You are on page 1of 14

1) What is active directory?

Active directory authorizes and authenticates all users and computers in a window
domain network, ensuring the security of the computer and software. Through
active directory various functions can be managed like creating admin users,
connecting to printers or external hard drives.

2) What is DHCP and what it is used for?


DHCP stands for dynamic host configuration protocol. It is used to allocate IP
addresses to a large number of the computer system in a network. It helps in
managing the large number of IPs very easily.

3) What is scope and super scope?


Scope consists of an IP address like gateway IP, subnet mask, DNS server IP. It can
be used to communicate with the other PCs in the network. The superscope
becomes when you combine two or more scopes together.

4) What is DNS?
DNS mean Domain Naming Service and it is used for resolving IP addresses to name
and names to IP address. DNS is like a translator for computers, computers
understand the number and not the alphabet. For example, if we type like
hotmail.com, the computer dont understand this so they use DNS which converts
(hotmail.com) into (numbers) and then executes the command.

5) What is forward and reverse lookup in DNS?


When we convert IP address into names is called Reverse lookup, while converting
names into IP address is called Forward lookup.

6) What is A record and what is MX record?


A record is also known as host record, and it has ability to map the IP address by
name. It is with this record that DNS can find out the IP address of a name. While,
MX record also known as mail exchanger record, by the help of MX record,
location of the mail server is identified. The record is also found in DNS.

7) What is IPCONFIG command?


IPCONFIG command is used to display the IP information of the computer assigned
like DNS IP address and gateway IP address.

8) What would you use to connect two computers without using switches?
Cross cables are used to connect two computers without using switches.

9) What is a domain?
Domain is a set of computers which network recognizes by the internet. It can be
used by centrally administer computers. It is created when you install active
directory.

10) Tell me if your system is infected by a virus how you will recover the data?
You need to re-install another system, latest anti-virus software and an O.S with
latest patches. Before you start your system, connect the infected HDD as a
secondary drive then scan and clean the infected hard drive. Once done, you can
copy the files into the system.

11) What is the operating system?


Operating system acts as an interpreter between computer application and
hardware. It works as an user interface.

12) What are the types of operating system or O.S?


The two types of operating systems are:
NOS : Network Operating System. Examples of NOS- Windows NT, 2000,2003
SOS : Simple Operating System. Examples of SOS Windows 95,98, ME

13) Explain about RAS server?


RAS means Remote Access Server. It allows operating the tool or information that
typically resides on a network or IT devices through combination of hardware and
software, for example connecting to printer or file. It is usually used for mobile users
who are in the network. It uses telephone line to provide connectivity to its users. It
can also connect two or more than two offices in the network.

14) Explain about VPN server?


VPN means Virtual Private Network. It is a private communications network often
used by companies or organizations to communicate confidentially over a public
network. This is used by the mobile users in the network.

15) What is the difference between RAS and VPN server?


RAS is truly a local area connection between two connections whereas, VPN is a
local connection spread over large area.

16) What is IAS server?


IAS means Internet Authentication Service. For many types of network access like
wireless, authenticating switch and remote access dial-up they perform accounting
and auditing, centralized connection authentication and authorization.

17) What is Ping command?


Between two or more devices, to check the physical IP connectivity Ping command
is used.

18) What do you mean by clustering? What are the benefits?


When one or more computers work together as a single system by sharing their
resources is known as clustering. The benefits of clustering are that it reduces the
load on one single system by sharing the load also it is used for redundancy of the
services.

19) What is a group?


Group is a collection of the user account. It provides the simplified administration in
the network.

20) What is a child domain?


A child domain is the member domain of Windows 2000 Active Directory.

21) What are the benefits of a child domain?


Benefits of child domain are:
Low network traffic
Low administrative overhead
Security boundary

22) What is OU?


OU means for Organizational Unit. It is a container within Active Directory which can
hold users, groups and computers. It is the smallest unit on which administrator
can assign group policy settings.

23) Explain group policy?


Group policy provides the stream line access to all the users in the network, it can
be used to define the users security and networking policies. By group policy you
can keep control over certain function like not allowing the users to shut down the
system or using the control panel or running the command. Group policy is
applicable on active directory container like OU, site and Domain.

24) What is the difference between permission, rights and policy?


Policy is assigned on active directory, like site, domain and OU. The Rights are
assign to users and groups, whereas, the Permission is assigned for network
resources like file, folders and printers.

25) What is DC and ADC stands for?


DC stands for domain controller and ADC stands for additional domain controller.
ADC is a backup of domain controller. Domain controller is a server that checks the
security measures like user id, password.

26) What is the difference between DC (Domain controller) and ADC ( Additional
Domain Controller)?
There is one difference between domain controller and additional domain controller,
on DC all five operational roles are available while in ADC only three operational role
is available.

27) What are the operational roles for DC (Domain controller) and ADC ( Additional
Domain Controller)?
Operational roles for DC (Domain controller) are:
Domain Naming Master
Schema Master

RID Master
PDC Emulator
Infrastructure Master

Operational roles for ADC (Additional Domain Controller) are:


PDC Emulator
RID Master
Infrastructure Master

28) What is a Default Gateway?


Default gateway is the IP address of the router in the network. In any case, if the
users wants to switch on to another network, or if they cannot locate their particular
network than their query will be forwarded to default gateway.

29) How you can take backup of emails in ms outlook?


To take a back-up in the ms outlook, you have to go in control panel. In control panel
you have to go under mail option and then open the data file, select personal folder
and click on open folder. After that, you have to copy .pst and have to paste it
wherever you want the backup.

30) What is trusting domain and trusted domain?


In trusting domain resources are available, while in trusted domain users account is
available.

31) What is BUS speed?


The rate of communication speed between microprocessor and RAM is known as
BUS speed.

32) Name the Active Directory Partitions?


There are three types of active directory partitions:
Schema partition
Configuration partition

Domain partition

33) What is Fixboot?


Fixboot write a new partition boot sector on to the system partition.

34) How many logical drive is it possible to fit on to a physical disk?


The maximum number of the logical drive that can fit on a physical disk is 24, while
the extended partition can only have 23 logical drives.

35) What is B Router?


B router means Bridge router. To provide communication between two or more
different network like computer to computer or computer to internet, B Router is
used.

36) What is the major difference you can mention about Gateway and Router?
Gateway works on different network architecture and router works on same network
architecture.

37) What is packet?


A packet is a logical grouping of information that comprises a header which contains
user data and location information.

38) What is SCSI?


SCSI stands for Small Computer System Interface. It is a standard electronic
interface that allows personal computers to communicate with peripheral hardware
such as disk drives, tape drives, printers, CD-ROM drives. In SCSI the rate of data
transmission is fast.

39) How many classes are there for IP addresses and what are the ranges?
They are segregated into five classes:
Class A ===

0 -126 ( 127 is reserved for loop back)

Class B ====

128- 191

Class C ====

192-223

Class D ==== 224-239


Class E ==== 240-255

40) Explain the term FIXMBR?


FIXMBR it is a repair tool. It repairs the Master boot record of the Partition Boot
Sector.
41) Explain the term SID?
SID stands for Security Identifier. Every computer object has a unique ID which is
known as SID.

42) What is the difference between incremental backup and differential backup?
Differential backups will select only files that are changed since the last backup.
Incremental backups will select only the data that has changed since the last
backup.
Example, On Sunday you do a backup of a 5 text file each of 40 MB. Total backup
size will be 200MB
On Monday you change 2 lines in just ONE of the text file.
Under Differential backup, only the changed text file will be backed up. Total backup
size will be 40MB
Under Incremental backup, only the data corresponding to the 2 lines will be backed
up. Total backup size will be just in bytes.

43) What is the difference between server OS and desktop OS?


Server OS gives centralized administration for users, shared resources and security
while desktop OS gives access to only local administration.

44) What is the difference between the MSI file and .EXE file?
MSI (Microsoft Installer) allows install, uninstall and repair the program with a single
file, while .EXE file needs two files to install and uninstall the software. Also,.EXE file
is able to detect the existing version of the software and give option to user to
uninstall the program while MSI will instruct the users to use the add and remove
program in control panel to remove the existing product first and then you can
install the new program.

45) What is BSOD? How do you troubleshoot it?


BSOD stands for blue screen of death. When there is some fault in OS or hardware
then Windows cant run the program and gives a blue screen with a code. To resolve
this problem the best way is to reboot the system. If it doesnt work than boot the
system in the safe mode.

46) What is PTR (Program Troube Record) record?


This program record is used to check if the server name is connected with the IP
address, it is exactly opposite to the A record. This record is basically created in
reverse lookup zone, so it is also known as Reverse DNS records or pointer record.
PTR record= Give me an IP address and I will give you the name
A record= Give me the name and I will give you the IP address

47) What is reservation?


Basically the term Reservation is used in DHCP server. Some network equipment
or computer system needs a specific IP address, in such case we make a reservation
in DHCP server for that particular computer system. By creating reservation it gives
access to that particular IP address and at the same time prevents other computer
system to use that IP address.

48) What is SMTP server or POP server?


SMTP stands for simple mail transfer protocol. It is basically used for sending and
receiving the mail, whereas, POP stands for post office protocol it is used for mail
receiving purpose in the network.

49) What is RIS and why you use RIS?


RIS stands for remote installation services. It is used to install image from a Window
server to a new hardware. We use RIS because installing OS every time using a CD
would be more time consuming.

50) What is Bootloader?


Bootloader facilitates the loading of operating system on the system. It enables the
booting process and gives OS option to the users while starting the system.

A Desktop Support Engineer is responsible for managing a multi-user computing


environment within a local area network (LAN). The responsibilities of a Desktop
Support Engineer typically include installing and configuring system hardware and
software, upgrading software and performing backup/recovery tasks.

The main responsibilities performed by a Desktop Support Engineer are:


Installation and maintenance of Windows OS
Installation/updating of desktop software
Remote desktop connections
Antivirus support
Create a backup and recovery policy
Desktop performance monitoring and optimization
Before facing any interview for a Desktop Support position, make sure that you have
enough knowledge on these technologies:

Basic Network Concepts:


Data communication and transmission techniques
Fundamentals of OSI and TCP/IP model
IP address classes
IP subnetting
IPv6 fundamentals
Basics of switching

Windows Functionalities:
Installing Windows Operating System on desktops
Managing and troubleshooting access to shared folders
Configuring and troubleshooting hardware devices and drivers
Troubleshooting system startup and user login problems
Configuring and troubleshooting remote connections
Configuring and troubleshooting Internet Explorer
Configuring and troubleshooting Outlook Express
Resolving issues related to application customization
Identifying and troubleshooting problems related to security permissions
DHCP
DNS
Scheduling tasks

Top Interview Questions for a Desktop Support Engineer (Microsoft) Position:


All of the questions below are very common and must be prepared for before
facing any interview for a Desktop Support or Windows Administration Engineer
position.

Q: Which Windows OS are you most comfortable with?


A: This is a very basic question and you can prepare your answer by researching
which OS version is used by the company youre applying in. Be sure to do a little
reading on the systems you are familiar with, so you can showcase your skills.

Q: Why do we use DHCP?


A: Dynamic Host Configuration Protocol (DHCP) is used to assign dynamic IP
addresses to network devices, allowing them to have a different IP address each
time they are connected to the network.

Q: What is DNS and why do we use it on workstations?

A: The Domain Name System (DNS) is used to resolve human-readable hostnames


like www.intenseschool.com into machine-readable IP addresses like 69.143.201.22.
The DNS address is configured on workstations. Windows redirects all domain
names to resolve into IP addresses.

Q: What is a default gateway? What happens if I dont have one?


A: A default gateway is a routing device used to forward all traffic that is not
addressed to a destination within the local network or local subnet. If you dont
have a default gateway, it is not possible to communicate with the network
device/host of different networks. Dial-up internet connections do not require a
default gateway though because it is present in the ISP itself.
Q: How do I find the path that a packet takes to its destination?
A: Using tracert command lets you see the path travelled by a packet to its
destination.

Q: What is the use of Safe Mode? When should we use it in Windows?


A: Often, we have to start Windows in Safe Mode in order to remove spyware or for
troubleshooting driver problems and other diagnostic purposes. Only specific
programs and files with limited driver support are needed to run the operating
system. This will allow you to attempt to remove viruses, change bad drivers and
perform other diagnostic tasks that cannot be done in Normal Mode.

Q: How do I start in Safe Mode?


Method 1: Reboot the computer. Start pressing the F8 key as soon as your system
starts to boot. This will open multiple boot options including Safe Mode.
Method 2: Open Run, type msconfig and press Enter. A system configuration
window will pop up; now go to the Boot tab, check the Safe boot box and select
Minimal for a typical safe boot. Click Apply and your computer will boot into Safe
Mode the next time it restarts.

Q: What is the use of the BOOT.ini file?


A: Boot.ini files are required in booting Windows operating systems, starting with
Windows NT. The boot.ini file also provides flexibility for dual booting multiple
operating systems on the same computer.

Q: How do I edit my Boot.ini?

A: From Windows:
Open Run, type msconfig and press Enter to open System Configuration Utility.
Select the tab labelled BOOT.INI. Click the button labelled Check All Boot Paths. A
dialog box will open detailing the location of any invalid operating system locations.

Q: Which command is used to check IP configuration?


A: You can use ipconfig /all to display all of the current TCP/IP configuration values,
including the IP address, subnet mask, default gateway, and Windows Internet
Naming Service (WINS) and DNS configurations.

Q: How can I make my hard disk dynamic?


A: Go to Run then type diskmgmt.msc. After that, right click on hard disk to convert
a basic disk to dynamic disk.
Note: You should be logged in with an administrator account.

Q: What is the blue screen of death?


A: A Blue Screen error is mainly due to hardware or software incompatibility within
the system. The most common reasons for a Blue Screen of Death (BSD) are
unwanted software installation, high CPU usage and faulty RAM. Try the following
options.
1. Pull out the RAM card, rub it with rubber on the chip side, and re-insert.
2. If a BSD still occurs, try using that RAM on another system.
3. Every BSD has a unique code; try searching it on Google to find a solution.

Q: What are some common sources of computer viruses and how can you prevent
being infected?
A: Some common sources are Internet downloads, email attachments, and infected
CDs/DVDs. You can use trusted anti-virus software and update it regularly. Make
sure it checks every file on the computer. Backup your system periodically in case a
major infection occurs, and be aware of all software and programs that run on your
computer. Never click a suspicious link or download a suspicious file.

Q: Describe some commonly used LAN cables. What is the maximum length of LAN
cable for proper communication?
A: There are mainly two types:
Cat 5 (Category 5 where 5 indicates twists per inch) & Cat 5e (5e indicates 5 twists
per inch per pair which leads to reduced cross talk). Both Cat 5 & 5e are UTP cables
that can support up to 100 Mbps.
Cat 6 & 6e are UTP cables that can support up to 1 Gbps.
After about 80 meters (260 feet), you will usually see a reduction in speed.

Q: Windows cannot currently check for updates; what could be the possible
reasons?
A: There could be two possible reasons:
Missing/corrupted files
Update services down
Method 1: Contact Microsoft: http://support.microsoft.com/mats/windows_update/
Method 2: Please follow the steps below:
a. Go to Run, type services.msc without quotes and press Enter.
b. Locate Windows Update.
c. Right click on Service and select Properties.
d. In Start-up type, select Enable.
e. Click Start under Service status.
f. Click OK.

Q: What is the SysWOW64 folder?


A: It is normally found in a 64-bit OS, for example 64bit Win7. This folder is very
similar to the system32 folder of the 32-bit OS.

Q: What do you mean by NTLDR Error?


A: NTLDR is known as the Network Loader. It helps in loading the operating system.
If any system is showing NTLDR is missing then you need to copy the NTLDR file
from operating system CD.

You might also like