Professional Documents
Culture Documents
Use Alt+Clt+Del to access the task manager and in Details find out which application is
not responding. End the process of that application.
Press and Hold the POWER button to forcedly turn off the machine to restart it again.
Computer Doesn’t Power Up:
Check all the cables are connected properly.
Check the power socket is turned on and make sure there is power in the sockets.
Replace power cable that you know is working
Non System Disk or disk error to boot
Remove any external USB, Disc or hard drive and boot the system again.
If you hear any noise or clucking again, try to power off you might lose the data. It must
be a physical problem.
System Restore
In Case of BSOD
When you run computer Windows in Safe Mode, try to restore it back which might
work.
Speed up Computer
Run fewer programs at the same time
Remove viruses or malwares
Free up hard disk space
Verify windows system files
Run a disk scan
Defragment Hard Disk
Reinstall windows
Upgrade the hardware, RAM, Processor.
Computer Overheating
Blocked Vents
Dusty Fans or Case
Broken Fan
Dusty heat Sinks
How to clean up Hard Disk
Disk Cleanup
*.tmp to delete temporary files
Del *.tmp
Computer Restarts Before Windows loading
Make sure that all the peripherals are connected properly on the motherboard’s slots like,
RAM, Video Cards etc.
Faulty RAM.
Failing Hard Drive
Corrupted Drivers
BIOS: Basic Input Output System
It’s a first software that computer used to run.
It checks all the primary hardware that are connected to the Computer that includes,
Memory, Hard drives, CPU etc.
BIOS chip is located on the Motherboard Bios written on the top of that. It’s a small black
chip.
It performs POST: Power On Self test.
After Running Successful POST it look for Boot Loader to start the Operating System.
There are two Types of BIOS
Legacy Bios UEFI Bios
It’s old original and Stands for Unified Extensible Firmware
traditional Bios Interface
It’s all texted and allow to It’s defined standard by the manufactures.
configure the settings. It’s support to boot from large TB storages. It also
It’s limited hardware supports FAT and removable media.
support and doesn’t not It has pre-boot environment that allow to connect
require drivers for network, computer before even loading to operating
video and storage devices. system remotely, browse the internet, backup,
storage devices without using any other software.
UEFI Bios also has Built in Diagnostics that allow to run and check that how hardware,
memory, cpu is running and their performance.
Encryption
Full disk encryption includes all the data, files and operating system
encrypted, without that password it doesn’t allow the user to access
the computer and the data on the hard drive.
It integrates with TPM – Trusted Platform Module
Either Bios has that TPM Chipset or TPM Cryptographic
card can be installed on the Bios Slots.
Network Topologies
Star Topology:
It’s a single point failure topology, in
which all computers and devices are
connected to one central device. If any
connected device fails it doesn’t effect the
network but if central device switch or
hub fails it effects the entire network.
Bus Topology:
In Bus Topology, all computers or devices
are connected to single central Coaxial
Cable with each connection using BNC
Connector.
Coaxial cable must be terminated at the both
ends, if any terminator got lose or cable
doesn’t terminate at the one end than data
won’t be transfer and will bounce back
which will affect the entire network.
In order to remain this network operational, all ends must be connected and don’t leave any
open connection even connected to computers or devices.
Ring Topology:
In Ring Topology all devices or computers
connected to each other in a closed loop or
ring.
Advantage of this topology is that, it’s easy to
use and easy to troubleshoot. It’s rarely used.
Disadvantage of this, if a single break in a
connection than the whole data flow of the
network will be affected.
Mesh Topology:
All devices or computers in this topology are
connected to each other.
Mesh topology creates high redundancy level
because of the too many connections. It’s very
expensive because of no. of cables and NIC usage.
One of the wide example is Internet.
Hybrid Topology:
Hybrid topologies are the combination of different
topologies. The most common hybrid topologies are
the Star Bus Topologies and Star Ring Topology.
In Star Bus Topology, two or more-star topologies
connected to each other by using the single link
connection between the devices.
Star Ring Topology uses the ring connection to connect each other.
Point to Point Topology:
Point to point topology connects device to device or computer to computer without using any other
device. These host can be, switch to switch, router to router, computer to computer etc.
Client Server Topology:
Client Server Topology is used to connect all the computer
directly to the centralized dedicated server. It makes easy
administration tasks as it’s single to handle the information and
manage. As Administrator can share the data for all clients from
single device rather than multiple device.
Point to Multipoint Topology:
Point to Multipoint Topology is commonly used in wireless
network connections. In which all clients are devices
connected to the central Access point through wireless
connection.
BNC Coupler
It’s BNC Female to Female connector.
Used to connect two Coaxial Cables or extension
Fiber Coupler:
Fiber Coupler is used to connects two fiber optics connectors. Both
connectors have to be the same.
It has to ST to ST or LC to LC connectors but not ST to LC .
F-Type Connectors
F-Type connectors are normally used for coaxial cable with typically hand
tightened and used by cable providers for the modem. It tightens with screw
type.
MT-RJ Connector (Mechanical Transfer Registered Jack)
Its fiber optic cable connector, it uses latch push pull connection. Its used
for high packed density.
ST – Connector (Single Tip)
It’s fiber optic cable connector that’s normally used in single mode
fiber optic cable
LC – Connector (Local Connector)
It’s also fiber optic cable connector. It’s similar RJ45 jack style
typically used between floor on a building
SC – Connector (Standard Connector)
It’s push pull connector similar to audio video connector. It’s used in
fiber optic cables and commonly used between floors and buildings
Cable Standards
Cable Standards are 10 Base – T (10 refers to Speed, Baseband Transmission,
Twisted Pair Cable)
10 Base – 2
10 Base -2 is a thin Coaxial Cable that is uses maximum speed 10
Mbps and maximum length for this is 200 Meters.
Gigabits Standards
Wiring Standards
Wiring standards are developed by EIA/TIA. Defined rules that how twisted pair cables can be
wired in RJ-45.
Straight Cable
This type of Cable used as A Standard at the both ends which allow the signals can pass
through End to End.
This cable is used to Connect Computers to Hubs, Switches or Modems.
Cross Over Cable
This type of Cable used both standards which means One End is A Standard and another
End is B Standard.
This Cable is used to connect two Similar Devices together.
Roll Over Cable
Rollover Cable is wired completely opposite each other.
This type of cable is used to connect Computer or router Terminal Console port .
Application Layer:
Application layer use network application (means those applications which used
internet). Like Google Chrome, Skype, Outlook etc. These all applications use
HTTP & HTTPs Protocols to do web surfing. There are dozens of protocols which
uses Application layer.
FTP (File Transfer Protocol) used for File Transfer. Uses port 20 & 21
HTTP & HTTPs used for Web Surfing. Uses port 80.
SMTP (Simple Mail Transfer Protocol) used for Emails. Uses port 25
Telnet used for Virtual Terminals. Uses port 23.
NFS (Network File System) uses port 111.
FMTP (File Management Transfer Protocol) uses Port 8500.
DHCP uses port 67 & 68.
SNMP (Simple Network Management Protocol) uses port 161.
POP3, IRC , NNTP
When user sends a request to server, Session Layer first authenticate the
user.
In Authentication user use Login and Password to connect to Server.
Once Authorization is Checked it establish a Session in user and Server.
Session Layer also keep track on the data packets transferring between
Server and User.
A Simple Web Browser performs three layers. Application, Presentation
and Session Layer.
Transport Layers ensures the reliability of the communication through Segmentation,
Flow Control and Error Control.
Transport Layer
provides Two Type
of Services through
two types of Protocol.
UDP is faster than
TCP.
TCP Provides
feedback that all
data has been
transferred but UDP
doesn’t provide
feedback that all
data is transferred
or not.
UDP Used for
Streaming Songs,
Videos, Audios,
Video Games etc.
TCP is used for Web Requests, FTP, etc. where full delivery of content
is required.
Data link Layer uses CSMA (Carrier Sense Multiple Access). Which
control data transmission.
So if user sends a data to another user by using Application Layer.
It will be transported in Segments at Transport Layer
Packets at the Network Layer.
Frame at the Data Link Layer.
Frame receives by Physical layer in the shape of Binary Numbers.
Physical Layer will transmit that binary data by using the media Signals
by using Cables, Fiber or Radio Signals.
On the other side:
Those signals will be received by Physical Layer will be transferred to Data
Link layer in shape of Bits. And change into frame.
That frame will be change into Packet at Network Layer.
Network Layer will send that packets to Session Layer in shape of
Segments.
Then those will be received by Application Layer to make data visible to
user.
Gateway
Gateway acts as a “Gate” between two networks.
It’s a network node which connects two network together using
network protocols.
Cabling
Visual Fault Locater (VFL)
VFL is used in fiber cables to locate the issues, sharp bend in
the cable, faulty connectors and other faults.
Through VFL tool inject the laser light through one end and it
will show the light on another end.
If it leaks out around connector that means, there is a fault in the connector. If it doesn’t pass
the beam it means cable has issues or cable is located somewhere else.
Fiber Optics Splices:
Fiber optic Splices means the joining of the two Optical fibers together. So the laser light can pass
through from one fiber cable to another. There are two types of splices mentioned below:
Optical Time Domain Reflectometer (OTDR)
It trace the backstatter level in between two fiber
cables as well.
Infrared
In Infrared data is transmitted in rays of light.
It doesn’t work in the sun light.
Bluetooth
It’s a short range radio signals which provide connectivity between
two devices.
It operates at 2.4 GHz and can transmit Voice and data.
Its range is approximately 100 meters and 24 Mbps Speed.
IP Address (Internet Protocol)
It’s a numeric address, used to identify the device over the network.
It has two parts: Network Address & Host Address.
Subnet Mask:
Subnet Mask is used to identify the network in the IP address.
As an IP Address has two parts Network Address & Host Address.
By using Subnet Mask we can identify the Network Address Part and Class
of the IP Address.
DHCP Scope
It’s a group and a range of consecutive IP Addresses for computers that gets
their IP addresses from a DHCP Server.
In Scope User define a Range of IP address so when a client login, DHCP
Server will automatically assign an IP Address to that user from a defined
range.
DHCP Reservation
DHCP Reservation is an IP address which is defined in DHCP Scope for the
particular device or Computer. So whenever that computer or device login it
will be assign that address.
Usually that Reservation is defined for Printers, Server etc.
DHCP Lease
DHCP Lease is an IP Address which is assigned by DHCP Server to a
computer or client for the duration of the time.
That duration can be one day, ten days or as per policy defined
It can be checked in IPCONFIG/ALL.
DHCP Server automatically renew the IP address.
DHCP Relay
DHCP Relay is used when the Computer and DHCP Server use different
subnets like Server used (192.168.1.1) & Computer used (192.168.0.1) then
DHCP Server won’t be able to assign an IP address to the Computer
because Router can’t broadcast the request.
DHCP Relay or IP Helper is used so DHCP Server can assign IP address to
the computer while on the different subnet or using different IP Settings.
Two DHCP Server on the network
If there are two DHCP server configured on a single network, that must
be ensured that they should not give out same IP address to the lease
computers that will create conflict on the network.
For that reason address pool must be configured correctly.
Protocols Descriptions
Spanning Tree Protocol
It’s used to eliminate the unnecessary loops on the network. Because
loops are deadly for the network and because of the loops receiver can
get multiple message at the same time.
Root Bridge
Root Bridge is a Switch on the network that has all ports in forwarding
States.
SMTP (Simple Mail Transfer Protocol Port 25 )
SMTP (Simple Mail Transfer Protocol) uses TCP Protocol. If a user
doesn’t receive an email it will send message to user that your email is
not transferred.
POP3 (Post Office Protocol - Port 110 )
POP3 protocol is used for Email Receiving.
If Server receive an email, it will forward that email to user and doesn’t
sync emails or folders and also doesn’t keep copy of that email in the
server.
Once user receives that email, server will delete that email. Unless user
has specified to keep the copies of the email.
IMAP4 (Internet Message Access Protocol)
Its same as POP3 but with better features and also used for Email
Receiving protocol.
It keeps copy of the email in the server and can sync user email and
folders with computer and server.
It’s used in Microsoft Outlook.
NTP (Network Time Protocol)
This protocol is used for syncing time with Server and Computer.
It sends periodic request time to time to check that time is synchronize with Server or
not.
IP ADDRESSES
Public IP Address
A Public IP Address is an IP Address that can be accessed over the
internet publically. It’s like a street address located on the entrance of
the Street.
Public IP Address Range:
Class A 1.0.0.0 to 9.255.255.255
11.0.0.0 to 126.255.255.255
Class B 128.0.0.0 to 171.255.255.255
173.0.0.0 to 191.255.255.255
Class C 192.0.0.0 to 195.255.255.255
197.0.0.0 to 223.255.255.255
Class D 224.0.0.0 to 247.255.255.255
Class E 248.0.0.0 to 255.255.255.254
Private IP Address
Private IP address is that address which is reserved for internal use
behind a router or the NAT (Network Address Translation), apart from
public.
Private Addresses are the address that can be used in Home, Business
etc.
Private IP Address Range:
Class A 10.0.0.0 to 10.255.255.255 Supports (16 million addresses)
Class B 172.16.0.0 to 172.31.255.255 Supports (65 thousands
addresses)
Class C 192.168.0.0to 192.168.255.255 Supports (21 thousands
addresses)
Reserved IP Addresses
Reserved IP Addresses are those addresses which can’t be used over
the internet.
Loopback Address 127.0.0.0 to 127.255.255.255
APIPA Addresses 169.254.0.0 to 169.254.255.255
RAID 1
RAID 1 is a fault tolerant and same data is saved in all the disc
attached.
In the event of single disc failure, it will not loss the data.
RAID 5
For RAID 5, it requires minimum 3 or more discs.
It’s fast and store large amount of data.
It doesn’t duplicate data across the disc but spread the data in all the
discs.
In addition to data it also save PARITY (piece of information) in all the
disc.
PARITY is used to rebuild the data in the event of failure.
The downside of RAID 5, if 4 disc are used and each can store 1 TB.
All 4 disc would be 4 TB but the data will only be stored 3 TB and 1 TB
would be PARITY.
It can only handle one disc failure at the same time. But if two discs are
failed then data will be loss.
RAID 6
For RAID 6, it requires minimum 4 or more discs.
It works as RAID 5 but saves double PARITY to store the data in the
discs.
It can handle the two discs failure at the same time.
The downside of RAID 6, if 4 disc are used and each can store 1 TB.
All 4 disc would be 4 TB but the data will only be stored 2 TB and 2 TB
would be PARITY.
RAID 10 (1 + 0)
RAID 10 is a combination of (RAID 1 & RAID 0).
It spread the data across the discs attached.
If 4 discs are used, it will used RAID 1 policy to mirror two same disc
with same data and follow the same method for other two as well.
The disadvantage of this is that only 50% of storage would be used &
50% would be the same copy of that date.
Attacks:
“Sniffer”: It’s a device program which is used to monitors network
communication and captures data.
Password attacks:
Encryption
Brutal Forced Password Attack: it’s a method of guessing password
through a software that systematically generate password
combinations until a valid one founds.
Trojan Horse Attack: its used an email attachment, which is most of
the times used for corrupted passwords, credit cards information or
data.
Spoofing attacks: its used on the outside network devices.
Session Hijacking attacks: this type of attack used for stealing the
current session of the two network devices which are communicating
or has trust on each other and user hack the whole session so take the
data out of it and hack the whole system through.
Man in the Middle Attack: it’s a data theft technique in which attacker
intercept a device between two devices to gain the data transmission.
Dos (Denial of Service attack): its used to disable the system that
provide network access rather than stealing the data. In which hacker
sends multiple ping request to consume all the resources of the server.
Phishing: it’s a type of attack which used through email, in which user
realize that it’s an email from bank or financial institution and has to
verify the account which leads hackers to steal their data.
Security:
Firewall: Firewall can be software and hardware based, that uses rules
to control incoming and outgoing network traffic. It acts as a barrier
between trusted and untrusted network. It control the access.
Firewall has inbound and outbound rules
Its used on Packet Filters, Stateful inspection, Proxys.
Firewall configured on network layer.
Its packets filters decisions based on source destination and address
destination.
Security Notes
HTTPS:
HTTP Secure encrypt the data that was retrieve by HTTP from the
server.
SSL: (Secure Socket Layer)
This layer used two protocol to secure the data over the internet.
This layer uses 3 ways handshake after security check and then transfer
data in encryption.
TLS: (Transport Layer Security)
It’s a latest industry cryptographic protocol. It’s based on the same SSL
specification.
Its authenticate Server, client and encrypt the data as well.
Google is penalizing the website and flagging them if they are not
secured.
What is XSS?
Cross-site scripting, the nightmare of Javascript. Because Javascript can run
pages locally on the client system as opposed to running everything on the
server side, this can cause headaches for a programmer if variables can be
changed directly on the client’s webpage. There are a number of ways to
protect against this, the easiest of which is input validation.
13- How would you login to Active Directory from a Linux or Mac box?
While it may sound odd, it is possible to access Active Directory from a non-
Windows system. Active Directory uses an implementation of the SMB
protocol, which can be accessed from a Linux or Mac system by using the
Samba program. Depending on the version, this can allow for share access,
printing, and even Active Directory membership.
17- How would you judge if a remote server is running IIS or Apache?
Error messages oftentimes giveaway what the server is running, and many
times if the website administrator has not set up custom error pages for
every site, it can give it away as simply as just entering a known bad
address. Other times, just using telnet can be enough to see how it responds.
Never underestimate the amount of information that can be gained by not
getting the right answer but by asking the right questions.
19- You see a user logging in as root to perform basic functions. Is this a
problem?
A Linux admin account (root) has many powers that are not permitted for
standard users. That being said, it is not always necessary to log all the way
off and log back in as root in order to do these tasks. For example, if you
have ever used the ‘run as admin’ command in Windows, then you will
know the basic concept behind ‘sudo’ or ‘superuser (root) do’ for whatever it
is you want it to do. It’s a very simple and elegant method for reducing the
amount of time you need to be logged in as a privileged user. The more time
a user spends with enhanced permissions, the more likely it is that
something is going to go wrong – whether accidentally or intentionally.
26- You find out that there is an active problem on your network. You can
fix it, but it is out of your jurisdiction. What do you do?
This question is a biggie. The true answer is that you contact the person in
charge of that department via email – make sure to keep that for your
records – along with CCing your manager as well. There may be a very
important reason why a system is configured in a particular way, and
locking it out could mean big trouble. Bringing up your concerns to the
responsible party is the best way to let them know that you saw a potential
problem, are letting them know about it, and covering yourself at the same
time by having a timestamp on it.
33- What’s the difference between a White Box test and a Black Box test?
Information given by the person commissioning the test. A White Box test is
one where the pen testing team is given as much information as possible
regarding the environment, while a Black Box test is…well…a Black Box.
They don’t know what’s inside.
38- What is the Three-way handshake? How can it be used to create a DOS
attack?
The three-way handshake is a cornerstone of the TCP suite: SYN, SYN/ACK,
ACK. SYN is the outgoing connection request from client to server. ACK is
the acknowledgement of the server back to the client, saying that yes I hear
you, let’s open a connection. SYN/ACK is the final connection, and allows
the two to speak. The problem is that this can be used as a very basic type of
Denial of Service Attack. The client opens up the SYN connection, the server
responds with the SYN/ACK, but then the client sends another SYN. The
server treats this as a new connection request and keeps the previous
connection open. As this is repeated over and over many times very quickly,
the server quickly becomes saturated with a huge number of connection
requests, eventually overloading its ability to connect to legitimate users.
40- If you were going to break into a database-based website, how would
you do it?
And here’s other side of the coin: learning to break into your own systems so
that you can pen test them yourself. While the exact methods are different
for each type of database server and programming language, the easiest
attack vector to test for first is an SQL injection technique. For example, if the
input fields are not sterilized, just entering a specific set of symbols into a
form field may be enough to get back data. Alternatively, depending again
on how the site is written, using a specially crafted URL may be enough to
get back data as well. Footprinting the server ahead of time can help in this
task if it isn’t one you built yourself.
43- Why is deleted data not truly gone when you delete it?
When you press delete on a file, it doesn’t actually go anywhere. A bit on the
file is flipped telling the operating system that that file is no longer needed
and it can be overwritten as is required. Until that happens, the file can still
be restored no matter if it’s in a Recycling Bin or not. There are ways around
this, such as using File Shredders and disk wipers, but both of these take
quite a bit of time to finish their jobs to a reasonable degree.
45- How would you permanently remove the threat of data falling into the
wrong hands?
If data is on physical media such as a diskette, cd or even paper, there are
shredders, pulverizers and destroyers that can turn plastic and paper into
confetti. For hard disks however, that becomes a bit more tricky. Most
locations will turn to a two-fold method for ensuring a disk’s destruction by
first using a specially made disc wiping program, taking apart the hard
drive, removing the platters, scratching them up beyond recognition and
then degaussing them with a high-powered magnet. This ensures that the
data cannot be recovered through conventional means.
48- I’m the CEO of a Fortune 500 company. I make more in an afternoon
than you make in a year. I don’t care about this stupid security stuff, it just
costs time and money and slows everything down. Why should I care
about this junk?
This one is significantly harder – they are used to having people lie, cheat
and steal from them on a regular basis, and when somebody comes in saying
that the company is going to lose all this money unless you pay for this,
they’re probably going to say no. Therefore, having done your homework
and having the support of the local IT team instead of alienating them is
vital. Performing site assessments, creating executive summaries and line-
by-line breakdowns of what goes where can help them to better understand
what is going to be done and keep the project going.
49- I’m the legal council for a large corporation. We have requirements to
document assets and code changes. We have a very limited budget for this
task. How would you resolve this?
This is actually one of the easier ones – you have an informed party, asking
for assistance to something that is important. They have money for the
project (albeit not much), but it is better than nothing. At the very bottom of
the spectrum, this could be accomplished in nothing more than Excel with a
lot of time and data entry, moving all the way up the chain to automated
Network Scanners documenting everything they find to a database and
programs that check-in and out programs with versioning and delta files. It
all depends on how big the project is, and how big the company is.
12. What are the differences between HTTPS, SSL, and TLS?
HTTPS is hypertext transfer protocol and secures communications over a
network. TLS is transport layer security and is a successor protocol to SSL.
You have to demonstrate that you know the differences between the three
and how network-related protocols are used to understand the inherent
risks involved.
13. What sorts of anomalies would you look for to identify a compromised
system?
There are multiple ways to answer this, but again, you need to show your
expertise and ingenuity. One possible answer is drawing out a basic network
architecture with its IPS/IDS, firewalls, and other security technologies to
describe the type of traffic and other signs of compromise.
14. If you had to both compress and encrypt data during a transmission,
which would you do first?
Compress and then encrypt, since encrypting first might make it hard to
show compression having much of an effect.
16. How would you defend against a cross-site scripting (XSS) attack?
Every cybersecurity professional should know this, even if it is difficult to
answer. Come prepared with a thoughtful, concise plan for defending
against this JavaScript vulnerability.
17. What are the differences between cybersecurity in the cloud and on
premises?
Show that you understand the security risks inherent to both and which
might be more appropriate for the company.
IT Support Specialist
Requirements
3-5 years of experience working in IT support in a corporate environment required
• Computer Science degree/work experience or similar required
• Windows 10 installation & troubleshooting experience required
• Microsoft Office 365/Skype for Business (or Teams) experience required
• Active Directory experience and understanding of Group Policy, DNS, DHCP required
• Strong understanding of basic networking/system troubleshooting required
• Strong understanding and experience with ticketing systems/escalation protocols required
• MDM/VPN/Microsoft In tune experience a plus
• Vendor/Project Management experience a plus
• Familiarity with security applications/processes a plus
Example: "I applied to your company because your team is making life easier and
more enjoyable for millions of people. The scale of your work is tremendous, and I
feel like my work here can have a real positive impact. I also love the company
culture and how there's a focus on teamwork and collaboration."
What makes you qualified for this job?
With this question, you can hear about the applicant's education, experience and other qualifications
and skills in more detail.
Example: "I feel that I'm qualified because I have a bachelor's degree in computer
science. I have advanced skills with customer support tools like Zendesk. Also, I
have five years of experience as a technical support specialist in the software
industry. I know your company operates on global scale, and I can provide support
in both English and Spanish."
What is your troubleshooting process?
The goal of technical support is to provide help and advice to customers about products. You must
understand how applicants go about solving customer issues because it's crucial to customer retention and
business success.
Example: "I first gather info and facts from the customer, then identify and verify
the issue. Next, I try common quick fixes. If that's not successful, I use additional
resources to research the issue. Once a solution is found, I perform appropriate
repairs or replacement if necessary. After the solution is implemented, I test
thoroughly to ensure everything is OK."
Describe a time when you went above and beyond to help a customer.
Many situations require more help than just a quick fix. You should want applicants that can
recognize and solve new or unknown problems.
Example: "At my previous company, I remember one customer had an issue that
kept happening. The common fixes we were using were only temporarily solving the
problem. After doing a bit of research, I was able to design and develop a new
solution. I called the customer personally and implemented the repair."
Is technical knowledge or customer service more important?
Technical support specialists must have the right mix of technical and people skills.
Example: "First, let me say that customer service skills are very important. You must
be able to empathize with people and address needs. Good communication is
crucial. With that said, I have a technical background, and I understand the amount
of knowledge you need to actually solve issues. Technical skills are more important
because, without in-depth knowledge of the hardware and software, you won't be
able to efficiently do your job."
Where do you see yourself in five years?
With this question, you can understand career goals.
Example: "In this position, I plan to add skills and experience. Honestly, I would like
to move into a management role in technical support within five years. What I really
like about this company is how they actively develop employees. I feel like I can
consistently improve here and move into bigger roles for your organization."
Technical Questions
1) Mention what is Active Directory?
An active directory is a directory structure used on Microsoft Windows based servers and computers to
store data and information about networks and domains.
2) Mention what are the new features in Active Directory (AD) of Windows server 2012?
• dcpromo (Domain Controller Promoter) with improved wizard: It allows you to view all the
steps and review the detailed results during the installation process
• Enhanced Administrative Center: Compared to the earlier version of active directory, the
administrative center is well designed in Windows 2012. The exchange management console is well
designed
• Recycle bin goes GUI: In windows server 12, there are now many ways to enable the active
directory recycle bin through the GUI in the Active Directory Administrative Center, which was not
possible with the earlier version
• Fine grained password policies (FGPP): In windows server 12 implementing FGPP is much
easier compared to an earlier It allows you to create different password policies in the same domain
• Windows Power Shell History Viewer: You can view the Windows PowerShell commands that
relates to the actions you execute in the Active Directory Administrative Center UI
3) Mention which is the default protocol used in directory services?
The default protocol used in directory services is LDAP ( Lightweight Directory Access Protocol).
4) Explain the term FOREST in AD?
Forest is used to define an assembly of AD domains that share a single schema for the AD. All DC’s in the
forest share this schema and is replicated in a hierarchical fashion among them.
5) Explain what is SYSVOL?
The SysVOL folder keeps the server’s copy of the domain’s public files. The contents such as users, group
policy, etc. of the sysvol folders are replicated to all domain controllers in the domain.
Mention what is the difference between domain admin groups and enterprise admins group in
AD?
Enterprise Admin Group Domain Admin Group
Windows 10
RUN THE WINDOWS UPDATE TROUBLESHOOTER
Windows 10 includes a troubleshooter that can automatically detect and try to fix problems with
updates and patches. If the problem isn’t clear and you aren’t sure what to do next, try running
this troubleshooter. It doesn’t always find a solution, but it’s a good place to start.
XAMPP: It’s a software which helps to create dynamic website such as to create dynamic
website by using HTTP or PHP, Mysql.
1. Question 1. Please Describe The Importance You Place On Customer Service Versus
Technical Skills?
Answer :
Most interviewers like to start with big picture questions and then work their way into more
technical areas. IT is a service organization and customer service is at its core. In particular,
customer service skills are just as important as technical skills, particularly in panic situations
when systems are down or the user has just deleted their board presentation that’s due in 30
minutes. We’ve all had these situations. You should be prepared to talk about a specific situation
where you’ve excelled and received accolades from an end-user. If they put it in writing, mention
that as well.
2. Question 2. What Steps Do You Take When Troubleshooting A Networking Issue?
Answer :
As a support technician, your job is to solve problems. This question provides the interviewer with
insight into your troubleshooting skills. Of course, the most important part of troubleshooting any
problem is to divide the tasks of problem resolution into a systematic process of elimination, like
this:
1. Define the problem.
2. Gather detailed information.
3. Consider probable cause for the failure.
4. Devise a plan to solve the problem.
5. Implement the plan. 6. Observe the results of the implementation.
6. Repeat the process if the plan does not resolve the problem.
7. Document the changes made to solve the problem.
Be prepared before the interview, so you can provide an example of these skills in action.
Computer Technical Support Interview Questions
o Question 5. A User Complains That When She Prints A Document In Any Application,
The Printer Prints Garbage. What Is The Most Likely Cause Of The Problem?
Answer :
This question starts the behavioral interviewing questions based on real-life situations that assess
your problem-solving skills and your technical skills. They will range from the general (like this
question) to very specific technical questions that determine your knowledge level and skill set.
Don’t worry if you don’t have all the answers. The interviewer is mostly interested in how you would
resolve the situation and what resources you would use to do so.
Networking Interview Questions
o Question 6. A User's Roaming Profile Is Not Accessible. Describe How You Would
Solve This Problem?
Answer :
This question tests your troubleshooting skills. In this situation you may want to talk about which
tests you would perform in order to resolve the issue. These may include:
1. Ensuring that the path to the profile directory is correct on the user’s account
properties.
2. Ensuring that the server where the profile resides is accessible.
3. Ensuring that the user has Full Control permissions to the Profile directory.
o Question 7. A User Has Left The Company And You Need To Create A New User With
The Same Rights And Permissions. Please Describe Some Of The Ways To Create The New
User?
Answer :
This question tests your ability to get the job done in the most efficient way possible. For example,
you can create new accounts from scratch and assign the original rights to the accounts or you
can simply rename the old account for the new user, which saves you a lot of time and effort.
CCNA Interview Questions
o Question 8. What Are The First Things You Check When A User Is Experiencing
Problems Accessing The Network?
Answer :
This question assesses your basic network troubleshooting skills. You can’t miss this one! You
should be able to answer it in your sleep. You can liven up the interview by providing a funny story
about user errors that you’ve encountered.
o Question 9. What Tools Do You Have Available To You For Troubleshooting?
Answer :
At this point, the interviewer is testing your resourcefulness. This is a pretty generic question, so
make sure that your answer is consistent with the overall theme of the interview. The tools
available may include server log files, network analyzers, error messages, README files, telephone
support, or vendor technical support web sites or CD-ROMs. Don’t forget to mention vendor-
specific resources that you may use, like TechNet Online, or any other subscriptions that you may
have in your bag of tricks. The final resource is of course your colleagues who may have run into
this situation in the past.
Active Directory Interview Questions
o Question 10. A User Cannot Access The Local Intranet. What Would You Try First In
Helping To Determine How To Narrow The Problem Down To The Intranet?
Answer :
Don’t make this question harder than it really is. Sometimes the interviewer will try to trip you up to
test your common sense. Go for the obvious, rather than complicating the situation. In this case,
simply trying to access the intranet from another workstation would help isolate the problem to the
machine.
o Question 11. Several Users Can't Log In To The Server. What Would You Do To
Narrow The Problem Down To The Workstations, Network, Or Server?
Answer :
The situation gets a little more interesting. Again, keep it simple, such as checking the server
console for user connections to see if other users are able to log into the server. If they can, the
problem is most likely related to those users’ workstations. If they can’t, the problem is either the
server or network connection.
Hardware and Networking Interview Questions
o Question 12. Which Software Troubleshooting Tool Could You Use To Determine
Which Protocol Is Configured With The Wrong Address?
Answer :
Questions like these assess your knowledge of troubleshooting tools that can help you resolve
problems faster. In this case, a typical tool used to determine incorrectly configured addresses is a
protocol analyzer. It can be used to examine the details of packets as they travel across the wire.
This is a sophisticated tool that requires a deeper understanding of network protocols. Any
interviewer will be impressed if you’ve used such a tool in troubleshooting.
Computer Technical Support Interview Questions
o Question 13. Which Hardware Troubleshooting Tool(s) Could You Use To Find Out
Where A Cable Is Routed?
Answer :
Here’s another question regarding troubleshooting tools. In this case you might want to use a tone
generator and tone locator to find out where cables are routed. These tools are alternately known
as fox and hound devices. These are more advanced tools that represent a higher skill level.
Whenever possible, provide an example of a sticky situation where you’ve had to rely on tools such
as these for troubleshooting.
o Question 14. Which Windows Nt Utility Do You Use To Manage The Major Windows
Nt Log Files?
Answer :
Typically, the interviewer or someone more technical than the IT manager will ask you detailed
operating system–specific questions to assess your knowledge of the various products.
Alternately, you may be asked to take an assessment exam like Brainbench.
o Question 15. A User Calls You, Complaining That He Can't Access The Corporate
Intranet Web Server. You Try The Same Address, And You Receive A Host Not Found Error.
Several Minutes Later, Another User Reports The Same Problem. You Can Still Send E-mail And
Transfer Files To Another Server. What Is The Most Likely Cause Of The Problem?
Answer :
The interviewer will assess your skills as they relate to all aspects of networking, not just servers.
This means you should be prepared to answer questions on web servers as well as local networks.
In this case, because other people are experiencing the problem, the problem is most likely either
network- or server-related. And because you can transfer files to and from another server, it can’t
be the network. Thus, the problem is related to the web server.
Firewall Support Interview Questions
o Question 16. You Are Connecting A Cubicle Farm To Your Network. You Install Nics
In All The Workstations And Run Cables To A Workgroup Hub. You Then Connect The Mdi Port
On The Workgroup Hub To The Main Hub With A Standard Patch Cable. Upon Powering Up The
Cubicle Farm Computers, None Of Them Can See The Servers On The Network. What Could You
Replace To Solve This Problem?
Answer :
Networking devices like hubs, switches, and routers will also be part of the technical interview. It is
expected that you can speak fluently on both software and hardware issues.
o Question 17. A User From The Marketing Department Calls Complaining That She
Can't Log In Or See Any Servers On The Network. Her Computer Operates Fine Otherwise. No
Other Users From The Marketing Department Are Reporting Any Problems. What Is The First
Thing You Could Check?
Answer :
You should also expect to be assessed on your knowledge of the physical layer of the OSI model.
IIS ADMIN Interview Questions
o Question 18. You Are Installing A Windows Xp-based Tcp/ip Network. You
Accidentally Set Workstation B To The Same Ip Address As Workstation A. Which Workstation(s)
Will Receive An Error Message?
Answer :
This type of question assesses your TCP/IP configuration knowledge. It’s a common problem, but
a little tricky based on the configuration mentioned above. The correct answer here is that through
broadcasts, both workstations will detect if there is a duplicate IP address on the network and will
display error messages to that effect.
Networking Interview Questions
o Question 19. Which Tcp/ip Utility Is Most Often Used To Test Whether An Ip Host Is
Up And Functional?
Answer :
TCP/IP is at the core of just about every network today. You must be familiar with the most often
used commands for managing this network environment. This includes Ping, ipconfig, FTP, and
tracert. You should also be ready to apply these commands and utilities to various situations, as
the next question demonstrates. Some sample additional questions include:
1. Which utility can you use to find the MAC and TCP/IP address of your Windows NT or
2000 workstation?
2. Which program can you use to upload and download files to a Unix server?
3. Which utility can you use to verify a packet’s path?
o Question 20. You Are The Network Administrator. A User Calls You Complaining That
The Performance Of The Intranet Web Server Is Sluggish. When You Try To Ping The Server, It
Takes Several Seconds For The Server To Respond. You Suspect The Problem Is Related To A
Router That Is Seriously Overloaded. Which Workstation Utility Could You Use To Find Out Which
Router Is Causing This Problem?
Answer :
The answer here is the tracer out utility, which will tell you which router is having the performance
problem and how long it would take to travel between each host. You should be knowledgeable on
the application of the most common IP commands for the various operating systems you support.
Other questions along this line that you may run into include:
1. Which ipconfig switch will display the most complete listing of IP configuration
information for that station?
2. Which Windows TCP/IP utility could you use to find out whether a server is responding
on TCP port 21?
Desktop Support Interview Questions
o Question 21. Depending On The Windows Client Operating System Version, Which
Commands Can You Use To Find Out What Is Installed On A System?
Answer :
You may run into operating system–specific questions like this one as you are being interviewed
by prospective peers. You should be familiar with the most common commands. Don’t worry about
memorizing command syntax. That’s what the /? is for.
o Question 22. Which Power Condition Occurs When The Voltage Level Drops Below
120 Volts And Stays Below For An Extended Period Of Time?
Answer :
Questions about power conditions don’t rank very high, though they are important. Network
support technicians will be faced with many different scenarios. Be familiar with these types of
conditions just in case.
o Question 23. A Customer Running Windows Xp (home Edition) With An Antivirus
Application Installed Reports That He Has Downloaded A Program From The Internet And
Installed It In His Computer. After Installing The Program, He Started Receiving Emails From
People He Never Knew. The Customer Removed The Program From His Computer But He Is Still
Getting Those Emails. How Would You Help This Customer?
Answer :
Download the most recent virus signature files and scan this computer for viruses.
Technical Support Interview Questions
o Question 25. Which File Must Be Located In The Root Folder Of The Active Partition
For Dual Booting Of Windows Xp And Windows Me To Boot?
Answer :
Boot.ini
o Question 26. A Customer Calls And Says He Is Unable To Get Online. He Uses A
Cable Connection To Connect To The Internet On A Windows Xp Computer. You Ping 127.0.0.1
On His Computer And Get The Results That All The Packets Are Lost. What Should You Do Next?
Answer :
Rebuild the TCP/IP Stack in the users computer
Unix Production Support Interview Questions
o Question 27. Very Frequently, Users In Your Office Put Floppy Disks In The Drives
And Forget To Take Them Out. This Results In Boot-up Problems And Results In Support
Requests. How Would You Stop This Computer From Looking In The A: Drive For Boot Files First?
Answer :
Change the Boot Order in BIOS.
Active Directory Interview Questions
o Question 30. What Is The Command To Convert A Fat32 File System To Ntfs? Would
There Be Any Loss Of Data?
Answer :
The command is: CONVERT : /fs:NTFS. There will be no effect on the data. (Data will be safe).But
remember this: if you want to convert NTFS partition back to FAT32, you will have to re-format that
partition and select the FAT32 file system.
o Question 31. What Are The Features Of The Disk Defragmenter Tool In Windows Xp
And Windows 2000? Does The Windows Xp Version Have Any More Features Than The Windows
2000 Version?
Answer :
The features of the Disk Defragmenter Tool are the same in both Windows XP and Windows 2000.
They are:
1. Enhanced Analysis Functionality
2. A Compression option
3. Increased Defragmentation Option and an Automatic Defrag-Scheduling Option.
o Question 32. You Are A Desktop Support Technician At Eqs. One Of The Customers
Has Just Installed A Brand New Printer For Himself. This Customer Calls You After Some Time
And Says That Every Time He Tries To Print Something, All He Gets Is Some Garbled Text.
However, The Printer Prints The Test Page Fine. What Do You Think Is The Problem Here?
Answer :
The customer has installed an Incorrect Device Driver for the Printer. I would uninstall the driver,
from the WIndows Device Manager and install the correct Device Driver for the Printer from the
Disk that came with the Printer. (If the Disk is not available, I can still download the correct device
driver from the manufacturer’s website)
o Question 33. If, Upon Booting Up A Computer, You See The Error Message "keyboard
Error" What Do You Think Could Be The Problem?
Answer :
It could be that
1. The keyboard is not attached to the PC or
2. The keyboard has failed
Hardware and Networking Interview Questions
o Question 34. If You Turn On A Pc And The Boot-up Process Halts And You Get The
Error Message "non-system Disk Or Disk Error Replace And Press Any Key When Ready" What Do
You Think Could Be The Problem?
Answer :
A non-bootable Floppy Disk is in the Floppy-disk drive and it should be removed.
o Question 35. If, Upon Booting Up A Pc, You See A Message Which Says "invalid Drive
Configuration" What Do You Think Is Causing This?
Answer :
This problem could be due to any of the following situations:
1. The Hard-Disk cable within the System Unit is not attached to the Controller
2. The Hard Disk Drive has failed
3. The Hard Disk Drive has not been partitioned.
o Question 36. If You Turn On A Pc And The Boot Process Halts And You Get The Error
Message " C:system32config File Missing Or Corrupt" What Is This Due To?
Answer :
The Registry Hives are corrupted. They need to be repaired.
Firewall Support Interview Questions
o Question 37. A Customer Complains That He Keeps Getting The Error Message
"hal.dll Missing Or Corrupt". Which File Needs To Be Repaired/rebuilt To Rectify The Issue?
Answer :
BOOT.INI
o Question 38. You Have Norton 360. When The Firewall Is Turned On, You Are Unable
To Browse The Internet. But If You Turn Off The Firewall, You Are Able To Browse. What Is The
First Thing You Would Do To Fix This Problem?
Answer :
Reconfigure Norton Firewall to allow Internet Explorer to access the internet.
o Question 39. Which Utility Is Used To Do A Software Clean Boot?
Answer :
Msconfig
o Question 40. What Does A "?" Sign In Device Manager Signify?
Answer :
The device is not installed. ( You can refer to this article for more details). For more information on
Device Manager check this article from Microsoft.
IIS ADMIN Interview Questions
o Question 41. What Is The Command To Start Windows System Restore From The
Command Line?
Answer :
rstrui.exe
o Question 42. What Does The Term Uac Stand For?
Answer :
UAC stands for User Access Control. For more information read this article.
Desktop Support Interview Questions
o Question 43. You Are A Desktop Support Technician. A User Calls And Complains
That Till Yesterday He Was Able To View His Cd Drive In His Computer. But Today When He
Turned On His Computer, He Is Not Able To View The Cd-rom Drive In "my Computer". What Can
Be Done To Fix This Problem?
Answer :
Open the Windows Registry Editor and Delete the Upper and Lower Filter Keys.
o Question 44. A User Calls And Says That Whenever He Starts His Computer, It Boots
Up Only In Safe Mode. There Is No Other Error Message. What Would You Do To Fix This
Problem?
Answer :
Go to Msconfig and select Normal Mode and Restart the Computer.
o Question 45. A User Complains That Whenever He Connects Any Usb 2.0 Device To
His Computer, He Gets The Error Message "usb Device Not Recognized" What Could Be The
Possible Reason For This?
Answer :
The USB Port could be faulty.
o Question 46. A User Complains That He Is No Longer Able To Hear Any Sound From
His Computer - After He Downloaded Some Updates From The Microsoft Website. What Could Be
The Possible Reason For This?
Answer :
The Windows Audio Service is Disabled. Enable it.
o Question 47. Mark Uses Windows Xp Professional And Is Connected To The Internet
Directly Through A Dsl Line. He Wants To Know How He Would Enable The Filtering Of Packets
And Get Rid Of The Harmful Incoming Data. What Would You Tell Him?
Answer :
Enable the Firewall
o Question 48. A Customer Reports That His Windows Xp Professional Portable
Computer Is Not Able To Connect To Any Network Resource And Is Also Not Able To
Authenticate On The Network's Active Directory Domain. The Computer Was Fine Yesterday. No
Other Person In The Organization Is Facing This Problem. What Is The First Thing You Would Do
To Fix This Problem?
Answer :
Ask the user to Right-Click on the Network Connection icon and select “Repair” from the Menu.
o Question 49. A Customer Has Recently Upgraded From Windows 98 To Windows Xp
Professional. After The Upgrade, It Takes Longer For Windows, Menus, Sub-menus And Other
Use Interface Features To Open. She Wants Them To Open Faster. How Can You Help This
Customer?
Answer :
Use System in Control Panel and select the option “Adjust for Best Performance” in the
Performance Options dialogue box.
o Question 50. You Suspect That Your Computer Is Failing Because Of A Corrupt
Master Boot Record. Which Utility Is The Best To Fix This Problem?
Answer :
Recovery Console (By Using the fixmbr command)
o Question 51. You Performed A Parallel Installation Of Windows Xp (home Edition) To
Resolve Certain Problems On A Customer's Computer. After Installation, The Customer Says She
Can See The Previous Profile Folders In Documents & Settings But When She Tries To Open
Then, She Gets An "access Denied" Error. What Can You Do To Remove The "access Denied"
Problem?
Answer :
Boot into Safe Mode, Right-Click on the Old Profile Folder, Go to Security – Advanced and give
Ownership to the new user.
o Question 52. A Customer Calls In And Says That Her Copy Of Windows Xp Went
Corrupt And The Previous Technician Installed It Again Without Losing Any Data. Now When The
Computer Boots Up, It Shows A Menu For A Few Seconds And Then It Boots Normally.she Wants
To Get Rid Of This Menu. You Asked Her About The Menu Options And The Customer Tells You
That Both The Options In The Menu Read The Same Thing Windows Xp Home. How Will You Fix
This Problem So That The Menu Does Not Appear Again?
Answer :
Edit the Boot.ini file and set the Timeout as 0 (Zero) or Edit the Boot.ini file and Remove the Second
Option and set the Timeout as 0 (Zero)
o Question 53. What Are Hard-disk Partitions?
Answer :
Partitions are used to Divide a Hard-disk drive into smaller segments as required by the user and
for better management of the space in it.
o Question 54. Difference Between Ram And Rom?
Answer :
RAM (Random Access Memory): is used to temporarily store information that the computer is
currently working on.
ROM (Read Only Memory): This is a Permanent type of memory storage used by computers for
important data which never changes. (Example: BIOS)
o Question 55. What Would You Check If There Is No Sound From Your Computer?
(audio Not Working)
Answer :
1. Check for cable connections
2. Check for power to the speakers
3. Check for volume control
4. Check for device drivers
o Question 56. If A Customer Complains That His Computer Is Working Really Slow,
What Are The Things You Would Check?
Answer :
1. Check if it is taking longer than usual to start up
2. Check if it is slow with one / any particular application or slow overall.
3. Check for Spyware/Malware/Virus in the computer
4. Check the available Hard-Disk Drive Space in the computer.
o Question 57. What Is The Blue Screen Of Death (bsod)?
Answer :
A Blue Screen of Death (or just a Blue Screen Error) is an indication of a Critical System Problem
wherein the Computer freezes all together and does not respond to anything.
To rectify this problem, try Restarting the computer or Booting into Safe Mode. For more
information, read this.
o Question 58. Why Are Device Drivers Required?
Answer :
A Device Driver (or just Driver) is a piece of software which is required to run every Hardware
Component present in the computer.
o Question 59. Name One Of The Latest Computer Processors (cpu) ?
Answer :
Intel Pentium Quad Core, Intel I3, I5, I7 processors.
o Question 60. What Is Ping?
Answer :
Ping is a command that checks the connectivity with an IP address. For more read this article.
o Question 61. What Is A Data Cable?
Answer :
A Data Cable is a Thin Plastic band-like cable used to connect the Data-Devices like Hard-disk
drives, Floppy Disk Drives, CD/DVD-ROM drives with the motherboard. Data Cables are primarily
used for Data Transfer.
o Question 62. What Does The Term Usb Stand For?
Answer :
USB stands for Universal Serial Bus. It allows devices to be connected or disconnected from a
computer without shutting down or restarting the computer. The current version of USB is 2.0
o Question 63. What Is The Difference Between Crt (cathode Ray Tube) And Lcd (flat
Screen Monitors)?
Answer :
CRT Monitors: The Monitor has a picture tube and uses a light-gun to highlight pixels on the
screen.
LCD Monitors: These monitors do not have a picture tube and contain a layer of liquid crystals on
an Electronic Board.
o Question 64. What Is An Ip Address?
Answer :
An IP address is a unique numerical identifier of every device on a network. A typical IP address
can look like this: 216.27.61.141. To detect a computer’s IP Address, go to Start – Run – Type in
CMD in the Run Dialogue Box and click OK or hit <Enter> In the Command Prompt Screen that
comes up, type in IPCONFIG and hit <Enter>
o Question 65. What Is Dhcp?
Answer :
DHCP stands for Dynamic Host Configuration Protocol. It is used to generate & provide IP
addresses to the computers on a network.
o Question 66. What Is Dns?
Answer :
DNS stands for Domain Name Services – it is used to convert URLs into IP addresses and vice-
versa.
o Question 67. What Are Rj45 And Rj11 Connectors?
Answer :
RJ45 connectors are used for LAN/Ethernet connections and RJ11 connectors are used for
Telephone Cable connections.
o Question 68. What Is A Parallel Windows Installation?
Answer :
When the first installation of Windows fails to boot for some reason, another copy of Windows is
installed in the same drive but in a different directory (so that the customer can access to and
backup his old data). This is called Parallel Installation of Windows.
o Question 69. Name Some Of The Versions Of Windows Xp?
Answer :
Windows XP Home Edition, Professional, Media Center Edition, Tablet PC Edition, Mobile
o Question 70. What Are The Components Needed To Setup A Basic Home Network?
Answer :
LAN Cards, LAN Cables, Router/Hub
o Question 71. Difference Between A Work Group And A Domain?
Answer :
In a Workgroup, all the computers function as Peers. But in a Domain, One computer is the Server
and the others are Clients.
o Question 72. What Is The Difference Between Fat32 And Ntfs File Systems?
Answer :
1. NTFS allows compression and file encryption. FAT32 does not.
2. NTFS is more secure than FAT32
o Question 73. What Does Boot.ini Do?
Answer :
Boot.ini lists all the Operating Systems present in the computer and provide information about
which partitions they are located on.
o Question 74. How Would You Access The Recovery Console In Windows?
Answer :
By booting with the Windows XP CD and following the onscreen instructions. The Recovery
Console can also be installed in your computer.
o Question 75. What Feature Of Outlook Express Allows Multiple Customers To Send
And Receive Emails, Each Using A Separate Account?
Answer :
Identities
o Question 76. What Is A Link?
Answer :
A link refers to the connectivity between two devices. It includes the type of cables and protocols
used in order for one device to be able to communicate with the other.
o Question 77. What Are The Layers Of The Osi Reference Model?
Answer :
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session
Layer, Presentation Layer and Application Layer.
o Question 78. What Is Backbone Network?
Answer :
A backbone network is a centralized infrastructure that is designed to distribute different routes
and data to various networks. It also handles management of bandwidth and various channels.
o Question 79. Which Feature In Ms Outlook Express Allows Different Individuals Send
And Receive Emails In Ms Outlook Express Using Separate Accounts?
Answer :
The Identities feature allows multiple customers to send and receive emails using separate
accounts.
o Question 80. A Customer Running Windows Xp Home With An Antivirus Application
Installed In His Computer. He Downloaded A Program From The Internet And Installed It On His
Computer. After That, He Began To Receive E-mail Messages From Unknown People. The
Customer Removed The Program But He Is Still Receiving The E-mail Messages. You Need Help
The Customer, What Should You Instruct The Customer?
Answer :
Download the most recent virus signature files and scan his computer for viruses.
o Question 81. You Are Installing A New Windows Xp Configuration And You Like To
Specify Which Hal To Install. What Should You Do?
Answer :
Boot from the Windows XP CD to initiate Setup. At the point in text-mode set up where a message
at the bottom of the screen reads “Press F6 if you need to install a third party SCSI or RAID driver,”
press F5.
o Question 82. When You Are Configuring Power Management On Your Windows
Xp,who/what Will Control The Acpi Functions?
Answer :
ACPI will be fully controlled by The operating system.
o Question 83. Customer Gives A Call And States That He Is Unable To Get Online. He
Uses A Cable Connection To Get Online On Windows Xp Operating System. You Run The Ping
127.0.0.1 On His Computer And Get The Result As All The Packets Are Lost. What Is The Next
Step You Would Perform?
Answer :
Reset the TCP/IP stack
o Question 84. Frequently, Users In Your Office Leave Floppy Disks In Drives. This
Causes Problems When Users Attempt To Boot With Floppies Still In Drive And Results In A
Support Request. You Want To Change The Computer From Seeking The A: Drive As The First
Drive To Boot From. Which Of The Following Is The Best Way To Do This?
Answer :
Change the boot order in CMOS
o Question 85. The Range Of Ip Address That Ics (internet Connection Sharing) Use By
Default Is 192.168.0.1 Through 192.168.0.254. What Is The Ip Address Of The Machine On
Which You Enabled The Ics Option?
Answer :
192.168.0.1
o Question 86. After Rebooting Your Windows Xp Professional Computer, Your Monitor
Shows A Blank Blue Screen. You Remember That A Video Driver Was Just Installed. Which Is The
Best Way To Recover From This?
Answer :
Reboot and press F8. From the advanced option menu select the “Last Known Good Configuration”
option.
o Question 87. If You Need To Dual Boot A Computer With Windows Xp ( Professional)
And Windows (me) And Allow All Partitions To Be Accessible From Both Operating Systems,
Which File System Should Be Used When Creating The Partitions?
Answer :
FAT32
o Question 88. What Is The Difference Between The Disk Defragmenter Tool In Win Xp
& Win 2000?
Answer :
None.
o Question 89. Imagine You Are A Desktop Support Technician. One Of Your
Customers Has Just Installed A New Printer By Himself. The Customer Later Called And Said
That Whenever He Tried To Print, The Printer Only Prints Some Garbled Text. Surprisingly, Prints
The Test Page Prints Normally. What Do You Think Is The Problem?
Answer :
The customer installed the wrong printer driver.
o Question 90. If You Turn On Your Computer And You Get The Message: "non-system
Disk Or Disk Error, Replace And Press Any Key When Ready", What Do You Think The Problem Is
Likely Due To?
Answer :
A non-bootable floppy disk is in the floppy-disk drive and should be removed.
o Question 91. You Start Up Your Computer And Get A Message Which Says "keyboard
Error", What Might Be The Cause Of This Error?
Answer :
Either the keyboard is not connected to the PC or it is not working.
o Question 92. If You Turn On A Pc And The Boot-up Process Halts, Giving You The
Message: C:/system32/config File Missing Or Corrupt, How Would You Fix It?
Answer :
We can either repair the Windows registry hives or just repair the Windows installation using the
Windows installation disc.
o Question 93. If You Get An Error Message " Hall.dll Missing Or Corrupt" Which File(s)
Do You Think Is Causing The Problem?
Answer :
The error is being caused by corrupt a NTLDR or BOOT.INI file.
o Question 94. If You Are Unable To Access And Browse The Internet When You Have
The Norton 360 Firewall Turned On, But Able To Do So When It Is Turned Off, What Do You Think
You Should Do To Fix This Issue?
Answer :
This issue can be resolved by configuring the Norton 360 firewall to allow access to Internet
Explorer. (By creating an exception in Norton 360 for Internet Explorer.)
o Question 95. If You Are Unable To Install Windows Vista Home Premium On A
Computer With A 1 Ghz Processor, 512 Mb Ram, 500 Gb Hdd What Do You Think Can Fix This
Issue?
Answer :
This issue can be solved by adding more RAM. We should have at least 1GB of RAM. (Remember,
the more memory you add, the more it helps your computer function effectively.
o Question 96. Which Windows Utility Helps To Clean Boot Your Pc?
Answer :
The Windows MSCONFIG utility can be used to Clean Boot a PC.
o Question 97. If You See A "?" Next To Any Component In The Windows Device
Manager, What Does It Mean?
Answer :
The ‘?’ in Device Manager means that the device is not properly installed. It could also mean that
the driver for a device is not installed.
o Question 98. What Is The Name Of The Executable File For Windows System
Restore?
Answer :
The name of the executable file for Windows System Restore is called “Rstrui.exe”. However, if you
have to type it in the “Run” box, it is advisable to use the full path for the file, which is
“C:windowssystem32restorerstrui.exe”.
o Question 99. What Do You Think The Acronym Uac Stands For?
Answer :
The acronym UAC stands for “User Account Control” (a Windows Vista feature.)
o Question 100. How Do You Boot In The Recovery Console?
Answer :
We can boot up to the Recovery Console by using the windows XP CD to start up the computer and
select then select the option “press R to repair the Windows XP Installation”.
o Question 101. You Shared Some Files On Your Computer. Your Friend Tried To
Access The Files You Shared But Ws Unable To Do So. He Kept Getting The Error "the Network
Path Was Not Found". What Do You Think Is The Problem?
Answer :
This could mean that both the computers are not on the same network. You can put them on the
same network by running the network setup wizard on both the computers.
o Question 102. If You Are Not Able To View Your Cd-rom Drive In "my Computer",
What Would You Do To Fix It?
Answer :
This issue can be fixed by editing the Windows Registry and deleting the upper and lower filter
keys. (Caution: Always remember to backup the registry before attempting to edit it.)
o Question 103. What Would You Do If Your Computer Keeps Booting Into Safe Mode
All The Time? There Are No Error Messages?
Answer :
In this situation, we can check if the “/SAFEBOOT” option is not checked in MSConfig. We also
need to make sure that the “Normal Startup” option is selected. Another thing we can do is to start
up the computer to the Last Known Good Configuration (LKGC), from the Windows Advanced Boot
Menu options.
o Question 104. What Would You Do If You Keep Getting The Error Message "usb
Device Not Recognized" When You Connect Any Usb Device To Your Computer?
Answer :
You get this error if either the USB drivers are not installed or the USB port(s) are not working
properly.
o Question 105. If There Is No Audio From Your Computer After You Have Downloaded
Some Updates For Your Windows Xp Operating System From The Microsoft Website, What Do
You Think Could Be The Problem?
Answer :
Check if the Windows Audio Service is disabled and if it is, enable it to fix the issue.
o Question 106. How Will You Enable Packet Filtering When Your Computer Is
Connected To The Internet Using A Dsl Connection?
Answer :
You can enable packet filtering in a Windows XP computer from the Advanced TCP/IP properties.
Alternatively, you can also configure the Windows Firewall.
o Question 107. After Upgrading To Windows Xp Professional From Windows 98, The
Computer Has Really Slowed Down. The Windows, Menus And Other Options Take A Long Time
To Open. What Can You Do To Make Them Open Up Faster?
Answer :
Select the “Adjust for best performance” option in the advanced system properties.
o Question 108. Which Command Would You Use In The Recovery Console To Retrieve
A Compressed File From The Hard-disk Drive?
Answer :
The command to be used here is: Expand
o Question 109. Which Command(s) Would You Use To Get A List Of All Microsoft
Signed Drivers On Your Computer?
Answer :
Type winmsd or msinfo32 in the command prompt, expand Software Environment and then select
“Signed drivers“.
o Question 110. When Would You Normally Perform A Clean Install Of Windows Xp?
Provide Any Two Circumstances?
Answer :
A “Clean” installation of Windows XP can be done either when the current installation has to be
completely removed and replaced or when there is no Operating System (OS) installed in the
computer.
o Question 111. Frequently, Users In Your Office Leave Floppy Disks In Drives. This
Causes Problems When Users Attempt To Boot With Floppies Still In Drive And Results In A
Support Request. You Want To Change The Computer From Seeking The A: Drive As The First
Drive To Boot From?
Answer :
Change the boot order in CMOS.
o Question 112. What Extra Features Does The Disk Defragmenter Tool Have In Win Xp
That The Win 2000 Version Lacks?
Answer :
A compression-option.
o Question 113. Which Of The Email Clients Support A Web Based Email Account?
Answer :
Windows Live Mail
o Question 114. What Does A "?" Signify In The Device Manager?
Answer :
Device not installed.
o Question 115. How Do You Get To The Recovery Console With Windows Xp?
Answer :
Boot to the Windows XP CD> Press R for repair through Recovery Console
o Question 116. What Does Scandisk Do?
Answer :
Scans and Repairs errors on your computer drives
o Question 117. Which Key In Windows Xp Would You Use To Boot The Computer To
Access The Windows Advanced Options Menu?
Answer :
F8
o Question 118. If You Upgrade To Windows Xp Professional From Windows Xp Home
And The Computer Does Not Function Properly. How Would You Remove Windows Xp
Professional From The Computer?
Answer :
Uninstall it from the Add/Remove Programs
o Question 119. You Need To Prevent Some Program From Starting Up At Boot. How
Will You Accomplish The Task On A Windows Xp Pc?
Answer :
Msconfig -> Startup -> Uncheck unwanted programs.
o Question 120. How Will You Do A System Restore In Windows Xp From Command
Prompt?
Answer :
Run> CMD> C:windowssystem32restorerstrui.exe
o Question 121. What Should Be The First Step In Case We Get The Error "primary Hdd
Not Found"?
Answer :
Check whether HDD is detected in BIOS
o Question 122. To Install Usb Devices That Are Plug And Play Compliant Using Win
Xp?
Answer :
Just plug the device in and it will be detected automatically even without restarting the computer.
o Question 123. The Motherboard On Your Windows Xp System Is Bad And You Have It
Replaced. After Installing The New Motherboard, Your System Continuously Reboots After Post
When Loading Windows. How Do You Correct This?
Answer :
Repair the installation by booting from the CD ROM and pressing R for repair.
o Question 124. Which Are The Two Devices You Need To Connect To The Internet?
Answer :
Modem and network card.
o Question 125. How Can We Check Version Of Internet Explorer ?
Answer :
Help>about internet Explorer
o Question 126. What Is The Default Browser That Comes With Windows Xp To Browse
The Internet ?
Answer :
None of the above
o Question 127. What Does Isp Stand For ?
Answer :
Internet Service Provider
o Question 128. What Do You Understand By Html ?
Answer :
Hypertext markup language
o Question 129. What Do You Understand By Ftp ?
Answer :
File transfer protocol.
o Question 130. Net Meeting Is A ____________________ Program From Microsoft?
Answer :
Chatting and conferencing
o Question 131. When You Try To Boot The Computer, You Get The Error Message:
Non- System Disk Or Disk Error. What Is The Most Likely Cause Of This Error Message ?
Answer :
You left a non-bootable disk in the floppy drive.
o Question 132. Donna Boots Up His Computer And, After A Brief Pause, It Produces
Two Short Beeps. However The Boots Up Fine. What Is Wrong With His System ?
Answer :
Nothing is wrong . In some computers two short beeps indicate a successful POST.
o Question 133. What Is The Maximum Segment Length Of A 100base-fx Network?
Answer :
The maximum allowable length for a network segment using 100Base-FX is 412 meters. The
maximum length for the entire network is 5 kilometers.
o Question 134. What Is Mesh Topology?
Answer :
Mesh topology is a setup wherein each device is connected directly to every other device on the
network. Consequently, it requires that each device have at least two network connections.
o Question 135. What Is Ipv6?
Answer :
IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being used
to control internet traffic, but is expected to get saturated in the near future. IPv6 was designed to
overcome this limitation.
o Question 136. What Is One Basic Requirement For Establishing Vlans?
Answer :
A VLAN requires dedicated equipment on each end of the connection that allows messages
entering the Internet to be encrypted, as well as for authenticating users.
o Question 137. When It Comes To Networking, What Are Rights?
Answer :
Rights refer to the authorized permission to perform specific actions on the network. Each user on
the network can be assigned individual rights, depending on what must be allowed for that user.
o Question 138. What Protocols Fall Under The Tcp/ip Internet Layer?
Answer :
There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and ARP.
o Question 139. What Is The Role Of Ieee In Computer Networking?
Answer :
IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of
engineers that issues and manages standards for electrical and electronic devices. This includes
networking devices, network interfaces, cablings and connectors.
o Question 140. What Is Sneakernet?
Answer :
Sneakernet is believed to be the earliest form of networking wherein data is physically transported
using removable media, such as disk, tapes.
o Question 141. Explain Profile In Terms Of Networking Concept?
Answer :
Profiles are the configuration settings made for each user. A profile may be created that puts a
user in a group, for example.
o Question 142. How Does Dynamic Host Configuration Protocol Aid In Network
Administration?
Answer :
Instead of having to visit each client computer to configure a static IP address, the network
administrator can apply dynamic host configuration protocol to create a pool of IP addresses
known as scopes that can be dynamically assigned to clients.
o Question 143. What Can Be Done To Fix Signal Attenuation Problems?
Answer :
A common way of dealing with such a problem is to use repeaters and hub, because it will help
regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated
is also a must.
o Question 144. When Troubleshooting Computer Network Problems, What Common
Hardware-related Problems Can Occur?
Answer :
A large percentage of a network is made up of hardware. Problems in these areas can range from
malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly hardware
configuration is also one of those culprits to look into.
o Question 145. What Is One Advantage Of Mesh Topology?
Answer :
In the event that one link fails, there will always be another available. Mesh topology is actually one
of the most fault-tolerant network topology.
o Question 146. What Are The Different Technologies Involved In Establishing Wan
Links?
Answer :
Analog connections – using conventional telephone lines; Digital connections – using digital-grade
telephone lines; switched connections – using multiple sets of links between sender and receiver
to move data.
o Question 147. What Do Mean By Tunnel Mode?
Answer :
This is a mode of data exchange wherein two communicating computers do not use IPSec
themselves. Instead, the gateway that is connecting their LANs to the transit network creates a
virtual tunnel that uses the IPSec protocol to secure all communication that passes through it.
o Question 148. Explain The Importance Of Authentication?
Answer :
Authentication is the process of verifying a user’s credentials before he can log into the network. It
is normally performed using a username and password. This provides a secure means of limiting
the access from unwanted intruders on the network.
o Question 149. How Are Ip Addresses Arranged And Displayed?
Answer :
IP addresses are displayed as a series of four decimal numbers that are separated by period or
dots. Another term for this arrangement is the dotted decimal format. An example is
192.168.101.2
o Question 150. What Is The Importance Of Encryption On A Network?
Answer :
Encryption is the process of translating information into a code that is unreadable by the user. It is
then translated back or decrypted back to its normal readable format using a secret key or
password. Encryption help ensure that information that is intercepted halfway would remain
unreadable because the user has to have the correct password or key for it.
o Question 151. What Is Multicast Routing?
Answer :
Multicast routing is a targeted form of broadcasting that sends message to a selected group of
user, instead of sending it to all users on a subnet.
o Question 152. What Is Smtp?
Answer :
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail, and
provides the necessary mail delivery services on the TCP/IP protocol stack.
o Question 153. What Is The Difference Between Csma/cd And Csma/ca?
Answer :
CSMA/CD, or Collision Detect, retransmits data frames whenever a collision occurred. CSMA/CA,
or Collision Avoidance, will first broadcast intent to send prior to data transmission.
o Question 154. What Are Some Drawbacks Of Implementing A Ring Topology?
Answer :
In case one workstation on the network suffers a malfunction, it can bring down the entire
network. Another drawback is that when there are adjustments and reconfigurations needed to be
performed on a particular part of the network, the entire network has to be temporarily brought
down as well.
o Question 155. In A Network That Contains Two Servers And Twenty Workstations,
Where Is The Best Place To Install An Anti-virus Program?
Answer :
An anti-virus program must be installed on all servers and workstations to ensure protection.
That’s because individual users can access any workstation and introduce a computer virus when
plugging in their removable hard drives or flash drives.
o Question 156. When You Move The Nic Cards From One Pc To Another Pc, Does The
Mac Address Gets Transferred As Well?
Answer :
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This also
means that a PC can have a different MAC address when the NIC card was replace by another one.
o Question 157. What Is The Difference Between A Straight-through And Crossover
Cable?
Answer :
A straight-through cable is used to connect computers to a switch, hub or router. A crossover
cable is used to connect two similar devices together, such as a PC to PC or Hub to hub.
o Question 158. What Is Ipconfig?
Answer :
Ipconfig is a utility program that is commonly used to identify the addresses information of a
computer on a network. It can show the physical address as well as the IP address.
o Question 159. You Need To Connect Two Computers For File Sharing. Is It Possible
To Do This Without Using A Hub Or Router?
Answer :
Yes, you can connect two computers together using only one cable. A crossover type cable can be
use in this scenario. In this setup, the data transmit pin of one cable is connected to the data
receive pin of the other cable, and vice versa.
o Question 160. What Protocols Fall Under The Application Layer Of The Tcp/ip Stack?
Answer :
The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet and SMTP.
o Question 161. What Is The Standard Color Sequence Of A Straight-through Cable?
Answer :
orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
o Question 162. What Are The Different Network Protocols That Are Supported By
Windows Rras Services?
Answer :
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
o Question 163. What Is The Difference Between A Hub And A Switch?
Answer :
A hub acts as a multiport repeater. However, as more and more devices connect to it, it would not
be able to efficiently manage the volume of traffic that passes through it. A switch provides a
better alternative that can improve the performance especially when high traffic volume is
expected across all ports.
o Question 164. What Advantages Does Fiber Optics Have Over Other Media?
Answer :
One major advantage of fiber optics is that is it less susceptible to electrical interference. It also
supports higher bandwidth, meaning more data can be transmitted and received. Signal degrading
is also very minimal over long distances.
o Question 165. What Is Peer To Peer?
Answer :
Peer to peer are networks that does not reply on a server. All PCs on this network act as individual
workstations.
o Question 166. What Is Icmp?
Answer :
ICMP is Internet Control Message Protocol. It provides messaging and communication for
protocols within the TCP/IP stack. This is also the protocol that manages error messages that are
used by network tools such as PING.
o Question 167. What Happens When You Use Cables Longer Than The Prescribed
Length?
Answer :
Cables that are too long would result in signal loss. This means that data transmission and
reception would be affected, because the signal degrades over length.
o Question 168. What Is The Number Of Network Ids In A Class C Network?
Answer :
For a Class C network, the number of usable Network ID bits is 21. The number of possible
network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per network ID is 2 raised to 8
minus 2, or 254.
o Question 169. What Is The Proper Termination Rate For Utp Cables?
Answer :
The proper termination for unshielded twisted pair network cable is 100 ohms.
o Question 170. One Way Of Securing A Network Is Through The Use Of Passwords.
What Can Be Considered As Good Passwords?
Answer :
Good passwords are made up of not just letters, but by combining letters and numbers. A
password that combines uppercase and lowercase letters is favorable than one that uses all upper
case or all lower case letters. Passwords must be not words that can easily be guessed by
hackers, such as dates, names, favorites, etc. Longer passwords are also better than short ones.
o Question 171. What Is The Use Of A Default Gateway?
Answer :
Default gateways provide means for the local networks to connect to the external network. The
default gateway for connecting to the external network is usually the address of the external router
port.
o Question 172. What Protocol Can Be Applied When You Want To Transfer Files
Between Different Platforms, Such Between Unix Systems And Windows Servers?
Answer :
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible
because FTP is platform independent.
o Question 173. How Can You Manage A Network Using A Router?
Answer :
Routers have built in console that lets you configure different settings, like security and data
logging. You can assign restrictions to computers, such as what resources it is allowed access, or
what particular time of the day they can browse the internet. You can even put restrictions on what
websites are not viewable across the entire network.
o Question 174. Can Wireless Mouse Carry A Virus?
Answer :
A big NO. Wireless mouse is nothing but a junk of hardware.It cannot be hacked or anything.If you
suspect that pointer on the screen is not working properly or moving on its own its probably due to
virus on your harddisk whose source is not WIRELESS MOUSE.
Here are some examples:
1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of
cables and protocols used in order for one device to be able to communicate
with the other.
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer,
Transport Layer, Session Layer, Presentation Layer and Application Layer.
LAN is short for Local Area Network. It refers to the connection between
computers and other network devices that are located within a small physical
location.
5) What is a node?
Routers can connect two or more network segments. These are intelligent
network devices that store information in its routing table such as paths, hops
and bottlenecks. With this info, they are able to determine the best path for
data transfer. Routers operate at the OSI Network Layer.
VPN means Virtual Private Network, a technology that allows a secure tunnel to
be created across a network such as the Internet. For example, VPNs allow you
to establish a secure dial-up connection to a remote server.
NAT is Network Address Translation. This is a protocol that provides a way for
multiple computers on a common network to share single connection to the
Internet.
15) What is the job of the Network Layer under the OSI reference
model?
The Network layer is responsible for data routing, packet switching and control
of network congestion. Routers operate under this layer.
Network topology dictates what media you must use to interconnect devices. It
also serves as basis on what materials, connector and terminations that is
applicable for the setup.
RIP, short for Routing Information Protocol is used by routers to send data from
one network to another. It efficiently manages routing data by broadcasting its
routing table to all other routers within the network. It determines the network
distance in units of hops.
There are several ways to do this. Install reliable and updated anti-virus
program on all computers. Make sure firewalls are setup and configured
properly. User authentication will also help a lot. All of these combined would
make a highly secured network.
NIC is short for Network Interface Card. This is a peripheral card that is
attached to a PC in order to connect to a network. Every NIC has its own MAC
address that identifies the PC on the network.
The physical layer does the conversion from data bits to electrical signal, and
vice versa. This is where network devices and cable types are considered and
setup.
There are four layers: the Network Layer, Internet Layer, Transport Layer and
Application Layer.
23) What are proxy servers and how do they protect computer
networks?
Proxy servers primarily prevent external users who identifying the IP addresses
of an internal network. Without knowledge of the correct IP address, even the
physical location of the network cannot be identified. Proxy servers can make a
network virtually invisible to external users.
This layer provides the protocols and means for two devices on the network to
communicate with each other by holding a session. This includes setting up the
session, managing information exchange during the session, and tear-down
process upon termination of the session.
25) What is the importance of implementing a Fault Tolerance
System? Are there limitations?
The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base
refers to base band, as oppose to broad band. T means twisted pair, which is
the cable used for that network.
Private IP addresses are assigned for use on intranets. These addresses are
used for internal networks and are not routable on external public networks.
These ensures that no conflicts are present among internal networks while at
the same time the same range of private IP addresses are reusable for multiple
intranets since they do not "see" each other.
30) What is OSI and what role does it play in computer networks?
31) What is the purpose of cables being shielded and having twisted
pairs?
The main purpose of this is to prevent crosstalk. Crosstalks are
electromagnetic interferences or noise that can affect data being transmitted
across cables.
The TCP/IP Application layer actually has three counterparts on the OSI model:
the Session layer, Presentation Layer and Application Layer.
By looking at the first octet of any given IP address, you can identify whether
it's Class A, B or C. If the first octet begins with a 0 bit, that address is Class A.
If it begins with bits 10 then that address is a Class B address. If it begins with
110, then it's a Class C network.
OSPF, or Open Shortest Path First, is a link-state routing protocol that uses
routing tables to determine the best possible path for data exchange.
Star topology consists of a central hub that connects to nodes. This is one of
the easiest to setup and maintain.
39) What are gateways?
One major disadvantage of star topology is that once the central hub or switch
get damaged, the entire network becomes unusable.
Tracert is a Windows utility program that can used to trace the route taken by
data from the router to the destination network. It also shows the number of
hops taken during the entire transmission route.
When you are accessing the resources that are shared by one of the
workstations on the network, that workstation takes a performance hit.
A hybrid network is a network setup that makes use of both client-server and
peer-to-peer architecture.
Routers have built in console that lets you configure different settings, like
security and data logging. You can assign restrictions to computers, such as
what resources it is allowed access, or what particular time of the day they can
browse the internet. You can even put restrictions on what websites are not
viewable across the entire network.
51) What protocol can be applied when you want to transfer files
between different platforms, such between UNIX systems and
Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different
servers. This is possible because FTP is platform independent.
Default gateways provide means for the local networks to connect to the
external network. The default gateway for connecting to the external network
is usually the address of the external router port.
Good passwords are made up of not just letters, but by combining letters and
numbers. A password that combines uppercase and lowercase letters is
favorable than one that uses all upper case or all lower case letters. Passwords
must be not words that can easily be guessed by hackers, such as dates,
names, favorites, etc. Longer passwords are also better than short ones.
For a Class C network, the number of usable Network ID bits is 21. The number
of possible network IDs is 2 raised to 21 or 2,097,152. The number of host IDs
per network ID is 2 raised to 8 minus 2, or 254.
57) What happens when you use cables longer than the prescribed
length?
Cables that are too long would result in signal loss. This means that data
transmission and reception would be affected, because the signal degrades
over length.
Ping is a utility program that allows you to check connectivity between network
devices on the network. You can ping a device by using its IP address or device
name, such as a computer name.
Peer to peer are networks that does not reply on a server. All PCs on this
network act as individual workstations.
62) What is DNS?
DNS is Domain Name System. The main function of this network service is to
provide host names to TCP/IP address resolution.
63) What advantages does fiber optics have over other media?
65) What are the different network protocols that are supported by
Windows RRAS services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts in a class A, B and C
network?
For Class A, there are 126 possible networks and 16,777,214 hostsFor Class B,
there are 16,384 possible networks and 65,534 hostsFor Class C, there are
2,097,152 possible networks and 254 hosts
68) What protocols fall under the Application layer of the TCP/IP
stack?
The following are the protocols under TCP/IP Application layer: FTP, TFTP,
Telnet and SMTP.
69) You need to connect two computers for file sharing. Is it possible
to do this without using a hub or router?
Yes, you can connect two computers together using only one cable. A
crossover type cable can be use in this scenario. In this setup, the data
transmit pin of one cable is connected to the data receive pin of the other
cable, and vice versa.
74) When you move the NIC cards from one PC to another PC, does
the MAC address gets transferred as well?
Yes, that's because MAC addresses are hard-wired into the NIC circuitry, not
the PC. This also means that a PC can have a different MAC address when the
NIC card was replace by another one.
Ethernet is one of the popular networking technologies used these days. It was
developed during the early 1970s and is based on specifications as stated in
the IEEE. Ethernet is used in local area networks.
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all
Internal mail, and provides the necessary mail delivery services on the TCP/IP
protocol stack.
In the event that one link fails, there will always be another available. Mesh
topology is actually one of the most fault-tolerant network topology.
A common way of dealing with such a problem is to use repeaters and hub,
because it will help regenerate the signal and therefore prevent signal loss.
Checking if cables are properly terminated is also a must.
Profiles are the configuration settings made for each user. A profile may be
created that puts a user in a group, for example.
There are 4 protocols that are being managed by this layer. These are ICMP,
IGMP, IP and ARP.
A VLAN is required because at switch level there is only one broadcast domain,
it means whenever new user is connected to switch this information is spread
throughout the network. VLAN on switch helps to create separate broadcast
domain at switch level. It is used for security purpose.