Top 50 Desktop Support Interview Questions & Answers . 43) What is the difference between server OS and desktop OS? Download PDF. Desktop & Technical Support Interview Questions and Answers - Download as Word Doc .doc), PDF File .pdf), Text File .txt) or read online. System (DNS) is an Internet Engineering Task Force (IETF) standard name service that allows your. Interview question for desktop support engineer - Free download as Word Doc . doc /.docx), PDF File .pdf), Text File Download as DOCX, PDF, TXT or read online from Scribd .. System Administrator interview questions and

Desktop Support Engineer Interview Questions Answers Pdf

Language:English, German, Arabic
Country:Dominican Republic
Published (Last):23.03.2016
ePub File Size:27.58 MB
PDF File Size:13.16 MB
Distribution:Free* [*Registration Required]
Uploaded by: JOSEF

+ Desktop Support Interview Questions and Answers, Question1: What is active It is prized by engineers because it uses very small amounts of electric. DESKTOP ENGINEER Interview Questions and Answers pdf free Desktop engineers provide support and implementation services to. Apps Technical Interview Questions and Answers PDF. Desktop Support Engineer - Interview. Questions and Answers. Updated Download the Questions as a.

After about 80 meters feet , you will usually see a reduction in speed. You can use trusted anti-virus software and update it regularly.

Make sure it checks every file on the computer. Backup your system periodically in case a major infection occurs, and be aware of all software and programs that run on your computer. Never click a suspicious link or download a suspicious file. Go to Run then type diskmgmt. After that, right click on hard disk to convert a basic disk to dynamic disk. Note: You should be logged in with an administrator account. A Blue Screen error is mainly due to hardware or software incompatibility within the system.

Try the following options. Pull out the RAM card, rub it with rubber on the chip side, and re-insert. Every BSD has a unique code; try searching it on Google to find a solution.

Select the tab labelled BOOT. Click the button labelled Check All Boot Paths. A dialog box will open detailing the location of any invalid operating system locations. The boot. Click Apply and your computer will boot into Safe Mode the next time it restarts. Reboot the computer. Start pressing the F8 key as soon as your system starts to boot. This will open multiple boot options including Safe Mode.

When should we use it in Windows? Often, we have to start Windows in Safe Mode in order to remove spyware or for troubleshooting driver problems and other diagnostic purposes. Only specific programs and files with limited driver support are needed to run the operating system.

This will allow you to attempt to remove viruses, change bad drivers and perform other diagnostic tasks that cannot be done in Normal Mode. A default gateway is a routing device used to forward all traffic that is not addressed to a destination within the local network or local sub-net.

Dial-up internet connections do not require a default gateway though because it is present in the ISP itself. The DNS address is configured on workstations. Windows redirects all domain names to resolve into IP addresses. Be sure to do a little reading on the systems you are familiar with, so you can showcase your skills.

Have you interacted with the IT staff? Communicate your ability to handle different tasks and challenges. Show how you are well versed with special systems and communicate with professionals in your area of expertise. Include coordinating with Information Technology professionals to enhance system communication, peripherals and network operation. You may also relate your experience in installing computer performance monitoring equipment. Explain methods used to assess future computer needs in the organization.

Do you worked independently as well? As a desktop engineer you must have the ability to work with others and alone. Describe how you have worked with your staff members to determine solutions to major issues. Describe a major upgrade in which you were heavily involved. A success story.

Explain the step taken to ensure smooth upgrade. Relate your experience in installing and testing computer systems and ensuring their proper function.

How to host multiple website using IIS 6. Organizations that host multiple Web sites on a single server often use host headers because this method enables them to create multiple Web site identities without using a unique IP address for each site.

You must be a member of the Administrators group on the local computer To add a Web site using a host header identifier using the Web Site Creation Wizard 1. Click Next.

In the Description box, type the name you have selected for the Web site, and then click Next. In the TCP port this Web site should use box, type the port number used by all sites on the server. In the Host Header for this Web site Default: None box, type the host header name to identify the Web site. The host header name must contain the full name of the site, for example, www. Note that you cannot use host headers with SSL encryption.

In the Path box, type or browse to the path of your Web site home directory. To create a secured or private Web site, clear the Allow anonymous access to this Web site check box, and click Next.

Web sites are configured for anonymous access by default. When your computer prompted a message to press any key to boot from the CD, press the any key. Once in the Windows XP setup menu press the "R" key to repair and now log into your Windows installation by pressing the "1" key then pressing enter. Here Enter the administrator password and then copy the below two files to the root directory copy e: How to change the windows xp product key if wrongly installed with other product key but you have original product key?

What you will do to Make your os as Genuine? Physical structure of Active Directory: The physical structure of Active Directory contains all the physical subnets present in your network like domain controllers and replication between domain controllers. The physical structure of Active Directory: Domain Controllers: Every Domain Controller performs specific functions like replication, storage and authentication Active Directory Sites: These sites are collection of well-connected computers.

The reason why we create site is domain controllers can communicate frequently within the site. It minimizes the latency within site, changes made on one domain controller to be replicated to other domain controllers. The other reason behind creating a site is to optimize bandwidth between domain controllers which are located in different locations.

Active Directory Partitions: Each Domain Controller contains the following active directory partitions: The Domain Partition contains a copy of all the objects in that domain. Replication in Domain Partition is only to other domain controllers which are in the same domain. The Schema Partition is forest wide. Every forest has one schema with consistent object class.

The Schema and Configuration take part in replication, and get replicated to all domain controllers in a forest. Application Partition which is optional carries objects which are not related to security and can be used by one or more applications.

Application Partition replicates to specific domain controller in the forest. Logical Structure of an Active Directory: Which are Forest level roles and Domain level roles?

The five FSMO roles are: Schema Master: The schema master domain controller controls all updates and modifications to the schema. There can be only one schema master in the whole forest. Domain naming master: The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest. Infrastructure Master: The infrastructure is responsible for updating references from objects in its domain to objects in other domains.

At any one time, there can be only one domain controller acting as the infrastructure master in each domain. At any one time, there can be only one domain controller acting as the RID master in the domain. PDC Emulator: The PDC emulator is a domain controller that advertises itself as the primary domain controller PDC to workstations, member servers, and domain controllers that are running earlier versions of Windows.

What are the steps taken while moving the FSMO roles? Select the domain controller that will be the new role holder, the target, and press OK. Select the appropriate tab for the role you wish to transfer and press the Change button. Press OK to confirm the change. Press OK all the way out. Select the domain controller that will be the new role holder and press OK.

Press the Change button. Transferring the Schema Master Role 1. Click Start, click run, type mmc, and then click OK. Click Add. Click Active Directory Schema. Click Close to close the Add Standalone Snap-in dialog box. Click OK to add the snap-in to the console.

Click Specify Domain Controller, type the name of the domain controller that will be the new role holder, and then click OK. In the Change Schema Master dialog box, click Change. Click OK. Click Cancel to close the dialog box. At the server connections: You will receive a warning window asking if you want to perform the transfer. Click on Yes.

Interview question for desktop support engineer

Restart the server and make sure you update your backup. What is active directory? Active Directory is a centralized and standardized system that automates network management of user data, security and distributed resources and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. Active Directory provides a single hierarchical view from which to access and manage all of the network's resources.

What is windows installer? The Windows Installer is a software component used for the installation, maintenance, and removal of software. What is the component of bluetooth? Any Bluetooth solution consists of four major components: Each of these components is a product in itself, and companies exist that have entire business models based around solving only one of these four areas.

I forget the startup password on Windows XP how to remove? If you receive the message "press any key to boot from CD," press any key. After you accept the license agreement, you will be asked if you want start a repair process.

Setup will now check your disks and start copying files, which can take several minutes. After this, reboot. Let the computer boot normally do not press a key to boot from CD.

When you see the Installing Devices progress bar, press "Shift" and "F10" at the same time. This will open a command line console.

CPL" without quotes at the prompt, then press "Enter. Remove or change your password. Write it down. After the repair is finished, you will be able to log on with your new password. Dll file is missing? A missing or corrupt. Another program was uninstalled that removed a. A program was installed that overwrote the. A bad installation of a program corrupted one or more files causing the.

Another user or program maliciously or mistakenly deleted the. A hardware issue exists with the computer, such as a bad hard disk drive, causing the data on the drive to become corrupt, casing the. What are the features of Windows XP? Enhanced Device Driver Verifier Windows File Protection Protects core system files from being overwritten by application installations.

Windows Installer A system service that helps users install, configure, track, upgrade, and remove software programs correctly. Kerberos Support Provides industry-standard and high-strength authentication with fast, single logon to Windows based enterprise resources. Synchronization Manager Lets users compare and update their offline files and folders with those on the network. Wireless Networking Support Provides secured access, as well as performance improvements, for wireless networks.

Remote Assistance Remote Assistance enables a user to share control of his or her computer with someone on a network or the Internet. System Restore The System Restore feature enables users and administrators to restore a computer to a previous state without losing data. Recovery Console Provides a command-line console for administrators to perform administrative tasks. Internet Connection Firewall A firewall client that can protect small businesses from common Internet attacks.

Network Setup Wizard Makes it easy for a small business owner to set up and manage a network. System Preparation Tool SysPrep SysPrep helps administrators clone computer configurations, systems, and applications. A single image, which includes the operating system and business applications, can be restored to multiple different machine configurations.

What is Marshalling? The process of gathering data and transforming it into a standard format before it is transmitted over a network so that the data can transcend network boundaries. In order for an object to be moved around a network, it must be converted into a data stream that corresponds with the packet structure of the network transfer protocol.

This conversion is known as data marshalling. What are the differnt file system in windows? What is the maximum amount of databases that can be hosted on Exchange Enterprise? What 3 types of domain controller does Exchange access? What Exchange process is responsible for communication with AD? What must be done to an AD forest before Exchange can be deployed?

Run the following command: What are the required components of Windows Server for installing Exchange ? Exchange Setup requires that the following components and services be installed and enabled on the server: How can we solve this problem?

Which of the following API is used to hide a window? What is Paging? In computer operating systems, paging is one of the memory-management schemes by which a computer can store and retrieve data from secondary storage for use in main memory.

In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. In a computer system using segmentation, an instruction operand that refers to a memory location includes a value that identifies a segment and an offset within that segment.

A segment has a set of permissions, and a length, associated with it. If the currently running process is allowed by the permissions to make the type of reference to memory that it is attempting to make, and the offset within the segment is within the range specified by the length of the segment, the reference is permitted; otherwise, a hardware exception is raised. How many types of operating system? Types of operating system There are several types of operating system, defined according to whether they can simultaneously manage information measuring 16 bits, 32 bits, 64 bits or more.

However, contrary to what many believe, the two have almost nothing in common.

RAM is This is reusable memory that the computer uses to run programs. ROM is This is memory that has data permanently written on it and is usually not reusable. Types of RAM 3. Types of ROM 4. Similarities 5. Both are types of memory and both are vital for your computer to operate properly. Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.

GUI Clients: These are applicatoins, where occassional requests to the server result from a human interacting with a GUI Example: Windows 3. These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.

What is meant by Horizontal scaling and Vertical scaling? Vertical Scaling means to add more hardware resources to the same machine, generally by adding more processors and memory.

What is Networking? A computer network is any set of computers or devices connected to each other with the ability to exchange data. How can i install active directory in windows ? The member server should be located in the forest root domain.

After you install AD DS successfully, the member server will become a domain controller. You can install AD DS on any member server that meets the domain controller hardware requirements. Click Start, and then click Server Manager. In Roles Summary, click Add Roles. If necessary, review the information on the Before You Begin page, and then click Next. If necessary, review the information on the Active Directory Domain Services page, and then click Next. On the Confirm Installation Selections page, click Install.

On the Operating System Compatibility page, review the warning about the default security settings for Windows Server domain controllers, and then click Next.

On the Choose a Deployment Configuration page, click Existing forest, click Add a domain controller to an existing domain, and then click Next. On the Network Credentials page, type the name of any existing domain in the forest where you plan to install the additional domain controller. Under Specify the account credentials to use to perform the installation, click My current logged on credentials or click Alternate credentials, and then click Set.

In the Windows Security dialog box, provide the user name and password for an account that can install the additional domain controller. To install an additional domain controller, you must be a member of the Enterprise Admins group or the Domain Admins group.

When you are finished providing credentials, click Next. On the Select a Domain page, select the domain of the new domain controller, and then click Next.

On the Select a Site page, select a site from the list or select the option to install the domain controller in the site that corresponds to its IP address, and then click Next. On the Additional Domain Controller Options page, make the following selections, and then click Next: DNS server: This option is selected by default so that your domain controller can function as a DNS server. If you do not want the domain controller to be a DNS server, clear this option. Global Catalog: This option is selected by default.

It adds the global catalog, read- only directory partitions to the domain controller, and it enables global catalog search functionality. Read-only domain controller. This option is not selected by default.

It makes the additional domain controller read only. If you selected Use advanced mode installation on the Welcome page, the Install from Media page appears. You can provide the location of installation media to be used to create the domain controller and configure AD DS, or you can have all the replication done over the network.

Note that some data will be replicated over the network even if you install from media. If you selected Use advanced mode installation on the Welcome page, the Source Domain Controller page appears. Click Let the wizard choose an appropriate domain controller or click Use this specific domain controller to specify a domain controller that you want to provide as a source for replication to create the new domain controller, and then click Next. If you do not choose to install from media, all data will be replicated from this source domain controller.

Windows Server Backup backs up the directory service by volume. For backup and recovery efficiency, store these files on separate volumes that do not contain applications or other nondirectory files. On the Summary page, review your selections.

Click Back to change any selections, if necessary. To save the settings that you have selected to an answer file that you can use to automate subsequent Active Directory operations, click Export settings. Type the name for your answer file, and then click Save. You can either select the Reboot on completion check box to have the server restart automatically or you can restart the server to complete the AD DS installation when you are prompted to do so.

What is difference safe mode normal mode? Safe mode is a troubleshooting option for Windows that starts your computer in a limited state. Only the basic files and drivers necessary to run Windows are started. In normal mode all basic files and drivers are necessary to run windows. Think about ur college network if three departments where there and and 25 computers in each department and if someone ask u to group the computer s,what will be ccriteria to do that.

What is Firewall and types of firewall?

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria. There are several types of firewall techniques: Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules.

Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Circuit-level gateway: Once the connection has been made, packets can flow between the hosts without further checking.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. What is troubleshooting? To isolate the source of a problem and fix it. What is shadow copy? It is implemented as a Windows service called the Volume Shadow Copy service. How do you check whether Active Directory has been installed properly or not? A web server can be referred to as either the hardware the computer or the software the computer application that helps to deliver content that can be accessed through the Internet.

A web server is what makes it possible to be able to access content like web pages or other data from anywhere as long as it is connected to the internet. Application server is a program that handles all application operations between users and an organization's backend business applications or databases. An application server is typically used for complex transaction-based applications. A database server is a computer program that provides database services to other computer programs or computers, as defined by the client—server model.

In case DHCP fails in your server then how do you satisfy that problem within some minutes? What is the Protocol?

The main difference is that BOOTP was designed for manual pre-configuration of the host information in a server database, while DHCP allows for dynamic allocation of network addresses and configurations to newly attached hosts. How to rename domain name in win server?

To rename a domain controller Open Command Prompt. NewComputerName Restart the computer. From the command prompt, type: To rename a domain controller in a domain that contains a single domain controller Install a Windows Server member server in the domain. On the new server, create an additional domain controller by installing Active Directory.

After Active Directory is installed, enable the global catalog on the new domain controller. Transfer the operations master roles from the domain controller that you want to rename to the new domain controller. Note that you must transfer the roles, do not seize them. Verify that the new domain controller is functioning correctly by doing the following: Verify authentications and global catalog searches. Run Dcdiag. Perform any other appropriate tests to verify that the new domain controller can provide all of the domain functions of the first domain controller.

On the new domain controller, open Command Prompt. Net share In the list that is generated, verify the existence of Sysvol and Netlogon.

Desktop Support Engineer Interview Questions and Answers

Uninstall Active Directory from the domain controller that you want to rename to be a member server. Rename the member server. Install Active Directory on the renamed server to create an additional domain controller. Transfer the operations master roles back to the renamed domain controller. Enable the global catalog on the renamed domain controller. What is Wi-Fi?

What is the latest version? The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. What is mean topology and types of topology? Network topology refers to the way that your computer network is arranged. The network can have a physical or a logical topology. The physical topology describes the layout of computers and where the workstations are positioned.

The logical network topology describes how the information flows through the network.

The different kinds of topology are: The word "bus" refers to the physical line that joins all the machines on the network. The advantages of this topology are that it is easy to implement and functions easily; on the other hand, it is highly vulnerable, since if one of the connections is defective, the whole network is affected.

Star topology In star topology, the network computers are linked to a piece of hardware called a hub. Unlike networks built with bus topology, networks which use star topology are much less vulnerable, as one of the connections can easily be removed by disconnecting it from the hub, without paralyzing the rest of the network.

However, a star topology network is bulkier than a bus network, as additional hardware is required the hub. Ring topology A ring topology is a network topology where each node device on the network connects to two other nodes.

This forms a continuous path for the signal through each device. This works because data travels from node to node device to device. In a ring topology also called a ring network , each node handles the data packets itself, then passes it to the next node, which also handles the packets.

Mesh topology A mesh topology is made up of a network where each device has a point-to-point connection to every other device on the network. This provides the dedicated capacity of a point-to-point link to each device and significant fault tolerance. The tree like structure allows you to have many servers on the network and you can branch out the network in many ways.

This is particularly helpful for colleges, universities and schools so that each of the branches can identify the relevant systems in their own network and yet connect to the big network in some way.

What is a wild card certificate? A wildcard certificate allows you to secure multiple web sites with a single SSL certificate. Wildcard certificates are a service provided under Certificate Management Service.

How many scopes con create in one dhcp? You can configure as many scopes on a DHCP server as is required in your network environment. What is VPN and what are the main advantages? A virtual private network VPN is the extension of a private network that encompasses links across shared or public networks like the Internet.

With a VPN, you can send data between two computers or two networks across a shared or public network in a manner that emulates a point-to-point private link. Virtual private networking is the act of creating and configuring a VPN. What is dhcp? DHCP includes the following features to reduce network administration: What is secured socket layer and what is the requirement of its in networking?

SSL Secure Sockets Layer is the standard security technology for establishing an encrypted link between a web server and a browser.

This link ensures that all data passed between the web server and browsers remain private and integral. Http is hyper text transfer protocol which is responsible for transmitting and receiving information across the Internet where as https is secure http, which is used exchanging confidential information with a server, which needs to be secured in order to prevent unauthorized access.

HTTPS is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. What is Peer to peer Network?

Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data. Peer-to-peer networking also known simply as peer networking differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers. What is the difference between a Virtual Server and a Dedicated Server? A dedicated server is a type of Internet hosting in which the client leases an entire server not shared with anyone.

This is more flexible than shared hosting, as organizations have full control over the server s , including choice of operating system, hardware, etc. A dedicated server could also be a computer that manages printer resources. However, that not all servers are dedicated. In some networks, it is possible for a computer to act as a server and perform other functions as well. In the Web hosting business, a dedicated server is typically a rented service. The user rents the server, software and an Internet connection from the Web host.

A server, usually a Web server, that shares computer resources with other virtual servers. Virtual Web servers are a very popular way of providing low-cost web hosting services. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. In most cases, performance is not affected and each web site behaves as if it is being served by a dedicated server.

If too many virtual servers reside on the same computer, or if one virtual server starts hogging resources, Web pages will be delivered more slowly. What is Antivirus? Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.

What are Cold Boot and Warm Boot? A hard reboot also known as a cold reboot, cold boot or cold start is when power to a computer is abruptly turned off, then turned back on. A soft reboot also known as a warm reboot is restarting a computer under software control, without removing power or directly triggering a reset line.

What is the type of dsl technologies? According to the FCC, the different types of DSL technologies provide transmission speeds ranging from several hundred thousand bits per second to millions of bits per second.

All types of DSL Internet service can be categorized as either asymmetric or symmetric. Asymmetric means that most of the bandwidth is for sending data to the user downloading and only a small amount is available for uploading data.

ADSL requires a splitter at the user's end to split the Internet data signal from the telephone signal. DSL Lite also known as G. Lite is a slower version of ADSL that doesn't require a splitter at the user's end because the splitting happens remotely at the telephone company. Larger businesses often use SDSL.

SHDSL, which is faster and can optimize performance based on telephone line conditions. IDSL runs over a single pair of wires. How to take backup of Outlook Express explain all the steps in detail. To back up Outlook Express items Step 1: Copy message files to a backup folder Step A: Locate the Store folder 1. Start Outlook Express. Click Tools, and then click Options.

On the Maintenance tab, click Store Folder. In the Store Location dialog box, copy the store location. To do this, follow these steps: Put the mouse pointer at one end of the box under the Your personal message store is located in the following folder box. Press and hold the left mouse button, and then drag the mouse pointer across the Your personal message store is located in the following folder box.

Click Cancel, and then click Cancel again to close the dialog box. Step B: Copy the contents of the Store folder 1. On the Edit menu, click Select All.

What is cache memory?

Select the BOOT. INI from the different options. Now a screen with detailed information will be opened from there you can easily edit the BOOT. The main reason of this error is because of the incompatibility of some of the software or the hardware of the OS. These are the main sources from where a virus can infect your OS.

We can prevent our OS by installing a licensed and original Anti-virus which works well on the respected OS. The length of the LAN wire works well up to 80 meters or feet.

If the length of the wire exceeds then the speed will be definitely affected. There can be possibly two reasons for this error to occur: Update service disabled. This type of file is mainly found in bit OS like the 64 bit Windows 7. It is like the system file similar to the system32 file in bit operating OS.

NTLDR is the network loader. This function helps in loading the OS. When this file is missing from the OS then this error occurs. The VPN server is a private server which is widely used by companies, organizations and government bodies for communication purpose and also to communicate privately over the Local or the Public server. Lastly, the questions mentioned above are very tricky and also very important for the interview of a Desktop Support Engineer.

These are a few tips which will help you to prepare before going for the interview:. Before you go to the interview, do a detailed study of all the topics related to the interview and the post you are applying for. Also ,cover a bit on the latest technologies available or launched in the market. Always thoroughly read the resume and do not copy and paste a single thing form anywhere, so that you will always remember the mentioned strengths and weaknesses in the resume. Also ,there will be no mistakes in the resume and everything will be up to date.A quick Google search of the question will reveal all the answers.

These are a few tips which will help you to prepare before going for the interview:. GoodWork Thanks for your post.. What are the Support Tools? Network Time Protocol NTP is a protocol that is used to synchronize computer clock times in a network of computers. What you will do to Make your os as Genuine?

WILFRED from Bremerton
I do like studying docunments longingly . Please check my other posts. I take pleasure in corkball.