Our Vision

We believe in ourselves, we are professional and do what we say we will do.

Our Mission

We strive to add value to our customers to our company and to our profession.

Our Values

We work as a team to provide Quick response with Friendly and supportive team and low cost service to make our customers happy.

Our Values

We respect our customers and each other and conduct with fairness and integrity.

Our Values

We honor what we do, value friendship and family, celebrate success and have fun

Showing posts with label Job Interview and Ideas. Show all posts
Showing posts with label Job Interview and Ideas. Show all posts

Monday, January 29, 2018

Group Policy Interview Questions and Answers for Windows Administrator

What are group policies?
Group policies specify how programs, network resources, and the operating system work for users and computers in an organization. They are collections of user and computer configuration settings that are applied on the users and computers (not on groups). For better administration of group policies in the Windows environment, the group policy objects (GPOs) are used.

What is GPO?
Group policy object (GPO) is a collection of group policy settings. It can be created using a Windows utility known as the Group Policy snap-in. GPO affects the user and computer accounts located in sites, domains, and organizational units (OUs). The Windows 2000/2003 operating systems support two types of GPOs, local and non-local (Active Directory-based) GPOs.

What is Local GPOs/policy?
Local GPOs are used to control policies on a local server running Windows 2000/2003 Server. On each Windows  server, a local GPO is stored. The local GPO affects only the computer on which it is stored. By default, only Security Settings nodes are configured. The rest of the settings are either disabled or not enabled. The local GPO is stored in the %systemroot%SYSTEM32GROUPPOLICY folder.

What is Non-local Policy?
Non-local GPOs are used to control policies on an Active Directory-based network. A Windows  server needs to be configured as a domain controller on the network to use a non-local GPO. The non-local GPOs must be linked to a site, domain, or organizational unit (OU) to apply group policies to the user or computer objects. The non-local GPOs are stored in %systemroot%SYSVOLPOLICIESADM, where is the GPO’s globally unique identifier. Two non-local GPOs are created by default when the Active Directory is installed:
1. Default Domain Policy: This GPO is linked to the domain and it affects all users and computers in the domain.
2. Default Domain Controllers Policy: This GPO is linked to the Domain Controllers OU and it affects all domain controllers placed in this OU.
Multiple GPOs

GPO Apply order
When multiple group policy objects are assigned, the group policies are applied in the following order:
• The local group policy object is applied first
• Then, the group policy objects linked to sites are applied
If multiple GPOs exist for a site, they are applied in the order specified by an administrator
• GPOs linked to the domains are applied in the specified order
• Finally, GPOs linked to OUs are applied
The OU group policy objects are set from the largest to the smallest organizational unit, i.e., first the parent OU and then the child OU.
By default, a policy applied later overwrites a policy that was applied earlier. Hence, the settings in a child OU can override the settings in the parent OU
Group policy settings are cumulative if they are compatible with each other. In case they conflict with each other, the GPO processed later takes precedence.

What is No Override? Block Policy Inheritance?
The following are the exceptions with regard to the above-mentioned settings:
 No Override:
Any GPO can be set to No Override. If the No Override configuration is set to a GPO, no policy configured in the GPO can be overridden. If more than one GPO has been set to No Override, then the one that is the highest in the Active Directory hierarchy takes precedence
Block Policy Inheritance:
The Block Policy Inheritance option can be applied to the site, domain, or OU. It deflects all group policy settings that reach the site, domain, or OU from the object higher in the hierarchy. However, the GPOs configured with the No Override option are always applied
What is Loopback policy?

Is group policy from Parent Domain cab be inherited to child Domain?
Group Policy Inheritance
The group policies are inherited from parent to child within a domain. They are not inherited from parent domain to child domain

Following are the rules regarding group policy inheritance:
A policy setting is configured (Enabled or Disabled) for a parent OU, and the same policy setting is not configured for its child OUs. The child OUs inherit the parent’s policy
A policy setting is configured (Enabled or Disabled) for a parent OU, and the same policy setting is configured for its child OUs. The child OUs settings override the settings inherited from the parent’s OU
If any policy is not configured, no inheritance takes place
Compatible policy settings configured at the parent and child OUs are accumulated
Incompatible policy settings from the parent OU are not inherited
What is security filtering? Filtering Scope of GPOs
Although GPOs are linked to the site, domain, or OUs, and they cannot be linked to the security groups directly, applying permissions to the GPO can filter its scope. The policies in a non-local GPO apply only to users who have the Read and Apply Group Policy permissions set to Allow
By specifying appropriate permissions to the security groups, the administrators can filter a GPO’s scope for the computers and users

What Tools used to edit the Group policy?
GPMC and GPedit
How to check applied policy details from Client or server?
RSOP.msc (only works windows 2003 and above)
GPRESULT /v
What is .adm file?
Administrative Template are  required because Microsoft did not include all Registry settings in the default Group Policy, if you want to add more customized setting to existing policy then .ADM file can be created and imported to get the necessary setting

AD Active Directory Interview Questions and Answers

What is Active Directory?

Active Directory (AD) is a directory service developed by Microsoft and used to store objects like User, Computer, printer, Network information, It facilitate to manage your network effectively with multiple Domain Controllers in different location with AD database, able to manage/change AD from any Domain Controllers and this will be replicated to all other DC’s, centralized Administration with multiple geographical location and authenticates users and computers in a Windows domain

What is LDAP and how the LDAP been used on Active Directory(AD)?

What is Tree?
Tree is a hierarchical arrangement of windows Domain that share a contiguous name space

What is Domain?
Active Directory Domain Services is Microsoft’s Directory Server. It provides authentication and authorization mechanisms as well as a framework within which other related services can be deployed

What is Active Directory Domain Controller (DC)?
Domain Controller is the server which holds the AD database, All AD changes get replicated to other DC and vise vase

What is Forest?
Forest consists of multiple Domains trees. The Domain trees in a forest do not form a contiguous name space however share a common schema and global catalog (GC)

What is Schema?
Active directory schema is the set of definitions that define the kinds of object and the type of information about those objects that can be stored in Active Directory
Active directory schema is Collection of object class and there attributes
Object Class = User
Attributes = first name, last name, email, and others

Can we restore a schema partition?


Tel me about the FSMO roles?
Schema Master
Domain Naming Master
Infrastructure Master
RID Master
PDC
Schema Master and Domain Naming Master are forest wide role and only available one on each Forest, Other roles are Domain wide and one for each Domain
AD replication is multi master replication and change can be done in any Domain Controller and will get replicated to others Domain Controllers, except above file roles, this will be flexible single master operations (FSMO), these changes only be done on dedicated Domain Controller so it’s single master replication

How to check which server holds which role?
Netdom query FSMO

Which FSMO role is the most important? And why?
Interesting question which role is most important out of 5 FSMO roles or if one role fails that will impact the end-user immediately
Most armature administrators pick the Schema master role, not sure why maybe they though Schema is very critical to run the Active Directory
Correct answer is PDC, now the next question why? Will explain role by role what happens when a FSMO role holder fails to find the answer

Schema Master – Schema Master needed to update the Schema, we don’t update the schema daily right, when will update the Schema? While the time of operating system migration, installing new Exchange version and any other application which requires extending the schema
So if are Schema Master Server is not available, we can’t able to update the schema and no way this will going to affect the Active Directory operation and the end-user
Schema Master needs to be online and ready to make a schema change, we can plan and have more time to bring back the Schema Master Server

Domain Naming Master – Domain Naming Master required to creating a new Domain and creating an application partition, Like Schema Master we don’t cerate Domain and application partition frequently
So if are Domain Naming Master Server is not available, we can’t able to create a new Domain and application partition, it may not affect the user, user event didn’t aware Domain Naming Master Server is down

Infrastructure Master – Infrastructure Master updates the cross domain updates, what really updates between Domains? Whenever user login to Domain the TGT has been created with the list of access user got through group membership (user group membership details) it also contain the user membership details from trusted domain, Infrastructure Master keep this information up-to-date, it update reference information every 2 days by comparing its data with the Global Catalog (that’s why we don’t keep Infrastructure Master and GC in same server)
In a single Domain and single Forest environment there is no impact if the Infrastructure Master server is down
In a Multi Domain and Forest environment, there will be impact and we have enough time to fix the issue before it affect the end-user

RID Master –Every DC is initially issued 500 RID’s from RID Master Server.  RID’s are used to create a new object on Active Directory, all new objects are created with Security ID (SID) and RID is the last part of a SID. The RID uniquely identifies a security principal relative to the local or domain security authority that issued the SID
When it gets down to 250 (50%) it requests a second pool of RID’s from the RID master.  If RID 

Master Server is not available the RID pools unable to be issued to DC’s and DC’s are only able to create a new object depends on the available RID’s, every DC has anywhere between 250 and 750 RIDs available, so no immediate impact

PDC – PDC required for Time sync, user login, password changes and Trust, now you know why the PDC is important FSMO role holder to get back online, PDC role will impact the end-user immediately and we need to recover ASAP
The PDC emulator Primary Domain Controller for backwards compatibility and it’s responsible for time synchronizing within a domain, also the password master. Any password change is replicated to the PDC emulator ASAP. If a logon request fails due to a bad password the logon request is passed to the PDC emulator to check the password before rejecting the login request.

Tel me about Active Directory Database and list the Active Directory Database files?
NTDS.DIT
EDB.Log
EDB.Che
Res1.log and Res2.log
All AD changes didn’t write directly to NTDS.DIT database file, first write to EDB.Log and from log file to database, EDB.Che used to track the database update from log file, to know what changes are copied to database file.
NTDS.DIT: NTDS.DIT is the AD database and store all AD objects, Default location is the %system root%\nrds\nrds.dit, Active Directory database engine is the extensible storage engine which us based on the Jet database
EDB.Log: EDB.Log is the transaction log file when EDB.Log is full, it is renamed to EDB Num.log where num is the increasing number starting from 1, like EDB1.Log
EDB.Che: EDB.Che is the checkpoint file used to trace the data not yet written to database file this indicate the starting point from which data is to be recovered from the log file in case if failure
Res1.log and Res2.log:  Res is reserved transaction log file which provide the transaction log file enough time to shutdown if the disk didn’t have enough space

Active Directory restores types?
Authoritative restore
Non-authoritative restore

Non-authoritative restore of Active Directory
Non-authoritative restore is restore the domain controller to its state at the time of backup, and allows normal replication to overwrite restored domain controller with any changes that have occurred after the backup. After system state restore, domain controller queries its replication partners and get the changes after backup date, to ensure that the domain controller has an accurate and updated copy of the Active Directory database.
Non-authoritative restore is the default method for restoring Active Directory, just a restore of system state is non-authoritative restore and mostly we use this for Active Directory data loss or corruption.

How perform a non-authoritative restore?
Just start the domain controller in Directory Services Restore Mode and perform system state restore from backup

Authoritative restore of Active Directory
An authoritative restore is next step of the non-authoritative restore process. We have do non-authoritative restore before you can perform an authoritative restore. The main difference is that an authoritative restore has the ability to increment the version number of the attributes of all objects or an individual object in an entire directory, this will make it authoritative restore an object in the directory. This can be used to restore a single deleted user/group and event an entire OU.
In a non-authoritative restore, after a domain controller is back online, it will contact its replication partners to determine any changes since the time of the last backup. However the version number of the object attributes that you want to be authoritative will be higher than the existing version numbers of the attribute, the object on the restored domain controller will appear to be more recent and therefore, restored object will be replicated to other domain controllers in the Domain

How perform a authoritative restore?
Unlike a non-authoritative restore, an authoritative restores need to Ntdsutil.exe to increment the version number of the object attributes

What are Active Directory Partitions can be restored?
You can authoritatively restore only objects from configuration and domain partition. Authoritative restores of schema-naming contexts are not supported.

How many domain controllers need to back up? Or which domain controllers to back up?
Minimum requirement is to back up two domain controllers in each domain, one should be an operations master role holder DC, no need to backup RID Master (relative ID) because RID master should not be restored

Tuesday, January 7, 2014

Job interview - reducing anxiety

 
Many of us find job interviews to be anxiety inducing events. For some, this is a real problem as it creates nervousness, the interviewee can stammer through the answers, and get so worked up that they quite simply fail the interview (even before they have started). If you have a job interview coming up, there are many tools to use that will help put your mind at ease, and keep you focused.

Prepare and take notes in with you

Those who take a file and interview notes with them into interview will benefit from an increased feeling of confidence. Remember, taking notes into an interview isn't frowned upon - it's a smart way of preparing for a meeting. Having notes will give you an instant boast of confidence, a support mechanism, and will also ensure that you are much better equipped for each stage of the interview.

Prepare for the interview

Complete research into the company, its market, competitors and what the job you are applying for entails. Try to obtain a full job description from the recruiting manager prior to the interview. Prepare your file one or two days before the interview (giving yourself plenty of time). Ensure you include a copy of your resume, job description, supporting documentation and notes. Know that you will need to sell you skills, and ensure you have these skills noted mentally or physically on paper. Remember, the more preparation you do, the more confident and calm you will be on the day.

Try to relax, it's only an interview

An interview is merely a way for two people to determine if they will be a good match for each other, and the job interview is just a sharing of information. It's also as much about you interviewing them, as it is about them interviewing you. Try not to lose site of this point.

It's so important that you don't worry about your personality, and how you are coming across. Stick to you interview plan and interview notes.


Tips Tricks to reduce physical and emotional stress

  • Practice simple breathing techniques;
  • If possible, undertake 30 minutes worth of excercise in the morning (but no less than 2 hours before the interview);
  • Listen to relaxing music and calm yourself;
  • Do not smoke or drink caffeine for at least 2 hours before;
  • Make constructive conversation with friends;
  • If you feel yourself getting tense in the interview, be conscious of this and try to relax your shoulders.

And finally...

Try to learn from each interview. Ask for feedback and try to adjust your style to suit a wider audience. If you still feel interview nerves is a weakness, then try to seek professional help from a trained advisor. It will be money well spent.

Job Interview Tips - What Not to Say in a Job Interview

 
Interviewing for any job can create stress, and for some, can result in a lack of good judgment when it comes to what to talk about. Many interviewees with good intentions, can end up saying things that are inappropriate or inaccurate, which ultimately costs them the job.  

  • Do not speak negatively about your past employer or organisation. If asked why you are leaving or why you left, simply say that you are looking for a new opportunity. Talking badly about your former boss, company or co-workers will come across as negative.

  • If you are uncomfortable about providing private and /or sensitive information about your current employer (such as financials), avoid a negative response by saying “I’m not sure my company would like me to disclose that information". Ideally, if talking about financials, you can use a range instead of exact amounts. For example, company turnover being $35Mil, then you can provide a range of "$30Mil to $40Mil". This is a more helpful strategy.
  • Avoid discussing salary until the interviewer brings it up. Typically, this will come up after you have been offered the position, or at the end of the interview. Immediately asking “How much will I get paid?” or asking "When is the next pay rise" could have the interviewer believing that money is a number one factor.

  • Do not say anything that is not true about your past work history. The interviewer will most likely cross reference your past jobs,so you will eventually get caught out and lose the job. Always be honest about your experiences, history and abilities. If the interviewer asks why you were fired from a job, be forthcoming but explain how you have learned from the mistake. Never lie and say that you left of your own accord, if indeed you were released.

  • Do not interrupt the interviewer. Always let them lead the conversation and set the pace of  the interview. If you interrupt or try to lead, you will come across as pushy and someone who doesn't demonstrate good listening skills. Stop yourself from over talking!

  •  In an interview, you want to remain professional, yet friendly. But don't get too friendly and share too many details. Keep your answers simple, concise and to the point so that you avoid babbling on unnecessarily and giving away personal information. Always remember, this is an interview!

Job interview - Questions to Ask



It's important to ask questions in an interview. These should be questions to clarify job specifics through to key points of interest which will enable you to determine whether this is the right job, employer and culture fit for you.



  • What are the most important skills and characteristics your
  • What made you decide to join the company? (providing they don't own the business!)
  • What has been the pattern of growth for the company over the past 5 years
  • What is the future growth plan of the company?
  • Why is this job open?
  • How many people held this position over the recent years?
  • How does this position fit into the overall organisation?
  • Who will I be reporting to
  • Where is the job located by way of company structure?
  • What type of training is required for this position? How long is the training period?
  • What other training opportunities are provided?
  • Where are the greatest opportunities for growth within the company?
  • Who are the company's major competitors?
  • Who are your major customers? Are they mostly local, regional or global
  • What will my priorities be? What will be my first assignment?
  • What issues/challenges am I likely to face when I first take on the role?



Remember: write some questions down before interview and during the interview. Don't try to leave everything to memory. It's also down to you to have the confidence to ask the questions, and to ask question that you feel will be relevant in helping you make your decision. It's a two way process where both you and the interviewer need to know more.

Thursday, September 20, 2012

Desktop Support Interview Questions


Here is some sample Questions that will give you some idea of Desktop support job role and expertise that you required:

Q:Tell me something about yourself.    
Tell about your education, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.

1) What is Active Directory?       
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administrator users, computers and printers in the network from active directory.    

2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records? 
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.

Forward lookup: Converting names to IP address is called forward lookup.

Reverse lookup: Resolving IP address to names is called reverse lookup.

'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.

'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.


3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.

Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.

Superscope: When we combine two or more scopes together its called super scope.

4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.

5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?      
The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in speed.

6) What would you use to connect two computers without using switches?
Cross cable.   

7) What is IPCONFIG command? Why it is used?       
IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.     

8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?     
When DHCP server is not available the Windows client computer assigns an automatic IP address to itself so that it can communicate with the network computers. This ip address is called APIPA. ITs in the range of 169.254.X.X. APIPA stands for Automatic private IP addressing.         


 9) What is a DOMAIN? What is the difference between a domain and a workgroup?
Domain is created when we install Active Directory. ITs a security boundary which is used to manage computers inside the boundary.    

Domain can be used to centrally administer computers and we can govern them using commo policies called group policies. We can't do the same with workgroup.

10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003.
http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp


11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?          
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.   

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?     
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "Last known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problems with one of the devices or drivers.


13) What is RIS?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS.


What is Imaging/ghosting?   Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or imaging/ghosting because installing OS every time using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.  


14) What is VPN and how to configure it?      
A VPN, or Virtual Private Network, is just a network of computers that are all connected securely even though they’re in different locations and all using different connection methods. The biggest benefit to a VPN is that all of the computers on one are securely connected to one another and their traffic encrypted and kept away from prying eyes. Another great benefit to a VPN is that all of the computers on one are effectively on the same network, meaning they can communicate as if they were right next to one another, plugged in to the same router. VPN can be configured using the steps mentioned in the KB: http://support.microsoft.com/kb/305550
Setting up VPN in windows 7 : http://www.wikihow.com/Configure-a-VPN


15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?          
Update the network card driver.    

16) Your system is infected with Virus? How to recover the data?
Install another system. Install the OS with the latets patches, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.

17) How to join a system to the domain? What type of user can add a system to the domain?       

Adding a Computer to an Active Directory Domain is not hard by any means, but there are 3 things you should always remember:
  • Rename the machine to a user friendly, recognizable name before adding it to the Domain.
  • Make sure your DNS settings are pointing to the correct DNS Server for the domain.
  • You have to have access to a Domain account that is part of the Domain Admins security group.
http://www.howtogeek.com/99381/it-how-to-join-machines-to-your-active-directory-domain/ 

18) What is the difference between a switch and a hub?  
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.    

19) What is a router? Why we use it?  
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.

20) What are manageable and non manageable switches?           
Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable switches we can't do so.

21) What is bootloader?
Answer: Boot loader facilitates loading of operating system on the system. It enables the booting process and gives OS options to the user while starting the system. 

22) Which is better - Windows 7 or Windows XP? Support your answers with examples.
Answer: Windows 7 boasts of better features and is recommended over Windows XP. The looks and graphics of windows 7 are impressive and features better secured system. It is better equipped to defend virus and malware attacks. Speech recognitions, backup and restore functions, application compatibility, quick installation, etc., are some of the features that give advantage to Windows 7 than windows XP. 

23) How to recover files if the system detects virus?
Answer: Firstly, install another operating system with latest patches and upgraded antivirus protection. Now, connect the main infected hard disk to the system. Run the antivirus and scan the secondary HDD. Once the hard disk is cleaned, copy the files to another system. 

24) Differentiate between firewall and proxy server
Answer: Firewall is used to protect the internal IT infrastructure from hackers. Proxy servers allow sharing internet connections and protecting IP addresses. Firewall is a networking based technology and proxy server is an application based technology. 

25) What measures are taken to improve the security of the desktop system?
Answer: First step is to install and upgrade the anti-virus for the system. Secondly, ask all users to not give out or write down passwords, include special characters, and it must be at least 8 characters long. Thirdly, for desktop security, ensure the screen is locked and password secured during the day, and logged off during the night. 

Situational Questions
These questions are based on a situation that requires actions from your side. Since your profile is of a desktop support, you are required to constantly answer queries. There are several situations that require your assistance. We have listed a few as examples.
  1. What steps will you follow if you have to install same operating system on over 70 computers at the same time?
  2. Describe the process for adding a new user to a network of 15 computers?
  3. How would you retrieve passwords if one of the users have forgotten their password and can no longer access their official account?
  4. How would you resolve a problem if the complainant says that whenever she tries to use internet explorer, the page does not load and instead gives a prompt, 'virus detected'?
  5. Give example of an instance where you have explained a complex technical term or procedure to a layman? Which examples you gave to solve their queries?
While answering these questions, give a step-by-step analysis of the method to resolve the problem. Use simple language that even a layman can understand. Try to give instances from your work experience in support of your answer. Refrain from using a typical answer. Customize it as per the given problem and work nature. 

These were some examples of technical questions. Besides these, they may be asked certain personal questions too. It includes introspective questions like strengths, weaknesses, ambitions, goals, etc. These questions are asked with the objective of finding more about the personality and capability of the candidate.

Interview is your one chance at success. Candidates have to give their best to make most of this one chance. Hence, we suggest candidates to participate in mock interviews and practice interview questions. You can study these answers or make your own as per your experience. Feel free to utilize these desktop support interview questions to your benefit and make a positive first impression on your recruiter. 

For instance, OSI model's a standard one... because everyone who is even remotely involved with networking should at least be aware of what it is. If a desktop tech knows enough to be able to at least say something like "layer 1 is hardware layer" then at least they've shown enough formal knowledge that they're capable of learning more (meaning, recognize the question and give an intelligible response, no matter how primitive). Equivalently, that a shop would ask an entry-level applicant that indicates that the shop finds it important enough to ask questions like that, and so it's likely asking if you the candidate can be formally trained by asking for formal knowledge.

Not that this is all set in stone, of course (plenty of variance!), but as information goes back and forth, you the candidate should be evaluating the potential employer just as much, if not more, than the potential employer is evaluating you.

Sadly, it's just not possible to cover every question an entry level tech support position could possibly be asked. Worse, we don't know if the interviewer is of the school that by asking something really complex, he wants to gauge your response (do you panic, do you umm and ahh, do you reason through it, what do you do), and so doesn't really care whether you answer the question right or not.

So I'll just advise some very general concepts:
1) Don't panic.
2) Don't panic. and 
3) Answer truthfully and honestly. If you don't know something, say "I don't know, but I know how to Google it/research it/find out," assuming that you actually can Google it/research it/find it out. Did I mention not to panic? 

Don't treat it like an exam, there will not be a grade. Just do your best, and show that you're the best candidate for the job by being level-headed, honest, willing to learn, and capable.
3) Answer truthfully and honestly. If you don't know something, say "I don't know, but I know how to Google it/research it/find out," assuming that you actually can google it/research it/find it out.

This is the best advice yet. I'll add a 4.      

4.) Whatever you do, don't try to BS your way out of a situation.         

A favorite scenario I've seen goes something like this: 

Interviewer: "Have you had any experience working with with Startex printers?"
Candidate: "Yeah, a couple years ago."I: "What did you do when you supported them"        
C: "Oh the usual stuff-- maintenance, toners, etc. I don't really remember too much, we didn't have too many of them in the company."       

    
I: "That's funny you have all that experience, because I just made up Startex printers."

An honest no is a MUCH better answer. You can usually relate a "no" back to something you do know on some level.           

Typical troubleshooting questions will often be scenarios. The point is that the interviewer will want to see you talk through a problem, not produce the magical answer. Doing scenarios allows the interviewer to change things up as needed. I like to troubleshoot a "no POST" first off. A candidate who can't get at least partway through the process is hopeless. If they remember to check the basics (plugged in, power supply turned on, power strip/UPS on, etc.) or remember to ask the user what happened prior to the problem, then you see an extra level of attention to detail.

I'll ask rote memorization questions as well, but I'd rather lead a candidate through a discussion where I can see how they think. It's a horrible cliché, but for a candidate that only has a hammer, they start attacking problems like nails. For an entry level tech, they're not expecting stupidly hard-core computer knowledge-- they want the basics of computer operation, understanding of the troubleshooting process, and the ability to think through a problem creatively.        

Whenever I interview people I ask them some questions to determine two things: their level of competence with the technology they'll be using and their methodology for solving problems that they don't immediately know the answer to. Doesn't matter if it's entry level helpdesk or advanced system design, it's all in how the job candidate answers the question and not so much the answer itself.

Q: How does X work?
If you can tell me exactly how it works, great. If you can't, tell me how you THINK it works, how it might be similar to something else that you understand, how it works from a more general perspective, how you would find out how it works, etc. Pull out a piece of paper and start drawing that shit out. Whatever, just show me that if you don't know the full answer that you can explain to me what you do know, how you think it might work, and how you'll figure it out.

I think you're likely to get some questions to judge your general troubleshooting skills as well as some basic knowledge about the environment you'll be supporting. Based on the job description, at least have a simple understanding of the systems and tech you'll be working with. I think in an entry-level job they'll probably have most of the stuff you need to know written down somewhere for you to use as you run into a given problem.

Remember that most IT concepts are just that - concepts. The technical ins-and-outs change from hardware to hardware, software to software, but the concepts nearly always remain the same.

So when hit with something like, "What experience do you have with Startex printers?", you could respond with, "I haven't, but most printer management and maintenance techniques are the same, depending on printer type (desktop, office laser, plotter, etc) across the industry."

For instance, I had no clue how to manage the specific e-mail server software at my new job, but I've had extensive Exchange experience, and of course the concepts of e-mail systems management are essentially the same across the board.



Thank you All


Faysal Hasan
Microsoft Certified IT Professional (MCSA, MCTS, MCITP)
Citrix Certified Administrator (CCA), 
Information Technology Infrastructure Library -V3 Certified
Bachelor of Info Tech (Southern Cross University, Australia)

It’s Your Life ... ... C O L O U R IT "


Note: The above suggestions and questions are not my work I just collected them organized, modified and presented here so that people like you who is looking for answer don't have to lost in a sea of Google search result.

Twitter Facebook Favorites More