Professional Documents
Culture Documents
225 Information Technology Job Interview Questions CC
225 Information Technology Job Interview Questions CC
Technology Job
Interview Questions
The Questions IT Leaders Ask
Information technology professionals with the right skills are in high demand. In 2015, the
unemployment rate for IT professionals averaged 2%, far below the 5.8% national average. However,
the skills needed to be successful in IT are shifting rapidly and hiring managers report in surveys that one
of the biggest challenges facing IT departments today is a lack of skilled IT professional. Do you have
what it takes to be successful in today’s environment? Moreover, when you interview candidates, are
you asking the right questions to assess whether they can meet today’s IT challenges?
Below is a list of interview questions categorized by different IT job roles intended to reveal a
candidate’s strengths and most glaring weaknesses. Categories include:
General IT
IT Management
Network/System Administration
Help Desk
Database Administration
Programming/Software Development
Information Security
The questions evaluate a broad range of candidate’s technical skills, understanding of IT terminology
and technology, as well as their ability to think analytically and solve problems.
General IT
1. What are two or three major trends affecting the IT industry and how do you see them
affecting the profession?
2. What are your favorite and least favorite technology products, and why?
3. Tell me about a time you were asked to perform a task or project you didn't understand.
4. Tell me about a time you were asked to do something you've never done before (new
technology, different type of project, new industry, etc.)
5. You’ve just been assigned to a project involving a new technology. How would you get
started?
6. Can you tell me about a recent project or process that you made better, faster, smarter,
or more efficient?
7. How do you keep your technology skills current?
8. What technology-related blogs, podcasts, tweets, or websites do you follow? Do you
share any information yourself online?
9. How do you make sure users create secure passwords that go beyond minimum
requirements of a system?
10. What is one of the latest Computer Processors (CPU)?
11. Define Hard-Disk Partition.
12. What are some of the ports available on a computer?
13. What components are needed to set up a Basic Home Network?
14. What is Active Directory?
15. What is an Active Directory schema?
16. What are the physical & logical components of ADS?
17. What is the default protocol used in directory services?
18. Which is the command used to remove active directory from a domain controller?
19. What is the file that's responsible for keeping all Active Directory databases?
20. What are your technical certifications?
21. What do you do to maintain your technical certifications?
22. What technical websites do you follow?
23. Describe a time when you were able to improve upon the design that was originally
suggested.
24. Describe the most innovative change that you have initiated and what you did to
implement this change.
25. Tell me about the project you are proudest of and what your contribution was.
26. Give an example of when applied your technical knowledge in a practical way.
27. What is the biggest IT challenge you have faced and how did you handle it?
28. Describe to me the stages you go through to update your domain DNS records.
29. What are the restrictions on domain names?
30. How do you set up the VPN on a laptop for a new employee?
31. What does DHCP stand for and what is its purpose?
32. What does DNS stand for and what is it used for?
33. What is TCP/IP and what does it stand for?
34. What is a default gateway?
35. What is an IP Address?
36. What is the significance of the IP address 255.255.255.255?
37. What are the 3 major classes of an IP network?
38. What is a Class D IP address?
39. What is OSPF?
40. A user is complaining of delays when using the network. What would you do?
IT Management
41. When have you needed to choose between two or more important budgetary items
within the organization and how did you make the decision?
42. When have you had to oversee someone who was not performing to standard?
43. When have you had to negotiate something when you had one message and several
audiences? How did you customize your communication for each group?
44. You are working at a client site and the CIO of the client company has asked if she can
see you. The CIO wants to know how much it would cost to bring in five more people on
your team. She gives you very vague requirements of the job she is looking for you to
do. What would you do?
45. You have been asked to explore a new business solution. You have come across two
software products. One is an on-premises solution, the other is cloud-based. Assuming
they are functionally equivalent, why would you recommend one over the other?
46. What do you think is the difference between managing people vs. managing ideas?
47. Have you worked with software vendors? How do you handle vendor relations?
48. How important is it to work directly with your business users?
49. If hired, is there anything you would change about this IT team?
50. What companies do you see as the biggest competitors to this company?
51. What type of people do you like to work with?
52. Can you handle telling other people “No”?
53. When conflict arises on your team, how do you handle it?
54. What do you do to ensure you provide accurate project estimates?
55. What elements are necessary for a successful team and why?
56. What is most important - quality or quantity?
57. You have a user call for support for the fifth time about the same issue. How would you
handle the call and what would you do differently?
58. How do you create a project plan?
59. How will you balance your family and home life with working a night shift?
60. Provide a specific situation from your work history when you failed as a project manager
and what did you do about it?
61. How would you handle insubordination or direct reports failing to meet expectations?
62. Name a time in your employment when something catastrophic and unexpected
happened and your response.
63. Tell me about a time when you had to fire an employee for poor performance.
64. Have you ever promoted an employee, only to find out they were not right for the new
position? What did you do?
65. How have you gotten someone, who does not work for you, to do something to advance
your project or initiative?
Network/System Admin
66. What is the difference between layer 2 and layer 3 in the OSI model?
67. What is the difference between a hub, switch, and router?
68. What is a VLAN?
69. What is the difference between TCP and UDP?
70. How do you distinguish a DNS problem from a network problem?
71. What are a runt, giant, and collision?
72. What is a broadcast storm?
73. What is the purpose of VRRP?
74. What is a default route? How do you set a default route on an IOS Cisco router?
75. What is ARP/RARP?
76. Describe a TCP connection sequence.
77. What is a router metric?
78. What is MTU?
79. What other TCP setting can you modify besides MTU to shorten packets?
80. What is the subnet for a class C network?
81. Have you configured a NIS server/client before? If so, describe what you did.
82. Have your configured an NFS server?
83. What are RAID 1 and RAID 5?
84. What must be done to an AD forest before Exchange can be deployed?
85. What Exchange process is responsible for communication with AD?
86. What connector type would you use to connect to the Internet, and what are the two
methods of sending mail over that connector?
87. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global
Catalog?
88. What are the disadvantages of circular logging?
89. What is a global catalog server?
90. What is IPv6?
91. What is multi-master replication?
92. The network appears to be down. What steps do you go through to troubleshoot?
93. What is the role of SNMP?
94. What is a Global Catalog?
95. Explain a "Two-Way Transitive" trust.
IT Help Desk
Database Administration
Programming/Development
156. How well do you know HTML, PHP, Python, Ruby, etc.?
157. How do you handle source control?
158. What browsers do not support CSS coding?
159. What experience do you have working with arrays in VN Script?
160. What are “Psuedo-classes”?
161. What is abstraction with regards to .NET?
162. What kind of experience do you have using Eclipse or Visual Studio?
163. What usually indicates that your virtual user script has dynamic data that is dependent
on you parameterized fields?
164. Are you using code from GitHub or contributing code to an open-source project in
GitHub? Do you answer questions on Stack Overflow?
165. What are some practices you use to help prevent a developer on the team from
breaking the build? When the build does break, how do you help fix it?
166. Describe to me some bad code you’ve read or inherited lately.
167. What automated-build tools or processes have you used?
168. What development tools have you used?
169. What languages have you programmed in?
170. What source control tools have you used?
171. You have submitted a piece of code that has broken the client's website in production.
You have found this bug while you were testing, and nobody else knows about it. What
is your next move?
172. What do you think of documentation and what are some of its benefits?
173. What is your advice when a customer wants high performance, usability, and security?
174. How do you prioritize requirements? Do you know different techniques?
175. What do you care about most when reviewing somebody else’s code?
176. Can you name an example of a recursive solution that you created?
177. Do you know about the Traveling Salesman Problem?
178. Which tools are essential to you for testing the quality of your code?
179. What is important when updating a product that is in production and is being used?
180. Why do you think maintenance of a software product is the most expensive part of an
application’s lifecycle?
Information Security
181. What are the most common types of attacks that threaten enterprise data security?
182. What is the difference between a threat and a vulnerability?
183. Can you give me an example of common security vulnerabilities?
184. Are you familiar with any security management frameworks such as ISO/IEC 27002?
185. What is a security control?
186. What are the different types of security controls?
187. Can you describe the information lifecycle? How do you ensure information security at
each phase?
188. What is Information Security Governance?
189. What are your professional values? Why are professional ethics important in the
information security field?
190. Are open source projects more or less secure than proprietary ones?
191. Who’s more dangerous to an organization, insiders or outsiders?
192. Why is DNS monitoring important?
193. How would traceroute help you find out where a breakdown in communication is?
194. Why would you want to use SSH from a Windows PC?
195. How would you find out what a POST code means?
196. What is the difference between a black hat and a white hat?
197. What is the role of network boundaries in information security?
198. What does an intrusion detection system do? How does it do it?
199. What is a honeypot? What type of attack does it defend against?
200. What technologies and approaches are used to secure information and services
deployed on cloud computing infrastructure?
201. What information security challenges are faced in a cloud computing environment?
202. Can you give me an overview of IP multicast?
203. How many bits do you need for a subnet size?
204. What is packet filtering?
205. Can you explain the difference between a packet filtering firewall and an application
layer firewall?
206. What are the various ways to handle account brute forcing?
207. What is cross-site request forgery?
208. How does one defend against CSRF?
209. If you were a site administrator looking for incoming CSRF attacks, what would you look
for?
210. What are some effective ways to control data leakage?
211. Describe the 80/20 rules of networking.
212. What are web server vulnerabilities and name a few methods to prevent web server
attacks?
213. What are the most damaging types of malware?
214. What’s your preferred method of giving remote employees access to the company
network and are there any weaknesses associated with it?
215. List some tests that you would do to a network to identify security flaws.
216. What kind of websites and cloud services would you block?
217. What type of security flaws are there in VPN?
218. What is a DDoS attack?
219. What is business continuity management? How does it relate to security?
220. What is the primary reason most companies haven’t fixed their vulnerabilities?
221. What’s the goal of information security within an organization?
222. What’s the difference between a threat, vulnerability, and a risk?
223. If you could re-design TCP, what would you fix?
224. What is the one feature you would add to DNS to improve it the most?
225. What is likely to be the primary protocol used for the Internet of Things in 10 years?