system?
- Give examples of NOS (Network Operating System) and SOS (Server Operating System).
- What is the difference between FAT and NTFS?
- What is DNS?
- What is reverse lookup in DNS?
- What is forward lookup in DNS?
- What are enhancements in Windows 2003 from Windows 2000?
- What does DHCP stand for and why it is necessary?
- What are enhancements in Windows 2003 from Windows NT?
- What is Active Directory?
- List types of firewall.
- Define scope and superscope with respect to IP addressing
- What is a default gateway
- What is the difference between hardware and software firewall?
- Name the seven layers of OSI model.
- How to enable Firewall in Windows XP?
- How to disable Firewall in Windows XP?
- What are the minimum system requirements of Windows XP, Vista, 2003, and 2008?
- List out some versions of Windows XP, Vista, and Windows 7.
- Explain ping command.
- Explain cookies.
- What is an .exe file.
- What is is .msi file.
- How do you boot the computer in Safe mode?
- Why is ipconfig command used for?
- What is tracert command?
- Define operating system
- Define VPN server
- What is POP server
- What is a SMTP server
- What is a RIS server
- What is the key difference between a desktop OS and server OS.
- What are the types of printer?
- What is a safe mode in Windows OS
- Explain last known good configuration.
- What is disk clean up, disk defragmentation, device manager, and system restore?
- Explain the differences between USB port and Firewire port?
- How do you install a printer in Windows XP?
- What is a browser and name any 5 browsers?
- What is a Serial port
- What is a parallel port
- What is the difference between a serial port and a parallel port?
- What is an A record?
- What is a PTR record?
- Define RAS server
- What is a port number?
- Where is the HOSTS file located?
- Explain different RAID levels.
- What is an IAS server?
- Explain APIPA, IP address, and Subnet mask.
- What is packet data?
- Explain the difference between IP v4 and IP v6.
- Explain a group with respect to network administration
- Explain child domain and its uses.
- What is an organizational unit with in terms of a domain?
- Expalin rights, policy and permission in network administration.
- What is a domain controller?
- Explain what is additional domain controller
- What are the types of active directory partitions.
- Difference between default gateway and a router
- Expalin SCSI
- How do you remove a virus from a computer?
- How do you make a computer run faster?
- What is attribcommand?
- What is edit command?
- How do you copy a file or folder using copy command?
- How do you format the hard disk using command line utilities?
- Explain mkdir, rmdir, and chdir
- What is the path of host file in Windows OS?
- Explain the types of hard disk.
- What is a router?
- What is a bridge router?
- What is the difference between primary and secondary partition?
- What is a backup?
- What are the types of backups in Window OS?
- Explain the differences among differential backup, incremental backup, and copy backup.
- What is remote desktop?
- What is the difference between recovery console and automated system recovery?
- What is NTLDR file?
- How do you tackle “missing NTLDR file” error?
- How many bytes are there in MAC address?
- Name the range of Class A IP address.
- Name the range of Class B IP address.
- Name the range of Class C IP address.
- What is the default subnet mask of Class A, Class B, and Class C IP address?
- What is BSOD (Blue Screen of Death) and how do you overcome it?
- What is the difference between preferred DNS and alternate DNS server?
- What is the transmission speed of T1 carrier?
- List out some ports that are available on a computer
- What are some common types of LAN cable?
- What is a social engineering attack?
- What is a phishing attack?
- What is Denial of Service attack in hacking
- What is eavesdropping with respect to hacking
- What is virus with respect to computer technology?
- What does it mean when a program is x86?
- What is SysWoW64 Folder in Windows?
- Difference between x86 and SysWoW64 folders
Interview Questions
===================
-
A) Tell me something about yourself.
Tell about your education, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.1) What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.
2)What is DNS? Why it is used? What is “forward lookup” and “reverse lookup” in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
‘A’ record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
‘MX’ Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.To gain in depth knowledge on DNS please download, extract and watch the
3) What is DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. It’s used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Super scope: When we combine two or more scopes together it’s called super scope.4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are “Cat 5” and “Cat 6”. “Cat 5” can support 100 Mbps of speed and “CAT 6” can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable.
The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.9) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. It’s a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies.
We can’t do the same with workgroup.10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003.
11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.
12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is “LAst known good configuration”. If this doesn’t work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB: http://support.microsoft.com/kb/305550
15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?
Update the network card driver.
16) Your system is infected with Virus? How to recover the data?
Install another system. Insall the OS with the lates pathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.
17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read “Adding the Workstation to the Domain”
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/domxppro.mspx18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.20) What are manageable and non manageable switches?
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can’t do so.Technical Questions
What is NIC?
A network card, network adapter or NIC (network interface controller) is a piece of computer hardware designed to allow computers to communicate over a computer network2. What is USB?
Universal Serial Bus (USB) is a serial bus standard to interface devices. Devices like Modem, Mouse, Keyboard etc can be connected.
3. Dialup vs. Broadband
A broadband connection (ADSL) provides high-speed Internet access over a standard phone line. The advantage of a broadband connection over a standard dialup service, is that Broadband is considerably faster, and is “always-on”, meaning that once you”re logged on, your PC is online until the PC is turned off again.
Broadband offer high-speed Internet access and allows telephone calls and a permanent Internet connection to share a single phone line simultaneously whereas in Dialup connection either Internet connection or telephone call can made at given time.
4. LAN and WAN
A local area network is a computer network covering a small geographic area, like a home, office, or group of buildings
Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links
5. Microsoft Access
Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft.
6. What is RAS?
Remote Access Services (RAS) refers to any combination of hardware and software to enable the remote access to tools or information that typically reside on a network of IT devices.
7. Difference between Client Mail and Web Mail?
Email clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want.
Checking your email through our webmail is similar to using Hotmail or Yahoo! Mail. You never actually copy your messages to your computer; in fact, you are looking at them through your web browser on somebody else”s computer. When you are not online, you are not able to see your email.8. RAM and ROM
random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.
Pronounced rahm, acronym for read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being nonvolatile, whereas RAM is volatile.
9. Spamguard
Spam Guard is an Outlook add-in that filters email that arrives in your inbox. If the sender of any message cannot be identified then the message is moved into a spam quarantine folder. Messages deposited in the spam quarantine folder can be inspected and either deleted or approved at your leisure.
10. Firewall and Antivirus
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.Antivirus is a software program which helps protect a computer against being infected by a virus.
11. DNS
Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they”re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.
12. IPConfig
IPConfig is a command line tool used to control the network connections on Windows NT/2000/XP machines. There are three main commands: “all”, “release”, and “renew”. IPConfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, IPConfig displays the IP address, subnet mask, and default gateway for all adapters.
13. Trace route
Trace route is the program that shows you the route over the network between two systems, listing all the intermediate routers a connection must pass through to get to its destination. It can help you determine why your connections to a given server might be poor, and can often help you figure out where exactly the problem is. It also shows you how systems are connected to each other, letting you see how your ISP connects to the Internet as well as how the target system is connected.
Please find the technical questions:
1) What is IP Address ?
2) What are the layers of network ?
3) What are the different types of network ?
4) What is networking ?
5) What is the difference between OSI and TCP/IP Model ?
6) What is TCP/IP ?
7) What is HTTP?
8) What is Protocol ?
9) What is communication medium ?
10) What is PORT ?
11) What is SOCKET ?
12) What is the difference between PORT and SOCKET?
13) What is wireless networking ?
14) What is topology ?
15) What are the different types of topology ?
16) What is the size of IP Address?
17) What is FTP ?
18) What is SMTP ?
19) What are the different types of protocol ?
20) What is Dial-Up connection ?
21) What is Broad Band Connection?
Desktop Support Engineer Interview Questions Answers Tutorial For Part 2: Click here
Part 1
Follow Us on Social Platforms to get Updated : twiter, facebook, Google Plus