Você está na página 1de 20

1) What is active directory?

Active directory authorizes and authenticates all users and computers in a window domain
network, ensuring the security of the computer and software. Through active directory
various functions can be managed like creating admin users, connecting to printers or
external hard drives.

2) What is DHCP and what it is used for?

DHCP stands for dynamic host configuration protocol. It is used to allocate IP addresses to a
large number of the computer system in a network. It helps in managing the large number of
IP’s very easily.

3) What is scope and super scope?

Scope consists of an IP address like gateway IP, subnet mask, DNS server IP. It can be used
to communicate with the other PCs in the network. The superscope becomes when you
combine two or more scopes together.

4) What is DNS?

DNS mean Domain Naming Service and it is used for resolving IP addresses to name and
names to IP address. DNS is like a translator for computers, computers understand the
number and not the alphabet. For example, if we type like hotmail.com, the computer don’t
understand this so they use DNS which converts (hotmail.com) into (numbers) and then
executes the command.

5) What is forward and reverse lookup in DNS?

When we convert IP address into names is called Reverse lookup, while converting names
into IP address is called Forward lookup.

6) What is ‘A’ record and what is ‘MX record’?

‘A’ record is also known as host record, and it has ability to map the IP address by name. It is
with this record that DNS can find out the IP address of a name. While, ‘MX record’ also
known as mail exchanger record, by the help of ‘MX’ record, location of the mail server is
identified. The record is also found in DNS.

7) What is IPCONFIG command?

IPCONFIG command is used to display the IP information of the computer assigned like
DNS IP address and gateway IP address.

8) What would you use to connect two computers without using switches?

Cross cables are used to connect two computers without using switches.
9) What is a domain?

Domain is a set of computers which network recognizes by the internet. It can be used by
centrally administer computers. It is created when you install active directory.

10) Tell me if your system is infected by a virus how you will recover the data?

You need to re-install another system, latest anti-virus software and an O.S with latest
patches. Before you start your system, connect the infected HDD as a secondary drive then
scan and clean the infected hard drive. Once done, you can copy the files into the system.

11) What is the operating system?

Operating system acts as an interpreter between computer application and hardware. It works
as an user interface.

12) What are the types of operating system or O.S?

The two types of operating systems are:

 NOS : Network Operating System. Examples of NOS- Windows NT, 2000,2003


 SOS : Simple Operating System. Examples of SOS – Windows 95,98, ME

13) Explain about RAS server?

RAS means Remote Access Server. It allows operating the tool or information that typically
resides on a network or IT devices through combination of hardware and software, for
example connecting to printer or file. It is usually used for mobile users who are in the
network. It uses telephone line to provide connectivity to its users. It can also connect two or
more than two offices in the network.

14) Explain about VPN server?

VPN means Virtual Private Network. It is a private communications network often used by
companies or organizations to communicate confidentially over a public network. This is
used by the mobile users in the network.

15) What is the difference between RAS and VPN server?

RAS is truly a local area connection between two connections whereas, VPN is a local
connection spread over large area.

16) What is IAS server?

IAS means Internet Authentication Service. For many types of network access like wireless,
authenticating switch and remote access dial-up they perform accounting and auditing,
centralized connection authentication and authorization.
17) What is Ping command?

Between two or more devices, to check the physical IP connectivity Ping command is used.

18) What do you mean by clustering? What are the benefits?

When one or more computers work together as a single system by sharing their resources is
known as clustering. The benefits of clustering are that it reduces the load on one single
system by sharing the load also it is used for redundancy of the services.

19) What is a group?

Group is a collection of the user account. It provides the simplified administration in the
network.

20) What is a child domain?

A child domain is the member domain of Windows 2000 Active Directory.

21) What are the benefits of a child domain?

Benefits of child domain are:

 Low network traffic


 Low administrative overhead
 Security boundary

22) What is OU?

OU means for Organizational Unit. It is a container within Active Directory which can hold
users, groups and computers. It is the smallest unit on which administrator can assign group
policy settings.

23) Explain group policy?

Group policy provides the stream line access to all the users in the network, it can be used to
define the users security and networking policies. By group policy you can keep control over
certain function like not allowing the users to shut down the system or using the control panel
or running the command. Group policy is applicable on active directory container like OU,
site and Domain.

24) What is the difference between permission, rights and policy?

“Policy” is assigned on active directory, like site, domain and OU. The “Rights” are assign to
users and groups, whereas, the “Permission” is assigned for network resources like file,
folders and printers.

25) What is DC and ADC stands for?

DC stands for domain controller and ADC stands for additional domain controller.
ADC is a backup of domain controller. Domain controller is a server that checks the
security measures like user id, password.

26) What is the difference between DC (Domain controller) and ADC ( Additional
Domain Controller)?

There is one difference between domain controller and additional domain controller, on DC
all five operational roles are available while in ADC only three operational role is available.

27) What are the operational roles for DC (Domain controller) and ADC ( Additional
Domain Controller)?

Operational roles for DC (Domain controller) are:

 Domain Naming Master


 Schema Master
 RID Master
 PDC Emulator
 Infrastructure Master

Operational roles for ADC (Additional Domain Controller) are:

 PDC Emulator
 RID Master
 Infrastructure Master

28) What is a “Default Gateway”?

Default gateway is the IP address of the router in the network. In any case, if the users wants
to switch on to another network, or if they cannot locate their particular network than their
query will be forwarded to default gateway.2

29) How you can take backup of emails in ms outlook?

To take a back-up in the ms outlook, you have to go in control panel. In control panel you
have to go under mail option and then open the data file, select personal folder and click on
open folder. After that, you have to copy .pst and have to paste it wherever you want the
backup.

30) What is trusting domain and trusted domain?

In trusting domain resources are available, while in trusted domain user’s account is
available.

31) What is BUS speed?

The rate of communication speed between microprocessor and RAM is known as BUS speed.
32) Name the Active Directory Partitions?

There are three types of active directory partitions

 Schema partition
 Configuration partition
 Domain partition

33) What is Fixboot?

Fixboot write a new partition boot sector on to the system partition.

34) How many logical drive is it possible to fit on to a physical disk?

The maximum number of the logical drive that can fit on a physical disk is 24, while the
extended partition can only have 23 logical drives.

35) What is B Router?

B router means Bridge router. To provide communication between two or more different
network like computer to computer or computer to internet, B Router is used.

36) What is the major difference you can mention about Gateway and Router?

Gateway works on different network architecture and router works on same network
architecture.

37) What is packet?

A packet is a logical grouping of information that comprises a header which contains user
data and location information.

38) What is SCSI?

SCSI stands for Small Computer System Interface. It is a standard electronic interface that
allows personal computers to communicate with peripheral hardware such as disk drives, tape
drives, printers, CD-ROM drives. In “SCSI” the rate of data transmission is fast.

39) How many classes are there for “IP addresses” and what are the ranges?

They are segregated into five classes

1. Class A === 0 -126 ( 127 is reserved for loop back)


2. Class B ==== 128- 191
3. Class C ==== 192-223
4. Class D ==== 224-239
5. Class E ==== 240-255

40) Explain the term FIXMBR?


FIXMBR it is a repair tool. It repairs the Master boot record of the Partition Boot Sector.

41) Explain the term SID?

SID stands for Security Identifier. Every computer object has a unique ID which is known as
SID.

42) What is the difference between incremental backup and differential backup?

In incremental backup only incremental parts are backup and not the full back up, while in
differential backup we take full back up after the normal backup.

43) What is the difference between server OS and desktop OS?

Server OS gives centralized administration for users, shared resources and security while
desktop OS gives access to only local administration.

44) What is the difference between the MSI file and .EXE file?

MSI (Microsoft Installer) allows install, uninstall and repair the program with a single file,
while .EXE file needs two files to install and uninstall the software. Also,.EXE file is able to
detect the existing version of the software and give option to user to uninstall the program
while MSI will instruct the users to use the add and remove program in control panel to
remove the existing product first and then you can install the new program.

45) What is BSOD? How do you troubleshoot it?

BSOD stands for blue screen of death. When there is some fault in OS or hardware then
Windows can’t run the program and gives a blue screen with a code. To resolve this problem
the best way is to reboot the system. If it doesn’t work than boot the system in the safe mode.

46) What is PTR (Program Troube Record) record?

This program record is used to check if the server name is connected with the IP address, it is
exactly opposite to the ‘A’ record. This record is basically created in reverse lookup zone, so
it is also known as Reverse DNS records or pointer record.

PTR record= Give me an IP address and I will give you the name

‘A’ record= Give me the name and I will give you the IP address

47) What is reservation?

Basically the term “Reservation” is used in DHCP server. Some network equipment or
computer system needs a specific IP address, in such case we make a reservation in DHCP
server for that particular computer system. By creating reservation it gives access to that
particular IP address and at the same time prevents other computer system to use that IP
address.

48) What is SMTP server or POP server?


SMTP stands for simple mail transfer protocol. It is basically used for sending and receiving
the mail, whereas, POP stands for post office protocol it is used for mail receiving purpose in
the network.

49) What is RIS and why you use RIS?

RIS stands for remote installation services. It is used to install image from a Window server
to a new hardware. We use RIS because installing OS every time using a CD would be more
time consuming.

50) What is “Bootloader”?

Bootloader facilitates the loading of operating system on the system. It enables the booting
process and gives OS option to the users while starting the system.

Technical Support Interview Questions – 2


1. What is BIOS?

Ans: BIOS stands for Basic Input-Output System and is pronounced as “Bye-Ose“. The
BIOS is available on all the computers. It makes sure that all the components of the computer
can function together. It has information about all the hardware components in the Computer.
BIOS can also be called as a Special Software that interfaces the major hardware components
of a computer with the Operating System. It is usually stored in a Flash Memory Chip on the
Motherboard.

Some functions of BIOS:

1. Performs a POST (Power-On Self Test) for all the different Hardware Components in
the System to make sure everything is working properly.
2. Activating other BIOS Chips on different cards installed in the computer, for
example, SCSI and Graphics Cards.
3. Provides a set of low-level suiting that the Operating System uses to interface
different Hardware devices. BIOS manages things in your computer like the
Keyboard, Monitor, Serial and Parallel Ports especially when the computer is Booting
up.
4. Manage the settings for Hard-disk drives, System Clock etc.

Sequence of things done by the BIOS when you turn on your Computer:

1. Check the CMOS for Custom Settings


2. Load the interrupt Handlers and Device Drivers
3. Initialize Registers and Power Management
4. Perform POST (Power On Self Test)
5. Display System Settings
6. Determine which devices are Bootable
7. Initialize the Bootstrap sequence

2. What are the Hardware Components of a Desktop Computer / Laptop?

Ans: The Hardware Components of a Desktop Computer / Laptop are as follows:

1. The Processor (CPU)


2. Motherboard
3. RAM (Random Access Memory)
4. Power Supply – SMPS (Switch Mode Power Supply)
5. Hard-disk Drives
6. CD/DVD-ROM Drives
7. Floppy Disk Drive
8. Sound Card
9. Graphics (Display) Card
10. Keyboard
11. Mouse
12. Monitor

3. What are Hard-Disk Partitions?

Ans: Partitions are used to Divide a Hard-disk drive into smaller segments as required by the
user and for better management of the space in it.

4. Difference between RAM and ROM?

Ans: RAM (Random Access Memory) – is used to temporarily store information that the
computer is currently working on.

ROM (Read Only Memory) – This is a Permanent type of memory storage used by computers
for important data which never changes. (Example: BIOS)

5. What would you check if there is no sound from your computer? (Audio not working)

1. Check for cable connections


2. Check for power to the speakers
3. Check for volume control
4. Check for device drivers
6. If a Customer complains that his computer is working really slow, what are the things
you would check?

1. Check if it is taking longer than usual to start up


2. Check if it is slow with one / any particular application or slow overall.
3. Check for Spyware/Malware/Virus in the computer
4. Check the available Hard-Disk Drive Space in the computer.

7. What is the Blue Screen of Death (BSOD)? .

Ans: A Blue Screen of Death (or just a Blue Screen Error) is an indication of a Critical
System Problem wherein the Computer freezes altogether and does not respond to anything.

To rectify this problem, try Restarting the computer or Booting into Safe Mode. For more
information, read this.

8. Why are Device Drivers required?

Ans: A Device Driver (or just Driver) is a piece of software which is required to run every
Hardware Component present in the computer.

9. Name one of the latest Computer Processors (CPU) ?

Ans: Intel Pentium Quad Core, Intel I3, I5, I7 processors.

10. What is Ping?

Ans: Ping is a command that checks the connectivity with an IP address. For more read this
article

11. What is a Data Cable?

Ans: A Data Cable is a Thin Plastic band-like cable used to connect the Data-Devices like
Hard-disk drives, Floppy Disk Drives, CD/DVD-ROM drives with the motherboard. Data
Cables are primarily used for Data Transfer.
12. Lights on a Modem / LAN Card:

Ans: Generally, there are 04 lights. They indicate the following:

1. Power Light: Shows if the device (Modem)is getting Power Supply or not.
2. Link Light: Indicates if the device is getting broadband/internet signals properly from the
ISP
3. Data Light: Indicates wether the internet is working or not.
4. Connectivity Light: Indicates the Modem is connected to a PC or not.

13. Name some of the Ports available in a Computer

Ans: Some of the commonly available ports in a Computer are as follows:

1. Keyboard & Mouse Ports – Also known as PS/2 ports


2. USB Ports
3. VGA Ports
4. Sound Ports
5. LAN Port – Also known as Ethernet Port

14. What does the term USB stand for?

Ans: USB stands for Universal Serial Bus. It allows devices to be connected or disconnected
from a computer without shutting down or restarting the computer. The current version of
USB is 2.0

15.What is the difference between CRT (Cathode Ray Tube) and LCD (Flat Screen
Monitors)?

Ans: CRT Monitors: The Monitor has a picture tube and uses a light-gun to highlight pixels
on the screen.

LCD Monitors: These monitors do not have a picture tube and contain a layer of liquid
crystals on an Electronic Board.

16.What is an IP Address?

Ans: An IP address is a unique numerical identifier of every device on a network. A typical


IP address can look like this: 216.27.61.141. To detect a computer’s IP Address, go to Start –
Run – Type in CMD in the Run Dialogue Box and click OK or hit <Enter> – In the
Command Prompt Screen that comes up, type in IPCONFIG and hit <Enter>
17. What is DHCP?

Ans: DHCP stands for Dynamic Host Configuration Protocol. It is used to generate &
provide IP addresses to the computers on a network.

18. What is DNS?

Ans: DNS stands for Domain Name Services – it is used to convert URLs into IP addresses
and vice-versa.

19. Mention a sample computer configuration:

Ans:

1. Intel Pentium Core 2 Duo – 3.0Ghz


2. 2 GB RAM
3. 300GB HDD
4. DVD Writer
5. 17 inches LCD Monitor
6. Keyboard
7. Mouse

20. Name any Five Microsoft Office Applications:

Ans:

1. MS Word
2. MS Excel
3. MS Powerpoint
4. MS Access
5. MS Outlook

21. What are RJ45 and RJ11 connectors?

Ans: RJ45 connectors are used for LAN/Ethernet connections and RJ11 connectors are used
for Telephone Cable connections.
22.What is a Parallel Windows installation?

Ans: When the first installation of Windows fails to boot for some reason, another copy of
Windows is installed in teh same drive but in a different directory (so that the customer can
access to and backup his old data). This is called Parallel Installation of Windows.

23.Name some of the versions of Windows XP.

Ans: Windows XP Home Edition, Professional, Media Center Edition, Tablet PC Edition,
Mobile

24.What are the components needed to setup a Basic Home Network?

Ans: LAN Cards, LAN Cables, Router/Hub

25. Difference betwen a WORKGROUP and a DOMAIN?

Ans: In a Workgroup, all the computers function as Peers. But in a Domain, One computer is
the Server and the others are Clients.

26. What is the difference between FAT32 and NTFS file systems?

Ans: 1. NTFS allows compression and file encryption. FAT32 does not. 2. NTFS is more
secure than FAT32

27. What does BOOT.INI do?

Ans: Boot.ini lists all the Operating Systems present in the computer and provide information
about which partitions they are located on.

28. How would you access the Recovery Console in Windows?

Ans: By booting with the Windows XP CD and following the on-screen instructrions. The
Recovery Console can also be installed in your computer.
029. Provide the names of a few Firewalls:

Ans: Norton, McAfee, Zone Alarm etc

30.What feature of Outlook Express allows multiple customers to send and receive
emails, each using a separate account?

Ans: Identities

WHAT IS A DIFFERENCE BETWEEN PRIMARY AND SECONDARY STORAGEDEVICES?WHAT ARE


STORAGE DEVICES?Storage devices are used to store data and programpermanently. These devices
are used to store large volume of data and program. Storage device are also called as1: PRIMARY
STORAGE DEVICES.2: SECONDARY STORAGE DEVICES.3: AUXILIARY STORAGE DEVICES.WHAT IS
PRIMARY AND SECONDARY STORAGE DEVICES?There is no official definition of these two terms,
primary storagetypically refers to random access memory (RAM), whilesecondary storage refers to
the computer's internal hard drive. )EXAMPLES OF PRIMARY STORAGE DEVICES:Following are some
examples of primary storage devices.1: RAM.2: ROM.3: Cache MEMORY.EXAMPLES OF SECONDARY
STORAGE DEVICES:Internal Hard Disk DriveExternal hard disk drivesDifferentiate between RAM and
ROM?

RAM stands for Random Access Memory. It can store information and have newinformation stored
over it later. And it’s a physical device you can changeit Types of RAMDDR (Double Data Rate), DDR2
and SDRAMROM stands for Read Only Memory. It can’t be written-over Types of ROMPROM
(Programmable Read-Only Memory) and CD-ROM

What is cache memory?

Cache memory is random access memory (RAM) that a computer microprocessorcan access more
quickly than it can access regular RAM. As the microprocessorprocesses data, it looks first in the
cache memory and if it finds the data there, itdoes not have to do the more time-consuming reading
of data from larger memory.

What is the difference between 32 bit and 64 bit memory?

The terms 32-bit and 64-bit refer to the way a computer's processor (also called aCPU), handles
information. The 64-bit version of Windows handles large amounts of random access memory (RAM)
more effectively than a 32-bit system.

What is Virtual Memory?

Virtual memory is storage space on your computer’s hard disk that Windows uses inconjunction with
random access memory
(RAM).

What is NVRAM?

NVRAM (Non-Volatile Random Access Memory) is a type of Random Access Memory(RAM) that
retains its information when power is turned off. The NVRAM is a small

Desktop &amp; Technical Support


Interview Questions and Answers

How to raise the domain functional level to the Windows 2000


nativedomain functional level or Windows Server 2003 domain
functional level

Before you can raise the domain functional level to Windows Server
2003 domainfunctional level, each domain controller in the domain
has to running WindowsServer 2003. To raise the domain functional
level for a domain,1.Open the Active Directory Domains And Trusts
console2.Right-click the particular domain whose functional level you
want to raise,and select Raise Domain Functional Level from the
shortcut menu.3.The Raise Domain Functional Level dialog box
opens.4.Use the Select An Available Domain Functional Level list to
choose thedomain functional level for the domain.5.Click Raise6.Click
OK

What are the forest functional level in Windows Server


2003?Windows Server 2003 Forest Functional Level
All domain controllers in the forest have to be running Windows
Server 2003 inorder for the forest functional level to be raised to the
Windows Server 2003 forestfunctional level. In the Windows Server
2003 forest functional level, all forest-wideActive Directory features
are available, including the following:

Domain renaming

Forest Trust

Defunct schema objects

Dynamic auxiliary classes

Application groups

Universal Group caching

Application directory partitions

Global Catalog replication enhancements

Installations from backups


The Active Directory quota feature

SIS for system access control lists (SACL)

Improved Knowledge Consistency Checker (KCC) replication


algorithms

Linked value replication

InetOrgPerson objectClass

NTDS.DIT size reduction

How to check which forest functional level is set for the forest

1.Open the Active Directory Domains And Trusts console2.Right-click


Active Directory Domains and Trusts in the console tree, andselect
Raise Forest Functional Level from the shortcut menu.3.The Raise
Forest Functional Level dialog box opens4.You can view the existing
domain functional level for the domain in Currentforest functional
level.

How to raise the forest functional level to Windows Server 2003


forest functional level

Each domain controller in the forest has to be running Windows


Server 2003 beforeyou can change the forest functional level to
Windows Server 2003. When you raisethe forest functional level, all
domains in the forest will automatically have theirdomain functional
level raised to Windows Server 2003.

To raise the forest functional level for a forest,1.Open the Active


Directory Domains And Trusts console2.Right-click Active Directory
Domains And Trusts in the console tree, andselect Raise forest
Functional Level from the shortcut menu.3.The Raise Domain
Functional Level dialog box opens4.Click Raise5.Click OK

What is IPv6?

IPv6 (

Internet Protocol Version 6

) is also called IPng (

Internet Protocol next generation

) and it is the newest version of the Internet Protocol (IP) reviewed in


theIETF standards committees to replace the current version of IPv4 (

Internet ProtocolVersion 4

). The official name of IPng is IPv6, where IP stands for

Internet Protocol

and v6 standsfor

version 6

.IPv6 is designed to allow the Internet to grow steadily, both in terms


of the numberof hosts connected and the total amount of data
traffic transmitted.IPv6 is an Internet Protocol (IP) for packet-
switched internetworking that specifiesthe format of packets (also
called datagrams) and the addressing scheme acrossmultiple IP
networks. In comparing the two protocols IPv6 expands upon
theaddressing and routing capabilities of IPv4 in a number of ways
including:

In IPv6 the IP address size is increased from 32 bits to 128 bits

IPv6 supports a greater number of addressable nodes

IPv6 provides more levels of addressing hierarchy

IPv6 offers simpler auto-configuration of addresses

Ipv6 also supports simplified header format The biggest benefit of


IPv6 is that it will replace the IPv4 32-bit address scheme witha much
longer 128-bit address scheme. The IPv4 32-bit address scheme
allows for atotal of 2^32 addresses while IPv6 allows for 2^128 total
addresses.

What is the file that’s responsible for keep all Active Directory
database?

The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS


folder. The file is called as ntds.dit.Along with this file there are other
files also present in this folder.List of files and use of those files are
listed below1. ntds.dit : This is the main database file for active
directory.2. edb.log : When a transaction performed to ad database,
like writing some datafirst the data will be stored to this file. And
after that it will be sent to database. Sothe system performance will
be depends on how this data from edb.log file will bewritten to
ntds.dit3. res1.log : Used as reserve space in the case when drive had
low space. It isbasically 10MB in size and creted when we run
dcpromo.4. res2.log : Same as res1.log. It is also 10MB in size and the
purspose also same.5. edb.chk : This file records the transactions
committed to ad database. Duringshutdown, shutdown statement is
written to this file. If it is not found when thesystem rebooted, the ad
database tries to check with edb.log for the updatedinformation.Edb
corruption or Edb active directory corruption is really serious.
However you canget this repaired by using edb repair tool.
Roles and responsibilities

 We were providing technical support to our user regarding software, hardware, network
and windows OS related issue
 We were setup desktop computer along with peripheral and testing on network
 Installing and testing desktop software application and internet browser
 Test computer to ensure proper function of computer
 Managing active directory and create user, group and assign group policy
 Configure and testing outlook on network and taking backup of it
 Taking remote session with user understanding there issue and instruct them step by step
 Troubleshooting network by using command line tool
 Maintaining computer peripheral like printer, modem, scanner and resolving issue
 Some time we were getting difficult issue that we unable to resolve it we were redirect to
next level technical support team

Total exp dec 2015 to nov 2017


I pro service Kolhapur

1yr & 11 month

21 dec 2015 to 30 nov 2017

Você também pode gostar