Wednesday, April 1, 2015

Desktop Administrator Interview Question


A Desktop Support Engineer is responsible for managing a multi-user computing environment within a local area network (LAN). The responsibilities of a Desktop Support Engineer typically include installing and configuring system hardware and software, upgrading software and performing backup/recovery tasks.
The main responsibilities performed by a Desktop Support Engineer are:
  • * Installation and maintenance of Windows OS
  • * Installation/updating of desktop software
  • * Remote desktop connections
  • * Antivirus support
  • * Create a backup and recovery policy
  • * Desktop performance monitoring and optimization
Before facing any interview for a Desktop Support position, make sure that you have enough knowledge on these technologies:
Basic Network Concepts:
  • * Data communication and transmission techniques
  • * Fundamentals of OSI and TCP/IP model
  • * IP address classes
  • * IP subnetting
  • * IPv6 fundamentals
  • * Basics of switching
Windows Functionalities:
  • * Installing Windows Operating System on desktops
  • * Managing and troubleshooting access to shared folders
  • * Configuring and troubleshooting hardware devices and drivers
  • * Troubleshooting system startup and user login problems
  • * Configuring and troubleshooting remote connections
  • * Configuring and troubleshooting Internet Explorer
  • * Configuring and troubleshooting Outlook Express
  • * Resolving issues related to application customization
  • * Identifying and troubleshooting problems related to security permissions
  • * DHCP
  • * DNS
  • * Scheduling tasks
Top Interview Questions for a Desktop Support Engineer (Microsoft) Position:
All of the questions below are very common and must be prepared for before facing any interview for a Desktop Support or Windows Administration Engineer position.
Q: Which Windows OS are you most comfortable with?
A: This is a very basic question and you can prepare your answer by researching which OS version is used by the company you’re applying in. Be sure to do a little reading on the systems you are familiar with, so you can showcase your skills.
Q: Why do we use DHCP?
A: Dynamic Host Configuration Protocol (DHCP) is used to assign dynamic IP addresses to network devices, allowing them to have a different IP address each time they are connected to the network.
Q: What is DNS and why do we use it on workstations?
A: The Domain Name System (DNS) is used to resolve human-readable hostnames like www.intenseschool.com into machine-readable IP addresses like 69.143.201.22. The DNS address is configured on workstations. Windows redirects all domain names to resolve into IP addresses.
Q: What is a default gateway? What happens if I don’t have one?
A: A default gateway is a routing device used to forward all traffic that is not addressed to a destination within the local network or local subnet. If you don’t have a default gateway, it is not possible to communicate with the network device/host of different networks. Dial-up internet connections do not require a default gateway though because it is present in the ISP itself.
Q: How do I find the path that a packet takes to its destination?
A: Using “tracert” command lets you see the path travelled by a packet to its destination.
Q: What is the use of Safe Mode? When should we use it in Windows?
A: Often, we have to start Windows in Safe Mode in order to remove spyware or for troubleshooting driver problems and other diagnostic purposes. Only specific programs and files with limited driver support are needed to run the operating system. This will allow you to attempt to remove viruses, change bad drivers and perform other diagnostic tasks that cannot be done in Normal Mode.
Q: How do I start in Safe Mode?
A: Method 1: Reboot the computer. Start pressing the F8 key as soon as your system starts to boot. This will open multiple boot options including Safe Mode.
Method 2: Open Run, type “msconfig” and press Enter. A system configuration window will pop up; now go to the Boot tab, check the “Safe boot” box and select “Minimal” for a typical safe boot. Click Apply and your computer will boot into Safe Mode the next time it restarts.
Q: What is the use of the BOOT.ini file?
A: Boot.ini files are required in booting Windows operating systems, starting with Windows NT. The boot.ini file also provides flexibility for dual booting multiple operating systems on the same computer.
Q: How do I edit my Boot.ini?
A: From Windows:
Open Run, type “msconfig” and press Enter to open System Configuration Utility. Select the tab labelled BOOT.INI. Click the button labelled Check All Boot Paths. A dialog box will open detailing the location of any invalid operating system locations.
Q: Which command is used to check IP configuration?
A: You can use ipconfig /all to display all of the current TCP/IP configuration values, including the IP address, subnet mask, default gateway, and Windows Internet Naming Service (WINS) and DNS configurations.
Q: How can I make my hard disk dynamic?
A: Go to Run then type diskmgmt.msc. After that, right click on hard disk to convert a basic disk to dynamic disk.
Note: You should be logged in with an administrator account.
Q: What is the blue screen of death?
A: A Blue Screen error is mainly due to hardware or software incompatibility within the system. The most common reasons for a Blue Screen of Death (BSD) are unwanted software installation, high CPU usage and faulty RAM. Try the following options.
1. Pull out the RAM card, rub it with rubber on the chip side, and re-insert.
2. If a BSD still occurs, try using that RAM on another system.
3. Every BSD has a unique code; try searching it on Google to find a solution.
Q: What are some common sources of computer viruses and how can you prevent being infected?
A: Some common sources are Internet downloads, email attachments, and infected CDs/DVDs. You can use trusted anti-virus software and update it regularly. Make sure it checks every file on the computer. Backup your system periodically in case a major infection occurs, and be aware of all software and programs that run on your computer. Never click a suspicious link or download a suspicious file.
Q: Describe some commonly used LAN cables. What is the maximum length of LAN cable for proper communication?
A: There are mainly two types:
  1. Cat 5 (Category 5 where 5 indicates twists per inch) & Cat 5e (5e indicates 5 twists per inch per pair which leads to reduced cross talk). Both Cat 5 & 5e are UTP cables that can support up to 100 Mbps.
  2. Cat 6 & 6e are UTP cables that can support up to 1 Gbps.
After about 80 meters (260 feet), you will usually see a reduction in speed.
Q: Windows cannot currently check for updates; what could be the possible reasons?
A: There could be two possible reasons:
  1. Missing/corrupted files
  2. Update services down
Method 1: Contact Microsoft: http://support.microsoft.com/mats/windows_update/
Method 2: Please follow the steps below:
a. Go to Run, type “services.msc” without quotes and press Enter.
b. Locate Windows Update.
c. Right click on Service and select Properties.
d. In Start-up type, select Enable.
e. Click Start under Service status.
f. Click OK.
Q: What is the SysWOW64 folder?
A: It is normally found in a 64-bit OS, for example 64bit Win7. This folder is very similar to the system32 folder of the 32-bit OS.
Q: What do you mean by NTLDR Error?
A: NTLDR is known as the Network Loader. It helps in loading the operating system. If any system is showing “NTLDR is missing” then you need to copy the NTLDR file from operating system CD.
The questions above are very tricky and important from the standpoint of clearing any interview for a Desktop Engineer (Microsoft) position. It is not possible for anyone to list every possible question, but you can get more frequently asked interview questions forDesktop Support (Microsoft) Jobs from the download link posted here. If you find any difficulty in answering any questions, ask me below @ the Comments section.
Tips for Preparing for an Interview
  • Study: Before an interview, do a quick recap of relevant technologies.
  • Update resume: Read your resume through; don’t copy and paste anything in it. You must be aware of your strengths and weaknesses.
  • Prepare professional certifications: One of the best ways to prove the technical skills mentioned in your resume is through certifications. This gives a new employer an easy way to understand your knowledge level.
  • Update LinkedIn profile: Update your LinkedIn profile regularly; make sure that your work experience, qualifications, and project details match your resume.

This article is the output of my extensive research and work experience. With this article I hope to help candidates in preparing for an interview for a Desktop Support Engineer position in a Microsoft multi-user computing environment.

1.  What is the difference between Windows XP & Windows 7?

Windows Defender, Parental Control, Windows Touch and Tap instead of point and Click, Multiple
Active Firewall.


2.  One Fine Morning System is not booting up. Explain what would be the problem.
*       2x2 or 2x4 Power Connector Not Plugged In
 
*       Processor Issues
 
*       Memory Issues
 
*       Monitor Issues
 
*       Power Supply and Chassis Issues
 
*       Cable Issues
 
*       Electrical Short or Overload
 
*       Defective Components
 
3.  System No Display. What the steps are to Diagnoses the problem?

Check the monitor is switched on and the power indicator LED of the monitor is glowing. Check the
monitor power connection.

Adjust the contrast/brightness knob of the monitor to maximum.

Check whether the monitor is connected properly to the video adapter of the system.

If your system has add-on video adapter, switch off the system and remove the power.

Check whether the CPU, memory are connected properly to the motherboard.


4.  System is power on, but beep sound occurs. What would be the problem?

One long beep: Memory problem

One long and two short beeps: Video error

One long and three short beeps: Video error

Continuous beeps: Video/memory problem

Other beeps: Check the motherboard manual




5.  Different and NTFS and FAT32.

NTFS
*       Allows access local to w2k w2k3 XP win NT4 with SP4 & later may get access for some file.
 
*       Maximum size of partition is 2 Terabytes & more.
 
*       Maximum File size is up to 16TB.
 
*       File & folder Encryption is possible only in NTFS.
FAT 32
*       Fat 32 Allows access to win 95 98 win millennium win2k xp on local partition.
 
*       Maximum size of partition is up to 2 TB.
 
*       Maximum File size is up to 4 GB.
 
*       File & folder Encryption is not possible.

6.  How will you convert FAT32 to NTFS?

To convert a volume to NTFS from the command prompt

Open Command Prompt.

In the command prompt window, type

convert drive_letter: /fs:ntfs

For example, typing convert D: /fs:ntfs would format drive D: with the ntfs format.


7.  What are primary Partition, Extended Partition and Logical Partition?

A primary partition contains one file system. The first partition (C:) must be a primary partition..

An extended partition is a primary partition which contains secondary partition(s). A hard disk may contain only one extended partition..

Extended partition that is sub divided into many drives is called as Logical partition..


8.  In a computer how many primary partition can be held.

Four Primary partitions can be done...

9.  Difference between Microsoft outlook and Outlook Express.

Microsoft Outlook:
*       Files will be saved in .PST Format.
 
*       Have some Additional Features like Address Book, Contacts, and Remainderetc...
 
*       Not a free product have to purchase it..
 
Outlook Express:
*       Files will be saved in .DBX Format.
 
*       Don’t have any additional features.
 
*       Free product that comes along with the OS Installation.
 
10.  What is Virus?

Vital Information Resource under Seige.It is an executable Program which Performs Malicious activities in the system.

11.  What is Antivirus?

An Antivirus Is a Software that protects the system from Virus Attack..

12.  What is the difference between Delete and Quarantine in Action methodology for Virus Scanning?

Delete will delete all the virus infected files and Quarantine create a copy from an infected file and produce a new one..

13.  What are the procedures for cleaning an infected virus system?

Unplug the system from the Network if it is in a Network & Scan the System with the Updated Antivirus..

14.  What is SMTP Protocol? What is the port Number used by SMTP?

Simple Mail Transfer Protocol which performs all outgoing Mail. The port number is 25.

15.  What is POP3 Protocol? What is the port Number used by POP3?

Post Office Protocol which performs all incoming mails. The Port number is 110.

16.  Tell me the procedure for Backup and Restore Mail in Outlook Express.

Go to C:\Documents & Setting\User Profile\Application Data\Local Settings\Identities\Outlook Express & Copy the .DBX files and Save it in another location as a Backup. Copy the files from the location that was saved as a Backup & Go to the same path &  Paste it.

17.  Tell me the Procedure for Backup and Restore Mail in Microsoft Express.

Go to C:\Documents & Setting\User Profile\Application Data\Local Settings\Microsoft \Outlook Express & Copy the .PST files and Save it in another location as a Backup..

Copy the files from the location that was saved as a Backup & Go to the same path & Paste it.


18.  How will you repair a PST Files?

Using scanpst.exe files

19.  How to set Password for PST Files?
*       Select Go | Folder List from the menu.
 
*       Click on the root item of the desired PST file with the right mouse button.
 
*       If you want to protect only certain email folders with a password, you can move them to a newly created PST file and assign a password only for that file.
 
*       Select Properties for... from the menu.
 
*       Click Advanced....
 
*       Now click Change Password....
 
*       Enter the desired password under both New password: and Verify password:.
 
*       If a password had already been set for the PST file, enter that phrase under Old password:.
 
*       If you assign a password to a previously unprotected PST file, leave the Old password: field blank.
 
*       To remove the password from a PST file, enter it under Old password: and leave both New password: and Verify password: blank.
 
*       Click OK.
 
*       Click OK again.
 
*       Now click Cancel.
 
20.  How to set store a mail copy in Server for 30 days while configuring mail in Microsoft outlook?

Go to Outlook 2007's Tools, Account Settings, and With the Account Settings dialog open, select the account and click Change, then click More Settings. Look on the Advanced tab..

21.  How to set Rules in Microsoft outlook in order to organize mailbox?

Open Microsoft Outlook.
*       Click Tools.
 
*       Click Rules Wizard.
 
*       Click the New button and run through the wizard..
 
22.  Explain about Junk Mail option in outlook.

Low. This level is designed to catch only the most obvious junk e-mail messages. You can make the filter more aggressive, but if you do it may catch legitimate messages sometimes. Any message that is caught by the Junk E-mail Filter is moved to a special Junk E-mail folder. You should review messages in the Junk E-mail folder from time to time to make sure that they are not legitimate messages that you want to see.

23.  Explain about Registry?

This is a database used by Microsoft Windows to store configuration information about the software installed on a computer. This information includes things like the desktop background, program settings, and file extension associations.

24.  How to backup and Restore Registry?

Import and Export from regedit.

25.  When system booting “NTLDR file Missing” Error. What would be the solution?

Boot the System from the OS cd and Select Repair Option

26.  When XP is booting up system gets restart automatically. What would be the solution?

May be RAM problem so replace it...
Virus would have affected..


27.  Explain about Windows Firewall?

Firewall Restricts the System from Unwanted Traffic.

28.  Difference between Administrators and Power Users?

Members of the Administrator group have total control over the computer and everything on it. The user named Administrator is the default account within this group

The Power User class can perform any task except for those reserved for Administrators. They are allowed to carry out functions that will not directly affect the operating system or risk security


29.  What is Service Pack? Is it needed to be installed in all the system?

A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.
Yes it should be installed in all the systems.


30.  What is Device Drivers? Why it is needed?

A device driver is a program that controls a particular type of device that is attached to your computer. There are device drivers for printers, displays, CD-ROM readers, diskette drives, and so on

31.  Explain about Local Printer and Network Printer?

A network printer is shared by more than one computer using the IP Address that is assigned to the printer.
A local printer is directly connected to one computer & shared using sharing & security


32.  Explain detail how to install a Network Printer?

To install the printer using an IP address, go to Start>Control Panel>Printers and Faxes and then click the Add Printer icon. Next, click Create a new port, then select Standard TCP/IP Port from the drop-down menu. You will then be asked to enter an IP address. Enter the IP address of the print server and click Next. You will be asked to select the printer manufacturer and the model from the list. If you do not see your printer listed, insert the disk that came with the printer and click Have Disk.
If you do not know the IP address of the printer, you can sometime select Browse for printer in the beginning of the process. If the networked printer is attached to another computer is being shared, you will need to enter the name of the computer followed by the share name of the printer. For example: \\computername\printername.


33.  How does virus get loaded into computer?

Through Exe Files, Pen drive, CD, E-mail, Internet Etc...

34.  What is Boot Process in a computer?

First is the POST, this stands for Power On Self-Test, for the computer. This process tests memory as well as a number of other subsystems. You can usually monitor this as it runs each test. After that is complete the system will run POST for any device that has BIOS (Basic Input-Output System).


35.  What is the difference between RAM & ROM?

RAM – Random Access Memory which is called as Temporary Memory..
ROM- Read Only Memory which stores the data Permanently.


36.  What is Cache Memory?

Cache memory is fast memory that is used to hold the most recently accessed data in slower main memory. The idea is that frequently accessed data will stay in cache, which allows the CPU to access it more quickly, which means it doesn't have to wait for the data to arrive.

37.  What is the difference between Primary Storage and Secondary Storage?

Usually the primary storage is a hard drive(s). Secondary is a flash drive(s), cd and so on. But nowadays, it's mostly a game of words.

The primary memory of CPU is the place where computer program and data is stored during processing. this storage unite is often called either main memory or primary memory..

There is usually two types primary memory

1. RAM 2:.ROM
The devices of computer that store information such as software and data permanently are called secondary storage device.

There are many types of secondary storage devices such as ,magneticdisk, Hard disk floppy disk , CD Rom , magnetic tape etc...


38.  How to increase or set virtual memory in Window XP?
*       Click Start, and then click Control Panel.
 
*       ClickPerformance and Maintenance, and then click System.
 
*       On the Advanced tab, under Performance, click Settings.
 
*       On the Advanced tab, under Virtual memory, click Change.
 
*       UnderDrive [Volume Label], click the drive that contains the paging file that you want to change.
 
*       UnderPaging file size for selected drive, click to Custom size check box. You can enter the amount of memory you would like to reserve for Virtual memory by entering the initial and maximum size.  ClickSet
 
39.  What are the advantages of having SATA HDD over PATA HDD?

SATA HDD uses different channel for incoming and outgoing traffic. Wherelse PATA HDD uses same Channel for incoming and outgoing traffic.

40.  What are Bidirectional and Unidirectional Bus?

The address bus (sometimes called the memory bus) transports memory addresses which the processor wants to access in order to read or write data. It is a unidirectional bus.
The data bus transfers instructions coming from or going to the processor. It is a bidirectional bus.


41.  How does the browser know to go to a certain IP address when you enter a domain like google.com?

Whenever an address is typed on the browser it immediately connects with the DNS.This DNS Finds the IP address related to the Domain & connects with the Server & the requested web page will be displayed.


42.  What’s the difference between L1 and L2 cache?

Short for Level 1 cache, a memory cache built into the microprocessor.

Short for Level 2 cache, cache memory that is external to the microprocessor. In general, L2 cache memory, also called the secondary cache, resides on a separate chip from the microprocessor chip.


43.  What is BIOS? How to clear password for BIOS?

BIOS or Basic Input/output System is the first program accessed by the processor during start up to ensure that all the other basic programs, hard drives, ports, peripherals and the central processing unit are in good working condition.
In order to clear the password for BIOS Just Remove the CMOS Battery & Insert it again after Sometime or Change the Jumper Settings.


44.  What difference between original motherboard & chipset motherboard?

A chipset is a group of microchips designed to work as a unit in performing one or more related functions.
They are chip or chips on a motherboard containing various functions supporting the CPU.

Motherboard is the "heart" of your PC -- it handles system resources (IRQ lines, DMA channels, I/O locations), as well as core components like the CPU, and all system memory. It accepts expansion devices such as sound and network cards, and modems. The main printed circuit board in a computer that carries the system buses. It is equipped with sockets to which all processors, memory modules, plug-in cards, daughterboard, or peripheral devices are connected.


45.  What is the SMPS? Explain about its output voltage?

Switch Mode Power Supply is an electronic power supply Unit that incorporates a switching regulator in order to provide the required output voltage


46.  What is Power Good Signal? Explain its functionality.

In addition to the voltages and currents that a computer needs to operate, power supplies also provide a signal called the Power-Good signal, sometimes written as Power_OK or Power Good or you can distinguish it by its gray color. Its purpose is to tell the computer all is well with the power supply and that the computer can continue to operate normally. If the Power-Good signal is not present at startup, the CPU is held in reset state. If a Power-Good signal goes down during operation the CPU will shutdown. The Power-Good signal prevents the computer from attempting to operate on improper voltages and damaging itself.

47.  What is the difference between AGP and PCI graphics cards?

AGP stands for 'Accelerated Graphics Port’ the speed at which the AGP bus transfers data to and from the video card was too Fast.
PCI stands for 'Peripheral Component Interconnect’ the speed at which the PCI bus transfers data to and from the video card was too Slow.


48.  While Installing Windows XP File Missing Error Occurs. What would be the Problem?

If you are attempting to boot from a CD-ROM and are receiving this error message it is likely that the diskette does not have all the necessary files and/or is corrupt.

49.  What is Defragmentation? Why it’s needed?

Defragmentation is a process that reduces the amount of fragmentation in file systems. It does this by physically organizing the contents of the disk to store the pieces of each file close together and contiguously.


50.  One fine morning system is not able to login into domain. What could be the problem?

May be Network problem.

Password would have expired.

May be some restriction policy applied.


51.  In a workgroup environment how many system can access a shared folder simultaneously.

10 Systems

52.  What is command to view computer name?

Ipconfig /all or hostname


53.  Explain Ping command in detail.

Packet Internet Gopher is a simple command line network tool that you can use to verify your connectivity to a network.


54.  What would the problem if system gets restarted frequently?

RAM problem, Virus Attack, Dust in processor FAN.


55.  What would the problem if the system gets hanged off?

RAM problem,OS Corrupt,Virus Attack,Hard Disk Problem.


56.  What could be the problem if hard disk gets in problem?

Disk boot failure, Hard Disk not detected, CableProblem, BlueScreen, No power supply, Bad Sectors.


57.  What is msconfig? Why it is used?

Microsoft System Configuration Utility is a utility to troubleshoot the Windows startup process.


58.  What is Remote Desktop? Why it is used?

Remote Desktop is used to take another network system remotely Remote desktop allows you to control the desktop and, indeed, the entire contents of a computer from another machine entirely


59.  How to run legacy application in windows xp?

In both XP , right click on the executable of the application you wish to run.
Select "Properties".

Select the "Compatibility" tab on the "Properties" dialogue box.

There will be a number of options. Choose "Windows 95 or 98 compatibility mode"


60.  What is the command to shutdown and restart the computer?

Shutdown –s –t 00


61.  What is system restore? Why it is used?

System Restore helps you restore your computer's system files to an earlier point in time. It's a way to undo system changes to your computer without affecting your personal files, such as e­mail, documents, or photos.
62. What is Ghost?   
Ghost is a software product from Symantec that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media, automatically formatting and partitioning the target disk. This product is especially useful where one system is to be replicated on a number of computers or when someone wants to back up everything on their personal computer.
63. Difference between Public and Private IP?
Check systemadministrator.in Website
64. Difference between Windows Vista and Windows 7?
Check systemadministrator.in Website
65. Difference between Core2duo and Dual Core Processor?
Check systemadministrator.in Website
66. Difference between Core i3, Core i5 & Core i7?
Check systemadministrator.in Website
67. How will you deploy Windows XP or Windows 7 in 100 Computers simultaneously? 
Using SCCM (System Center Configuration Manager), MDT (Microsoft Deployment Toolkit), WDS (Windows Deployment Services) tools
68. How will update patches or Service pack in multiple computers?
Using WSUS (Windows Software Update Service) tool.
69. Which are the tools you use for remote support?
Dame Ware, Remote Assistance, Remote Desktop, Ammy Admin
70. What is bitlocker?
BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2.
71. What are Host & LMHosts Files?
Host File: Windows Internet Explorer is set to automatically take instructions from a special file that can be found as part of the default installation of the Operating system.Windows XP it is in C:\WINDOWS\SYSTEM32\DRIVERS\etc
LMHOSTS:LMHOSTS file is for LAN Manager name resolution with the TCP/IP protocol. The file is similar in format to the HOSTS file, but its function is to resolve IP addresses for a server that is not on the local subnet (the same wire)
72. Difference between 32 bit and 64bit OS Versions?
73. What are Ping and Traceroute?
Ping is a program that sends a series of packets over a network or the Internet to a specific computer in order to generate a response from that computer.Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer. It also calculates and displays the amount of time each hop took.
74. How can recover a file encrypted using EFS?
Use Domain Recovery Agents
75. What is telnet?
Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the Internet).
76. What is VPN?
A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network
77. Difference between Hub and Switch?
78. How will you fine tune OS?
Clean tmp Files, Run Defragmentation, Run Scan Disk, Disk Cleanup, Check for Antivirus, Increase system virtual memory,
79. Difference between Safe and Normal mode?

Safe mode is an alternate boot method for Windows operating systems that makes it easier to diagnose problems. The only startup programs loaded are the operating system and drivers for the mouse, keyboard, and display modes display.


No comments:

Post a Comment