Here are Desktop support engineer interview questions and answers for fresher as well experienced candidates to get their dream job.
Active directory authorizes and authenticates all users and computers in a window domain network, ensuring the security of the computer and software. Through active directory various functions can be managed like creating admin users, connecting to printers or external hard drives.
DHCP stands for dynamic host configuration protocol. It is used to allocate IP addresses to a large number of the computer system in a network. It helps in managing a large number of IP’s very easily.
The scope consists of an IP address like gateway IP, subnet mask, DNS server IP. It can be used to communicate with the other PCs in the network. The superscope becomes when you combine two or more scopes together.
DNS means Domain Naming Service, and it is used for resolving IP addresses to name and names to IP address. DNS is like a translator for computers, computers understand the number and not the alphabet. For example, if we type like hotmail.com, the computer doesn’t understand this, so they use DNS which converts (hotmail.com) into (numbers) and then executes the command.
When we convert an IP address into names is called Reverse lookup, while converting names into IP address is called Forward lookup.
‘A’ record is also known as host record, and it can map the IP address by name. It is with this record that DNS can find out the IP address of a name. While, ‘MX record’ also known as mail exchanger record, by the help of ‘MX’ record, location of the mail server is identified. The record is also found in DNS.
IPCONFIG command is used to display the IP information of the computer assigned like DNS IP address and gateway IP address.
Cross cables are used to connect two computers without using switches.
A domain is a set of computers which network recognizes by the internet. It can be used by centrally administer computers. It is created when you install active directory.
You need to install another Hard Disk with the latest anti-virus software, and an O.S with latest patches. Before you start your system, connect the infected HDD as a secondary drive then scan and clean the infected hard drive. Once done, you can copy the files into the system.
Operating system acts as an interpreter between computer application and hardware. It works as a user interface.
The two types of operating systems are:
RAS means Remote Access Server. It allows operating the tool or information that typically resides on a network or IT devices through a combination of hardware and software, for example connecting to a printer or file. It is usually used for mobile users who are in the network. It uses a telephone line to provide connectivity to its users. It can also connect two or more than two offices in the network.
VPN means Virtual Private Network. It is a private communications network often used by companies or organizations to communicate confidentially over a public network. This is used by the mobile users in the network.
RAS is truly a local area connection between two connections whereas, VPN is a local connection spread over a large area.
IAS means Internet Authentication Service. For many types of network access like wireless, authenticating switch and remote access dial-up, they perform accounting and auditing, centralized connection authentication and authorization.
Between two or more devices, to check the physical IP connectivity Ping command is used.
When one or more computers work together as a single system by sharing their resources is known as clustering. The benefits of clustering are that it reduces the load on one single system by sharing the load also it is used for redundancy of the services.
A Group is a collection of user accounts. It provides a simplified administration in the network.
A child domain is the member domain of Windows 2000 Active Directory.
Benefits of the child domain are:
OU means for Organizational Unit. It is a container within Active Directory which can hold users, groups, and computers. It is the smallest unit on which an administrator can assign group policy settings.
Group policy provides streamlined access to all the users in the network. It can be used to define a user’s security and networking policies. By group policy, you can keep control over certain function like not allowing the users to shut down the system or using the control panel or running the command. Group policy is applicable to active directory containers like OU, site, and Domain.
“Policy” is assigned on active directories, like the site, domain, and OU. The “Rights” are assigned to users and groups, whereas, the “Permission” is assigned for network resources like file, folders, and printers.
DC stands for the Domain Controller, and ADC stands for Additional Domain Controller.
ADC is a backup of the domain controller. The domain controller is a server that checks the security measures like user id, password.
There is one difference between the domain controller and additional domain controller, on DC all five operational roles are available while in ADC only three operational role is available.
Operational roles for DC (Domain controller) are:
Operational roles for ADC (Additional Domain Controller) are:
The default gateway is the IP address of the router in the network. In any case, if the user wants to switch on to another network, or if they cannot locate their particular network than their query will be forwarded to the default gateway.
To take a back-up in the ms outlook, you have to go in the control panel. In the control panel, you have to go under mail option and then open the data file, select personal folder and click on open folder. After that, you have to copy .pst and have to paste it wherever you want the backup.
In trusting domain resources are available, while in trusted domain user’s account is available.
The rate of communication speed between microprocessor and RAM is known as BUS speed.
There are three types of active directory partitions
Fixboot writes a new partition boot sector on to the system partition.
The maximum number of the logical drive that can fit on a physical disk is 24, while the extended partition can only have 23 logical drives.
BRouter means Bridge router. To provide communication between two or more different network like a computer to computer or computer to the internet, B Router is used.
Gateway works on different network architecture and router works on the same network architecture.
A packet is a logical grouping of information that comprises a header which contains user data and location information.
SCSI stands for Small Computer System Interface. It is a standard electronic interface that allows personal computers to communicate with peripheral hardware such as disk drives, tape drives, printers, CD-ROM drives. In “SCSI” the rate of data transmission is fast.
They are segregated into five classes
FIXMBR it is a repair tool. It repairs the Master boot record of the Partition Boot Sector.
SID stands for Security Identifier. Every computer object has a unique ID which is known as SID.
Differential backups will select only files that are changed since the last backup.
Incremental backups will select only the data that has changed since the last backup.
Example, On Sunday you do a backup of a 5 text file each of 40 MB. The total backup size will be 200MB
On Monday you change 2 lines in just ONE of the text file.
Under Differential backup, only the changed text file will be backed up. The total backup size will be 40MB
Under Incremental backup, only the data corresponding to the 2 lines will be backed up. The total backup size will be just in bytes.
Server OS gives centralized administration for users, shared resources and security while desktop OS offers access to only local administration.
MSI (Microsoft Installer) allows install, uninstall and repair the program with a single file, while .EXE file needs two files to install and uninstall the software. Also, .EXE file is able to detect the existing version of the software and give an option to user to uninstall the program while MSI will instruct the users to use the add and remove program in the control panel to remove the existing product first and then you can install the new program.
BSOD stands for the Blue Screen Of Death. When there is some fault in OS or hardware, then Windows can’t run the program and gives a blue screen with a code. To resolve this problem the best way is to reboot the system. If it doesn’t work than boot the system in the safe mode.
The PTR record or Pointer record is used to check if the server name is connected with the IP address, it is exactly opposite to the ‘A’ record. This record is basically created in reverse lookup zone, so it is also known as Reverse DNS records or pointer records.
PTR record= Give me an IP address and I will give you the name
‘A’ record= Give me the name and I will give you the IP address
Basically, the term “Reservation” is used in the DHCP server. Some network equipment or computer system needs a specific IP address, in such case we make a reservation in DHCP server for that particular computer system. By creating reservation, it gives access to that particular IP address and at the same time prevents other computer systems to use that IP address.
POP stands for post office protocol. It is used for mail receiving purpose in the network.
SMTP stands for simple mail transfer protocol. It is basically used for sending and receiving the mail.
RIS stands for remote installation services. It is used to install image from a Window server to new hardware. We use RIS because installing the OS every time using a CD would be more time-consuming.
Bootloader facilitates the loading of the operating system on the system. It enables the booting process and gives the OS option to the users while starting the system.