Professional Documents
Culture Documents
1. What's the most frustrating support issue you've been called to resolve?
A good candidate will demonstrate that they overcame their frustration and handled
the situation with a professional attitude. It is important that System Administrators
do not express annoyance when supporting employees who rely on them to solve a
variety of technical difficulties.
2. Why would you not restore a DC that was last backed up eight months ago?
Look for candidates who understand that a DC is a domain controller, and that
backup files should generally not be older than 180 days. Backing up a DC that is
several months old could lead to inconsistent data, caused by lingering objects.
5. Can you tell us about a time when you initially failed to solve an issue?
The System Administrator should be someone who is able to overcome their failure
and find a solution. Ideally, the candidate should be able to tell you about a strategy
they follow after an attempt fails, rather than trying out different things randomly
Organizations need someone who understands the basics of how a system works so
that they can keep their data safe, and keep their services running smoothly. You
might ask: "Wait, isn’t there more that a sysadmin can do?"
You are right. Now, in general, let’s look at what might be a typical sysadmin’s
day-to-day tasks. Depending on their company’s needs and the person’s skill level,
a sysadmin’s tasks vary from managing desktops, laptops, networks, and servers,
to designing the organization’s IT policies. Sometimes sysadmins are even in
charge of purchasing and placing orders for new IT equipment.
Those seeking system administration as their career paths might find it difficult to
keep their skills and knowledge up to date, as rapid changes in the IT field are
inevitable. The next natural question that arises out of anyone’s mind is how IT
professionals keep up with the latest updates and skills.
Here are some of the more basic questions you will encounter, and my answers:
1. What are the first five commands you type on a *nix server after login?
lsblk to see information on all block devices
who to see who is logged into the server
top to get a sense of what is running on the server
df -khT to view the amount of disk space available on the server
netstat to see what TCP network connections are active
2. How do you make a process run in the background, and what are the
advantages of doing so?
You can make a process run in the background by adding the special
character & at the end of the command. Generally, applications that take too long
to execute, and don’t require user interaction are sent to the background so that we
can continue our work in the terminal. (Citation)
Running (everything) as root is bad due to two major issues. The first is risk.
Nothing prevents you from making a careless mistake when you are logged in
as root. If you try to change the system in a potentially harmful way, you need to
use sudo, which introduces a pause (while you’re entering the password) to ensure
that you aren’t about to make a mistake.
The second reason is security. Systems are harder to hack if you don’t know the
admin user’s login information. Having access to root means you already have one
half of the working set of admin credentials.
The rm command by itself only deletes the named files (and not directories).
With -rf you add two additional features: The -r, -R, or --recursive flag
recursively deletes the directory’s contents, including hidden files and
subdirectories, and the -f, or --force, flag makes rm ignore nonexistent files, and
never prompt for confirmation.
5. Compress.tgz has a file size of approximately 15GB. How can you list its
contents, and how do you list them only for a specific file?
tar tf archive.tgz
Here are some harder questions you might encounter, and my answers:
6. What is RAID? What is RAID 0, RAID 1, RAID 5, RAID 6, and RAID 10?
ICMP does not use either UDP or TCP communication services: Instead, it uses
raw IP communication services. This means that the ICMP message is carried
directly in an IP datagram data field.
8. What is the difference between a router and a gateway? What is the default
gateway?
The term default gateway is used to mean the router on your LAN, which has the
responsibility of being the first point of contact for traffic to computers outside the
LAN.
9. Explain the boot process for Linux.
BIOS -> Master Boot Record (MBR) -> GRUB -> the kernel -> init -> runlevel
10.How do you check the error messages while the server is booting up?
Kernel messages are always stored in the kmsg buffer, visible via
the dmesg command.
Boot issues and errors call for a system administrator to look into certain important
files, in conjunction with particular commands, which are each handled differently
by different versions of Linux:
/var/log/boot.log is the system boot log, which contains all that unfolded
during the system boot.
/var/log/messages stores global system messages, including the messages
logged during system boot.
/var/log/dmesg contains kernel ring buffer information.
11.What is the difference between a symbolic link and a hard link?
Updated Aug 30, 2019 | Editor's note: this answer original said 'a hard link is a
mirror copy of the original file,' which is not accurate. Thank you to Bruce
Bowen for providing the following answer:
A hard link is a directory reference to the same inode that the first directory entry
refers to, and the inode is updated to increase the reference count to know there is a
new link to the data. This means that when a file is 'deleted', the directory is
updated to remove the file name and the inode for the data has the reference count
decremented. The data of the file won't be freed unless the reference count goes to
0. Since inodes are unique for each file system, hard links can't cross file systems.
Soft links create a way to for a directory entry to say "the file information is really
stored in another directory entry". Soft links break if the 'another directory entry' is
deleted.
So a 'user' way to describe the difference between a hard and soft link is that a hard
link is a link to the file data and a soft link is a link to another file name.
12.How do you change kernel parameters? What kernel options might you need
to tune?
13.Explain the /proc filesystem.
For example, if you were editing the sudoers file (such as /private/etc/sudoers),
you might use visudo to add the following:
This purpose is important. Shells which are not part of the base distribution, but are
instead installed from ports or packages, are installed in /usr/local/bin; which, by
default, resides on a different file system. If root’s shell is located
in /usr/local/bin and the file system containing /usr/local/bin is not mounted, root
could not log in to fix a problem, and the sysadmin would have to reboot into
single-user mode to enter the shell’s path.
Advanced questions
Here are the even more difficult questions you may encounter:
With this information, you can contact the correct people; whether it be your own
firewall, your ISP, your destination’s ISP, or somewhere in the middle.
The tracert command—like ping—uses the ICMP protocol, but also can use the
first step of the TCP three-way handshake to send SYN requests for a response.
17.What is the main advantage of using chroot? When and why do we use it?
What is the purpose of the mount /dev, mount /proc, and mount
/sys commands in a chroot environment?
A chroot jail lets you isolate a process and its children from the rest of the system.
It should only be used for processes that don’t run as root, as root users can break
out of the jail easily.
The idea is that you create a directory tree where you copy or link in all of the
system files needed for the process to run. You then use the chroot() system call to
tell it the root directory now exists at the base of this new tree, and then start the
process running in that chroot’d environment. Since the command then can’t
reference paths outside the modified root directory, it can’t perform operations
(read, write, etc.) maliciously on those locations. (Citation)
18.How do you protect your system from getting hacked?
Sticky ports are one of the network administrator’s best friends and worst
headaches. They allow you to set up your network so that each port on a switch
only permits one (or a number that you specify) computer to connect on that port,
by locking it to a particular MAC address.
When the Intrusion Detection System (IDS) device generates an alert for an
intrusion which has actually not happened, this is false positive. If the device has
not generated any alert and the intrusion has actually happened, this is the case of a
false negative.
23.Explain :(){ :|:& };: and how to stop this code if you are already logged into
the system?
:() defines the function, with : as the function name, and the empty
parenthesis shows that it will not accept any arguments.
{ } shows the beginning and end of the function definition.
:|: loads a copy of the function : into memory, and pipes its output to another
copy of the : function, which also has to be loaded into memory.
& makes the previous item a background process, so that the child processes
will not get killed even though the parent gets auto-killed.
: at the end executes the function again, and hence the chain reaction begins.
The biggest problem with a fork bomb is the fact it takes up so many processes.
So, we have two ways of attempting to fix this if you are already logged into the
system. One option is to execute a SIGSTOP command to stop the process, such
as:
If you can’t use the command line due to all processes being used, you will have to
use exec to force it to run:
exec killall -STOP -u user1
With fork bombs, your best option is preventing them from becoming too big of an
issue in the first place
24.What is OOM killer and how does it decide which process to kill first?
An OOM killer first has to select the best process(es) to kill. Best here refers to the
process which will free up the maximum memory upon being killed, and is also the
least important to the system. The primary goal is to kill the least number of
processes to minimize the damage done, and at the same time maximize the
amount of memory freed.
To facilitate this goal, the kernel maintains an oom_score for each of the processes.
You can see the oom_score of each of the processes in the /proc filesystem under
the pid directory:
$ cat /proc/10292/oom_score
The higher the value of oom_score for any process, the higher its likelihood is of
being killed by the OOM Killer in an out-of-memory situation. (Citation)
Conclusion
What is LDAP?
LDAP is a protocol that many different directory services and access management
solutions can understand.
The relationship between AD and LDAP is much like the relationship between
Apache and HTTP:
There are two options for LDAP authentication in LDAP v3 – simple and SASL
(Simple Authentication and Security Layer).
An LDAP query is a command that asks a directory service for some information.
For instance, if you’d like to see which groups a particular user is a part of, you’d
submit a query that looks like this:
(&(objectClass=user)(sAMAccountName=yourUserName)
(memberof=CN=YourGroup,OU=Users,DC=YourDomain,DC=com))
Beautiful syntax, huh? Not quite as simple as typing a web address into your
browser. Feels like LISP.
Luckily, in most cases, you won’t need to write LDAP queries. To maintain your
sanity, you’ll perform all your directory services tasks through a point-and-click
management interface like Varonis DatAdvantage or perhaps using a command
line shell like PowerShell that abstracts away the details of the raw LDAP
protocol.
TL;DR: LDAP is a protocol, and Active Directory is a server. LDAP authenticates
Active Directory – it’s a set of guidelines to send and receive information (like
usernames and passwords) to Active Directory. Want to learn more? Get a 1:1 AD
demo and learn how Varonis helps protect your Active Directory environment.
In the modern world, no organization can maximize its production and maintain a
competitive edge without using systems. For any system to operate optimally, it
must be maintained and configured appropriately and this is where the role of a
systems administrator comes in hardly.
But how do find the right candidate from among a multitude of applicants? It is all
about asking the right questions and getting them answered correctly. Here are the
top 20 system administrator interview questions and answers to help you get the
most appropriate individual.
Sample Answer
Sample Answer
A sysadmin should be a problem solver since the role is often faced with issues
that need to be resolved. Keen intuition coupled with precise and quick decision
making is very vital.
People skills are necessary as sysadmins deal with end users who don’t know much
about IT. Such users need to be guided in a concise and clear manner.
Patience is another great quality in this role because it involves handling tasks that
need concentration and much time to complete.
Besides, the willingness to learn and being a team player are other vital qualities in
system administration.
3. What is Windows Deployment Services (WDS)?
The interviewer wants to understand your knowledge about WDS.
Sample Answer
WDS is a server role that offers the ability to remotely deploy Windows operating
systems. It can be used to set up new computers in network-based installations so
that each operating system doesn’t have to be installed.
Sample Answer
Sample Answer
Tip #1: State three main attributes that make you the best
Sample Answer
I am curious and analytical. I always explore a problem to find out what really
caused it. If the root cause of an issue is not identified and resolved, the problem
will reoccur and hurt the business. Besides, I am a good communicator with the
ability to share insights in a jargon-free language.
Sample Answer
Restoring a domain controller that was last backed up 7 months ago is a bad idea.
This is because lingering objects are likely to be encountered that will lead to
inconsistent data. The general rule is that backup files shouldn’t be more than 180
days old.
Sample Answer
I graduated four years ago with a bachelor’s degree in computer science. Besides, I
have earned a CompTIA certification and also worked mainly in the area of server
and PC installation. In my previous assignments, I have been esteemed for
identifying faulty machines early on and providing lasting solutions.
Tip #1: Think quickly about the experience you have had with users
Tip #2: Demonstrate your user support capabilities and ability to resolve users’
problems
Sample Answer
I am especially proud of being able to identify users’ problems and resolve them
effectively using appropriate tools. My clients as well as the users I have supported
have often referred their friends to me to help them resolve their computer issues. I
always resolve issues without taking much of my clients’ time.
Tip #2: Support your answer by briefly explaining how an active directory
functions
Sample Answer
Sample Answer
A domain consists of a group of network objects that are organized logically and
share the database of a single active directory. These objects include users,
computers, and network devices among others.
Tip #2: Make sure to be prompt and don’t mull over the answer
Sample Answer
Tip #1: State the port that is utilized by the ping command
Tip #2: Demonstrate that you can use this command effectively
Sample Answer
The ping command utilized ICMP, which doesn’t use TCP or UDP communication
services. In particular, it makes use of the ICMP echo packets and echo requests.
Tip #2: Let the interviewer know that you can use procfs
Sample Answer
The proc file system or procfs is a special file system in Linux operating systems
that offer an interface to the kernel data structures. Although majority of files in
this file system are read-only, some are writable meaning that they permit kernel
variables to be altered. Besides, procfs have a hierarchy of special files that reflect
the kernel’s current state.
Tip #2: Ensure to demonstrate how forests and trees are related
Sample Answer
A tree consists of a collection of one or several domains or domain trees that are
found in a contiguous namespace, which is connected in a transitive trust
hierarchy.
On the other hand, a forest refers to a tree collection, which shares a common
global catalog, directory configuration, logical structure, and directory schema.
Sample Answer
NTFS refers to the current file system utilized by Windows. This file system offers
various features including security permissions, back up, and quotas so that one
can fill up a disk.
FAT is an older file system developed by Microsoft that was chiefly used in
Windows operating systems up to the XP version. FAT doesn’t offer most of the
key features including security and back up that are provided by NTFS.
Sample Answer
Sample Answer
Sample Answer
Sample Answer
To find the best person, it is imperative to know the right questions to ask
interviewees. Similarly, you should look out for specific answers to identify the
right person. This article discusses the questions to ask during an interview and the
answers to expect from the right person.
Tip #1: Revise the main roles in your mind promptly so that you will not have to
think deeply about them.
Tip #2: Be clear and precise so that the interviewer can be convinced that you
know your roles.
Sample Answer
Tip #2: Make sure to relate your answer with the role of a network administrator
Sample Answer
Critical thinking and analytical skills are vital for network admins in facilitating
logical and consistent problem-solving. Good time management is another great
quality that enables a network admin to juggle several people, projects, and
problems simultaneously. Interpersonal skills are essential because a network
administrator works with different individuals, from end users to network
engineers.
Sample Answer
Tip #1: Be precise and demonstrate that you are knowledgeable about network
topologies.
Tip #2: Provide the answer in a manner that reflects your ability to set a network
Sample Answer
A network topology directs the media that should be used to interconnect devices.
The topology of a network also acts as a basis for determining the
terminations, connectors, and materials that are applicable for setting a network.
Tip #2: Be direct with your answer and don’t mull over it
Sample Answer
6. What is the Largest Network Size that you have Ever Setup?
The interviewer wants to determine whether you have hands-on experience on a
network sized to that of the hiring organization.
Tip #1: Describe the biggest size of network you have setup
Sample Answer
In the past, I have been tasked with creating and implementing a network for a
business with 200 employees. The network supported a simple physical location
where the business offices were housed.
Tip #1: Describe the approach you take when troubleshooting network
performance issues
Sample Answer
8. What Major Challenge did You Face during Your Last Role? How
did You Handle It?
Network admins encounter various challenges and the interviewer wants to assess
your ability to handle challenging situations and offer appropriate solutions.
Tip #1: Briefly describe a major challenge that you have faced previously
Sample Answer
Sometime during my last role, employees started losing data from their computers.
This used to happen even with software and hardware firewalls in place and the
pressure was on me to ensure employee data is secure. While troubleshooting the
issue, I discovered the problem was caused by malicious applications sent via
email. Thus, I educated the staff on how to deal with suspicious emails to avoid
data loss. Besides, I developed an email policy that provided guidelines on
appropriate use of emails.
Tip #1: Demonstrate your familiarity about the latest authentication method
applied for network access
Tip #2: Briefly explain situations under which these methods would be most
effective.
Sample Answer
Sample Answer
Sample Answer
A firewall is a device that monitors incoming and outgoing traffic to block specific
traffic based on the set security criteria. The device filters traffic and prevents
unauthorized access to a network. A firewall achieves this by scanning all
messages entering or leaving a network and blocking those that violate the set
rules.
Tip #1: State the monitoring tools that you would recommend.
Tip #1: Support your answer by pointing out the main features of each of those
tools.
Sample Answer
I would recommend Idera, Lab Tech, and Logic Monitor. Lab Tech not only
provides network monitoring but also infrastructure management. Logic Monitor
provides both network monitoring and application performance monitoring. Idera
offers all these capabilities but doesn’t allow customization of the dashboard for
quicker access to commonly used features.
Tip #1: Demonstrate your understanding of these types of networks by stating the
kind of setting each is applied.
Tip #1: Make sure not to mull as this may suggest that you are struggling to answer
the question or you are not sure.
Sample Answer
A virtual private network (VPN) is the best solution for businesses or organizations
with multiple locations or a large physical footprint both locally and overseas. On
the contrary, a local area network (LAN) perfectly suits businesses that operate
from a single physical location.
Sample Answer
Tip #1: Avoid mulling as that may make your answer questionable
Sample Answer
I read Network World about innovations, developments, and trends in the industry.
Besides, I have an RSS reader that I use to consolidate various news sources
covering network innovations.
Tip #1: Demonstrate that you are knowledgeable about different kinds of
safeguards
Tip #2: Answer the question promptly to show that you have experience with such
situations
Sample Answer
Building disaster recovery resources into network plans is a great way to protect
against data loss. This includes making regular backups and having distributed
storage locations to reduce the chances of losing data.
Tip #1: Describe the way a proxy server can offer protection to a network
Tip #2: Give the impression that you have worked with proxy servers
Sample Answer
A proxy server mainly hides the IP address of an internal network from external
users. Proxy servers make it impossible to determine the physical location of a
network. In doing so, they make it virtually invisible to all external users.
18. What Role does the OSI Session Layer Play in a Network?
The interviewer would want to know whether you understand this network layer.
Tip #1: Describe the role played by the OSI Session layer
Tip #2: Demonstrate that you are knowledgeable about the OSI model
Sample Answer
This is the fifth layer of the OSI model and it primarily manages connections
between networked computers. In particular, it establishes connections between
local and remote applications. Besides, it manages and terminates those
connections. This involves establishing procedures for restating, suspending, and
ending connection sessions.
Conclusion
These questions and answers will help you hire the most qualified individual for
the network administrator position for your organization. As an interviewer, ensure
to ask the right questions. Also, allow the interviewee to take his or her time to
provide the correct answer. With these questions, you are set to interview and
select the best network admin.
In essence, companies are always looking for experienced system engineers who
are good at what they do. Like any other job application, interested applicants
would be required to participate in an interview to determine their competency for
the engineering job. As an interviewer, you ask various questions and expect
specific answers to help select the best person for the systems engineer position.
Here are the common interview questions for the position of a systems engineer.
Tip #1: Silently revise the significant critical points in your head before you
answer. Don’t hesitate at this point, as that would give the impression that you
aren’t sure about the field.
Tip #2: Don’t go about giving in-depth explanations about everything that a
systems engineer does. Be precise and accurate in displaying basic knowledge that
deems important and time-saving.
Sample Answer
Tip #1: Don’t get too overambitious and over mention many skills.
Tip #2: Don’t refer the skills to your competency level: leave it to the interviewer.
Sample Answer
3. What Major Challenge Did You Face during Your Last Role? How
Did You Handle It?
Before hiring you, the interviewer wants to be sure that you can handle any
shortfall in your career.
Tip #1: Use the most recent challenges that you handled in the best way
Tip #2: Keep your explanations informative and direct to the point.
Sample Answer
One major challenge that arose in my previous role was the increasing complexity
of various problems that I was called upon to solve including system failure. The
organization has inadequate procedures to effectively resolve these problems. To
address this issue, I created a systems engineering plan that described the
procedures to be followed in implementing system maintenance processes and
activities to minimize or eliminate system failure.
Tip #2: Let the interviewer know that you keep up-to-date about technological
developments
Sample Answer
Sample Answer
Looking into complex systems and their behavior is a challenge, mainly because of
the future`s uncertainty-markets, environments, and properties are changing, in
addition to arising threats. However, I am always inspired to bridge the gap in the
best way to defeat several performance challenges.
Sample Answer
7. Have You Ever Led a Team Before? What Was Your Experience?
The interviewer is trying to determine if you are responsible for leading a team to
attain specific goals.
Sample Answer
I once had to lead a systems development committee to gather effective ways of
improving the performance of one of the website’s software. We used great
approaches that increased sales for the company. They included adequate system
analysis and the total systems concept to achieve maximum results in the overall
output.
Sample Answer
9. Why do you think you are the Best Candidate for the Job?
The interviewer wants to find out if you would be an asset or a liability.
Sample Answer
Tip #1: Reflect on a system you designed and the process involved
Sample Answer
The process comprises of four steps:
Tip #1: Highlight the need and importance of upgrading systems regularly.
Sample Answer
Tip #1: Prove that you can break down complex engineering concepts to simplify.
Sample Answer
I would use a cheat sheet, for instance, to help explain to them the technical terms
in a simple way that they can understand. This would involve illustrating concepts
and using analogies to make them understand. A network/ system diagram and
business process flow would also be ideal.
Tip #1: Focus on the company without trying to pinpoint its downfalls directly.
Tip #2: Bring out precise details on the approaches you plan on taking.
Sample Answer
14. How do You Plan and Prioritize Work during Your Time with
Our Company?
Your ability to prioritize work is assessed at this point.
Tip #2: Focus on how to become an asset that adds value the company
Sample Answer
I plan all my projects with a checklist and order them according to the urgency. I
take my time to work on them attentively while managing my time significantly to
handle the rest. The flexibility of attending multiple tasks is also an essential aspect
of maintaining my schedule as it is.
15. Suggest any Methods that would help to Monitor and Maintain
Systems for Maximum Productivity
The performance of all systems in an organization is of great concern. The
interviewer wants to know the approaches that you would utilize to maintain the
company’s systems’ proper functioning.
Tip #1: Use your experience to focus on how you can build the systems of the
company
Tip #2: Suggest one ideal method that would work for the company’s betterment
Sample Answer
Sample Answer
Tip #2: While the question is more practical, theoretical knowledge would also
come in handy.
Sample Answer
18. Have You Ever Created a Plan for Disaster Recovery? How Did
You Succeed?
Tip #1: Reflect a similar past experience
Sample Answer
During my previous role, I came up with a design for a data recovery center. The
organization adopted the designed and implemented it. In the end, the organization
had an active data recovery center.
Sample Answer
I have access to relevant materials and websites that showcase the latest
technology in systems engineering. I also read publications often in appreciation of
the work that other engineers have done and think of ways to improve it. Finally, I
attend training to learn more about innovations and how to be part of them.
Tip #2: Have relevant examples of the possible ways of fixing the troubleshoot
Sample Answer
Conclusion
The above questions and answers can prepare an interviewer adequately to hire the
best systems engineer. On the other hand, knowing what to expect in an interview
will help an applicant to answer questions relevantly and as expected. Hopefully
these system engineer interview questions guide will help you land your next
dream job.
Technical skills matter a lot in systems administrator jobs. Thus, many of your
interview questions should deal with assessing candidates’ hard skills, and this
question covers several areas of required knowledge.
Look for:
Ability to troubleshoot
Example:
“Assuming the web page is up, I would investigate what could be wrong with the
monitor. It could be a system overload or flapping, among other issues. Identifying
the problem helps me prevent it in the future.”
Suppose you try to fix a problem such as passwords not working for a group of users,
but your attempt fails. What would you do?
Look for:
Example:
“I’ve learned from experience that a first attempt doesn’t always work. I always
make sure to have at least two other backup plans. Here’s something that happened
at my previous job …”
What are three attributes that make you a great systems administrator?
Look for:
Example:
“I’m analytical and curious. I always dig to find out why a problem occurred.
Otherwise, it is liable to happen again and hurt the business. I am also a great
communicator, able to share my insight with anyone in jargon-free language.”
Look for:
Example:
“If you back up a DC seven months old, you could encounter lingering objects that
lead to inconsistent data. Backup files, as a general rule, shouldn’t be over 180
days old.”
What is your technical background?
Look for:
Specific certifications
Example:
“I earned a bachelor’s degree in computer science four years ago. Since then, I’ve
obtained my CompTIA certification and worked primarily in installing PCs and
servers. I’ve developed a reputation for identifying problematic machines early on,
and I enjoy customer service and software programs such as Adobe Acrobat.”
What are you especially proud of in your experience with support for users and
endpoint systems?
Many systems administrator jobs require interaction with users and knowledge of
remote techniques and ticketing systems. This question ensures that the candidate
will be able to do the customer service you require.
Look for:
Example:
“I’m particularly proud of the fact that I can effectively identify a problem and the
best tools to resolve it. My clients often refer me to others and talk about how I
quickly restore their functionality. In fact, here’s something that happened while I
was at HTWW company …”
We’re looking for someone who works well independently since the position involves
field work and telecommuting. Give an example of how you’re a self-starter.
This question is position-specific and gets to the heart of whether the candidate’s
personality fits the requirements. Someone who needs a lot of team support might
not fare well here.
Look for:
Example:
“I was fortunate enough to have a mentor at my first systems administrator job. He
taught me the importance of initiative and preventing problems. So, I make it a
point to touch base with clients regularly. In one of these instances last year, a
check-in led to a conversation where I was able to identify the early stages of a
badly written application. If not for that check-in, the problem could’ve gotten
worse and proven extremely costly for the client.”
You encounter a system defect but still can't figure out the cause. What do you do?
Problem-solving skills
Ability to consult others
Verbal communication
Example:
"The first thing I do is remind myself not to be discouraged. I have specific
qualifications and a limited scope of knowledge about in-depth system
components, so in these situations, I'm happy to consult with the systems engineer.
I can even learn more about how to diagnose and solve more complex defects in
the process."
Sample Answer
Sample Answer
I have worked with different databases including oracle for the past five years.
Whenever failure occurs, I capitalize on my skills and knowledge to identify the
problem and rectify it promptly. To overcome certain security and functionality
issues, I make sure to upgrade a database to a more recent and better version. I
have been involved in setting up databases as well as migrating data from one
platform to another.
3. How Will You Help a Client Get the Best SQL Server?
The interviewer wants to test your knowledge on servers and how you can use it to
help clients.
Tip #2: Clearly describe your role in the process of helping the client.
Sample Answer
I will ask the clients about the size of the organization so that I can determine the
best SQL that will suit her organization’s needs. I would also ask about the uptime
and any unique security requirements as well as other applications that the client
will use.
I once assisted a client who was experiencing trouble with her new SQL server.
The system was very slow, and it was affecting her business. I analyzed and
discovered a lack of compatibility between the new and old databases, so I
upgraded the databases, and the system functioned well.
Sample Answer
I make sure to perform regular data backups. Before migrating any data, I ensure
that it is backed up and the backup is secure and in good condition.
Sample Answer
SQL agents enable you to perform commands at a specific time repeatedly. For
example, backups are done frequently at particular times. I use SQL agents to
perform backups daily at a time when no one is using the system. I do my backups
at 3:00 am using SQL agents.
Tip #1: Mention the tools you use and why you prefer them
Sample Answer
Navicat allows me to connect many servers and work quickly and more efficiently.
I once used Navicat and MS Access to help a client to migrate and clean up data
quickly.
Tip #1: Explain in detail the problems the users experienced and the process you
used to solve it.
Tip #2: Describe an experience when this happened.
Sample Answer
Sample Answer
Sample Answer
Sample Answer
SQL stands for a sequential query language that you use to instruct the database to
do what you want. You can give the database instructions through questions or
statements and manipulate the data already in the database.
Sample Answer
A primary key is a unique value of a table that is used to index that table. The
primary key is used to retrieve a particular record from a table within a database.
For example, in a school, every student is given an admission number. The
admission number is unique and cannot be shared by two students. If you want to
retrieve all the information of a particular student from the database, you will use
this unique identifier.
Tip #2: Clearly describe how the two databases differ from each other
Sample Answer
A navigational database is structured like a tree. A value has a parent and a child,
and that is how they link to each other. If you want to access data, you have to
follow a particular route as you move from parent to child. On the other hand, a
relational database is more flexible and uses a primary key, which is a unique
identifier to access data.
Sample Answer
I have worked with the Microsoft SQL Server. I worked with the 2012 version for
seven years. I have also worked with Oracle for three years. Besides, I am well-
versed in using centralized, distributed, and cloud databases.
Tip #2: Show that you are experienced in using this type of database
Sample Answer
Cloud databases are database services that are built and accessed using a cloud
platform. Although they offer the services provided by traditional databases, they
have added flexibility that is enabled by cloud computing functionality. The good
thing about a cloud database is that no physical space is required. Besides, it is
highly secure and can be accessed simply using a web interface.
Sample Answer
Tip #1: Clearly state the procedure you use to analyze and solve a database
problem.
Tip #2: Show that you can identify database problems and find solutions.
Sample Answer
I continuously monitor the database server. I use a ticketing system for users to
report any issues that they are experiencing. If there is a problem, I analyze and
identify the cause. After I have successfully identified the cause, I will solve the
problem immediately. However, if it’s a simple technical issue, I will designate it
to a technical person and follow up to ensure the issue has been resolved
successfully and quickly.
18. What Do You Understand by a Database Schema?
This question tests your knowledge about the internal communication of tables in
databases.
Sample Answer
Tip #2: Show a clear understanding of log shipping and its function
Sample Answer
Log shipping is the same as a backup in Microsoft SQL. It uses rapid failover in
instances when the main server is not working. Therefore, Log shipping is done
manually.
Sample Answer
Conclusion
Understanding interview questions and the responses to look for is a great step
towards finding the right candidate. Since the database administration role is
critical in any company today, employers need to make sure they ask the right
questions to help them get the best and most qualified person for the job.
“Tattooing” the registry suggests that customers can change and view the
preference of the customers that are not placed away in the preserved prescribed
Registry portions. Irrespective of the assembly approach is evacuated or changed,
the preference of the client will currently be kept in the registry.
Thread
Infrastructure Master
Schema Master
PDC
RID Master
Domain Naming Master
The rational units of any organization of Active Directory are usually called tree,
domain, and forest. Various articles in the procedure of a rational section join
accompanying: customers, computers, devices, etc. that share an analogous active
database registry that is normally known as a “domain”.
A tree is an assortment of domains in the Active Directory that starts at one root
and branches out into child domains, peripheral. This might similarly comprise an
adjoining namespace linked in a transitive order.
8. What is Group Policy Objects (GPO) and list different kinds of GPO?
The setting that controls the client records the workplace, and also computer
records, are called Group Policy Object (GPO). This help is describing the
programming establishment, security alternatives, upkeep choices and library-
based arrangements, folder redirection choices and content choices. There are
usually 2 categories of GPO:
Ipconfig: To check the IP setup of the computer, we can use the command Ipconfig
and additionally it can be very well applied to reestablish the IP address of the
users if it is specified by a DHCP server.
Ping: To check the link among the computer in use and the other computers, we
can use the Ping command.
12. How you can install an app MSI file when the is not available?
To install the application without using the MSI file, the Software Installer. ZAP
text file can be used in its place.
A local DNS server offers the local mapping of fully competent domains to IP
addresses. To resolve requests concerning the domains on network, local DNS
servers can offer record data to distant DNS servers.
It is the latest window server version that uses the shortened LTSC or long-term
servicing channel. Some of the most dominant features if the new windows server
2019 are:
16. What is INODE?
The file’s metadata are kept by INODE holds; INODE is said to be a unique
pointer to a disk block. You can also say that it is a unique number owed to a file
in UNIX-like Operating system.
For storing the same data at a different place RAID or Redundant Array of
Independent Disks strategy is used. It is a strategy for building fault tolerance and
increase storage capacity. On separate drives it allows you to combine one or more
volumes so that they are accessed by a single drive letter
The System Administrator role varies in the organization. The 2 key System
Admin tasks are Supporting, Installing and maintaining computers & servers.
The Global Catalog is a kind of database that comprises all of the data relating to
objects in Active Directory environment domains.
We can authoritatively restore the objects from domain and configuration partition.
Authoritative restores of schema-naming are not supported here.
Schema Partition–It stores all the information of the objects and their qualities; it
copies to other domain controllers in the Forest
Windows Internet Name Service (WINS) servers map the IP addresses to NetBIOS
names. This lets employers access resources by name of the computer rather than
the IP address. To keep a check on the IP addresses and names of other computers
network, this computer can be configured as a WINS server.
We may not able to connect to a remote network through its NetBIOS name, in
case you are not using WINS in a network,
1. For back up, one single GPO, right-click the GPO and then click Back Up.
2. For backup, all GPOs in the domain, right-click Group Policy Objects and
click Back Up All.
A domain controller is a server that manages the security requests from other
servers and computers in the Windows Server domain. There are two kinds of the
domain controller that is a backup domain controller and a primary domain
controller. The primary domain controller emphasis on services of the domain to
avoid the system possibility of a crash or slowing down because of the overtasking
from handling other security requests and functionality. If the primary domain
controller goes down, a backup domain controller is promoted and become the
primary domain controller to preserve the server systems working appropriately.
32. What is tree?
A tree is actually a collection of domains in the Active Directory that starts at one
root and branches out into child domains, peripheral. This can similarly comprise
an adjoining namespace linked in a transitive order. An Active Directory forest is
an assortment of Active Directory trees, just like a real-world forest.
Conclusion
This article contains a fine collection of windows server interview questions and
answers. You can get help from these server administrator interview questions
provided in this article to prepare for your interview.
You can also share with us some interview server questions and answers that you
have been asked by interviewer, in the comments section.