You are on page 1of 62

Interview Questions for System Administrators:

1. What's the most frustrating support issue you've been called to resolve?
A good candidate will demonstrate that they overcame their frustration and handled
the situation with a professional attitude. It is important that System Administrators
do not express annoyance when supporting employees who rely on them to solve a
variety of technical difficulties.

2. Why would you not restore a DC that was last backed up eight months ago?
Look for candidates who understand that a DC is a domain controller, and that
backup files should generally not be older than 180 days. Backing up a DC that is
several months old could lead to inconsistent data, caused by lingering objects.

3. What experience do you have with hardware components?


Only candidates with proficient experience installing and replacing hardware
components should be considered, as this is an operation which will frequently be
performed by the system administrator.

4. What is the difference between LDAP and Active Directory?


Candidates should be able to tell you that LDAP, or Lightweight Directory Access
Protocol, is a standard protocol for querying and modifying entries in a directory
service. Active Directory is a directory service implemented by Microsoft, and it
supports the LDAP protocol, among others.

5. Can you tell us about a time when you initially failed to solve an issue?
The System Administrator should be someone who is able to overcome their failure
and find a solution. Ideally, the candidate should be able to tell you about a strategy
they follow after an attempt fails, rather than trying out different things randomly

Typical sysadmin tasks and duties

Organizations need someone who understands the basics of how a system works so
that they can keep their data safe, and keep their services running smoothly. You
might ask: "Wait, isn’t there more that a sysadmin can do?"
You are right. Now, in general, let’s look at what might be a typical sysadmin’s
day-to-day tasks. Depending on their company’s needs and the person’s skill level,
a sysadmin’s tasks vary from managing desktops, laptops, networks, and servers,
to designing the organization’s IT policies. Sometimes sysadmins are even in
charge of purchasing and placing orders for new IT equipment.

Those seeking system administration as their career paths might find it difficult to
keep their skills and knowledge up to date, as rapid changes in the IT field are
inevitable. The next natural question that arises out of anyone’s mind is how IT
professionals keep up with the latest updates and skills.

Low difficulty questions

Here are some of the more basic questions you will encounter, and my answers:

1. What are the first five commands you type on a *nix server after login?
 lsblk to see information on all block devices
 who to see who is logged into the server
 top to get a sense of what is running on the server
 df -khT to view the amount of disk space available on the server
 netstat to see what TCP network connections are active
2. How do you make a process run in the background, and what are the
advantages of doing so?

You can make a process run in the background by adding the special
character & at the end of the command. Generally, applications that take too long
to execute, and don’t require user interaction are sent to the background so that we
can continue our work in the terminal. (Citation)

3. Is running these commands as root a good or bad idea?

Running (everything) as root is bad due to two major issues. The first is risk.
Nothing prevents you from making a careless mistake when you are logged in
as root. If you try to change the system in a potentially harmful way, you need to
use sudo, which introduces a pause (while you’re entering the password) to ensure
that you aren’t about to make a mistake.
The second reason is security. Systems are harder to hack if you don’t know the
admin user’s login information. Having access to root means you already have one
half of the working set of admin credentials.

4. What is the difference between rm and rm -rf?

The rm command by itself only deletes the named files (and not directories).
With -rf you add two additional features: The -r, -R, or --recursive flag
recursively deletes the directory’s contents, including hidden files and
subdirectories, and the -f, or --force, flag makes rm ignore nonexistent files, and
never prompt for confirmation.

5. Compress.tgz has a file size of approximately 15GB. How can you list its
contents, and how do you list them only for a specific file?

To list the file’s contents:

tar tf archive.tgz

To extract a specific file:

tar xf archive.tgz filename

Medium difficulty questions

Here are some harder questions you might encounter, and my answers:

6. What is RAID? What is RAID 0, RAID 1, RAID 5, RAID 6, and RAID 10?

A RAID (Redundant Array of Inexpensive Disks) is a technology used to increase


the performance and/or reliability of data storage. The RAID levels are:

 RAID 0: Also known as disk striping, which is a technique that breaks up a


file, and spreads the data across all of the disk drives in a RAID group.
There are no safeguards against failure.
 RAID 1: A popular disk subsystem that increases safety by writing the same
data on two drives. Called mirroring, RAID1 does not increase write
performance, but read performance may increase up to the sum of each
disks’ performance. Also, if one drive fails, the second drive is used, and the
failed drive is manually replaced. After replacement, the RAID controller
duplicates the contents of the working drive onto the new one.
 RAID 5: A disk subsystem that increases safety by computing parity data
and increasing speed. RAID 5 does this by interleaving data across three or
more drives (striping). Upon failure of a single drive, subsequent reads can
be calculated from the distributed parity such that no data is lost.
 RAID 6: Which extends RAID 5 by adding another parity block. This level
requires a minimum of four disks, and can continue to execute read/write
with any two concurrent disk failures. RAID 6 does not have a performance
penalty for reading operations, but it does have a performance penalty on
write operations because of the overhead associated with parity calculations.
 RAID 10: Also known as RAID 1+0, RAID 10 combines disk mirroring and
disk striping to protect data. It requires a minimum of four disks, and stripes
data across mirrored pairs. As long as one disk in each mirrored pair is
functional, data can be retrieved. If two disks in the same mirrored pair fail,
all data will be lost because there is no parity in the striped sets. (Citation)
7. Which port is used for the ping command?

The ping command uses ICMP. Specifically, it uses ICMP echo requests and


ICMP echo reply packets.

ICMP does not use either UDP or TCP communication services: Instead, it uses
raw IP communication services. This means that the ICMP message is carried
directly in an IP datagram data field.

8. What is the difference between a router and a gateway? What is the default
gateway?

Router describes the general technical function (layer 3 forwarding), or a hardware


device intended for that purpose, while gateway describes the function for the local
segment (providing connectivity to elsewhere). You could also state that you "set
up a router as a gateway." Another term is hop, which describes forwarding
between subnets.

The term default gateway is used to mean the router on your LAN, which has the
responsibility of being the first point of contact for traffic to computers outside the
LAN.
9. Explain the boot process for Linux.

BIOS -> Master Boot Record (MBR) -> GRUB -> the kernel -> init -> runlevel

10.How do you check the error messages while the server is booting up?

Kernel messages are always stored in the kmsg buffer, visible via
the dmesg command.

Boot issues and errors call for a system administrator to look into certain important
files, in conjunction with particular commands, which are each handled differently
by different versions of Linux:

 /var/log/boot.log is the system boot log, which contains all that unfolded
during the system boot.
 /var/log/messages stores global system messages, including the messages
logged during system boot.
 /var/log/dmesg contains kernel ring buffer information.
11.What is the difference between a symbolic link and a hard link?

Updated Aug 30, 2019 | Editor's note: this answer original said 'a hard link is a
mirror copy of the original file,' which is not accurate. Thank you to Bruce
Bowen for providing the following answer:

A hard link is a directory reference to the same inode that the first directory entry
refers to, and the inode is updated to increase the reference count to know there is a
new link to the data. This means that when a file is 'deleted', the directory is
updated to remove the file name and the inode for the data has the reference count
decremented. The data of the file won't be freed unless the reference count goes to
0. Since inodes are unique for each file system, hard links can't cross file systems.
Soft links create a way to for a directory entry to say "the file information is really
stored in another directory entry". Soft links break if the 'another directory entry' is
deleted.

So a 'user' way to describe the difference between a hard and soft link is that a hard
link is a link to the file data and a soft link is a link to another file name.
12.How do you change kernel parameters? What kernel options might you need
to tune?

To set the kernel parameters in Unix-like systems, first edit the


file /etc/sysctl.conf. After making the changes, save the file and run the sysctl
-p command. This command makes the changes permanent without rebooting the
machine

13.Explain the /proc filesystem.

The /proc filesystem is virtual, and provides detailed information about the kernel,


hardware, and running processes. Since /proc contains virtual files, it is called
the virtual file system. These virtual files have unique qualities. Most of them are
listed as zero bytes in size.

Virtual files such


as /proc/interrupts, /proc/meminfo, /proc/mounts and /proc/partitions provide
an up-to-the-moment glimpse of the system’s hardware. Others, such
as /proc/filesystems and the /proc/sys directory provide system configuration
information and interfaces.

14.How do you run a script as another user without their password?

For example, if you were editing the sudoers file (such as /private/etc/sudoers),
you might use visudo to add the following:

user1 ALL=(user2) NOPASSWD: /opt/scripts/bin/generate.sh

15.What is the UID 0 toor account? Have you been compromised?

The toor user is an alternative superuser account, where toor is root spelled


backward. It is intended to be used with a non-standard shell, so the default shell
for root does not need to change.

This purpose is important. Shells which are not part of the base distribution, but are
instead installed from ports or packages, are installed in /usr/local/bin; which, by
default, resides on a different file system. If root’s shell is located
in /usr/local/bin and the file system containing /usr/local/bin is not mounted, root
could not log in to fix a problem, and the sysadmin would have to reboot into
single-user mode to enter the shell’s path.

Advanced questions

Here are the even more difficult questions you may encounter:

16.How does tracert work and what protocol does it use?

The command tracert—or traceroute depending on the operating system—allows


you to see exactly what routers you touch as you move through the chain of
connections to your final destination. If you end up with a problem where you
can’t connect to or ping your final destination, a tracert can help in that you can
tell exactly where the chain of connections stops.

With this information, you can contact the correct people; whether it be your own
firewall, your ISP, your destination’s ISP, or somewhere in the middle.
The tracert command—like ping—uses the ICMP protocol, but also can use the
first step of the TCP three-way handshake to send SYN requests for a response.

17.What is the main advantage of using chroot? When and why do we use it?
What is the purpose of the mount /dev, mount /proc, and mount
/sys commands in a chroot environment? 

An advantage of having a chroot environment is that the filesystem is isolated


from the physical host, since chroot has a separate filesystem inside your
filesystem. The difference is that chroot uses a newly created root (/) as its root
directory.

A chroot jail lets you isolate a process and its children from the rest of the system.
It should only be used for processes that don’t run as root, as root users can break
out of the jail easily.

The idea is that you create a directory tree where you copy or link in all of the
system files needed for the process to run. You then use the chroot() system call to
tell it the root directory now exists at the base of this new tree, and then start the
process running in that chroot’d environment. Since the command then can’t
reference paths outside the modified root directory, it can’t perform operations
(read, write, etc.) maliciously on those locations. (Citation)
18.How do you protect your system from getting hacked?

By following the principle of least privileges and these practices:

 Encrypt with public keys, which provides excellent security.


 Enforce password complexity.
 Understand why you are making exceptions to the rules above.
 Review your exceptions regularly.
 Hold someone to account for failure. (It keeps you on your toes.) (Citation)
19.What is LVM, and what are the advantages of using it?

LVM, or Logical Volume Management, uses a storage device management


technology that gives users the power to pool and abstract the physical layout of
component storage devices for easier and flexible administration. Using the device
mapper Linux kernel framework, the current iteration (LVM2) can be used to
gather existing storage devices into groups and allocate logical units from the
combined space as needed.

20.What are sticky ports?

Sticky ports are one of the network administrator’s best friends and worst
headaches. They allow you to set up your network so that each port on a switch
only permits one (or a number that you specify) computer to connect on that port,
by locking it to a particular MAC address.

21.Explain port forwarding?

When trying to communicate with systems on the inside of a secured network, it


can be very difficult to do so from the outside—and with good reason. Therefore,
the use of a port forwarding table within the router itself, or other connection
management device, can allow specific traffic to automatically forward to a
particular destination. For example, if you had a web server running on your
network and you wanted to grant access to it from the outside, you would set up
port forwarding to port 80 on the server in question. This would mean that anyone
entering your IP address in a web browser would connect to the server’s website
immediately.
Please note, it is usually not recommended to allow access to a server from the
outside directly into your network.

22.What is a false positive and false negative in the case of IDS?

When the Intrusion Detection System (IDS) device generates an alert for an
intrusion which has actually not happened, this is false positive. If the device has
not generated any alert and the intrusion has actually happened, this is the case of a
false negative.

23.Explain :(){ :|:& };: and how to stop this code if you are already logged into
the system?

This is a fork bomb. It breaks down as follows:

 :() defines the function, with : as the function name, and the empty
parenthesis shows that it will not accept any arguments.
 { } shows the beginning and end of the function definition.
 :|: loads a copy of the function : into memory, and pipes its output to another
copy of the : function, which also has to be loaded into memory.
 & makes the previous item a background process, so that the child processes
will not get killed even though the parent gets auto-killed.
 : at the end executes the function again, and hence the chain reaction begins.

The best way to protect a multi-user system is to use Privileged Access


Management (PAM) to limit the number of processes a user can use.

The biggest problem with a fork bomb is the fact it takes up so many processes.
So, we have two ways of attempting to fix this if you are already logged into the
system. One option is to execute a SIGSTOP command to stop the process, such
as:

killall -STOP -u user1

If you can’t use the command line due to all processes being used, you will have to
use exec to force it to run:
exec killall -STOP -u user1

With fork bombs, your best option is preventing them from becoming too big of an
issue in the first place

24.What is OOM killer and how does it decide which process to kill first?

If memory is exhaustively used up by processes to the extent that possibly


threatens the system’s stability, then the out of memory (OOM) killer comes into
the picture.

An OOM killer first has to select the best process(es) to kill. Best here refers to the
process which will free up the maximum memory upon being killed, and is also the
least important to the system. The primary goal is to kill the least number of
processes to minimize the damage done, and at the same time maximize the
amount of memory freed.

To facilitate this goal, the kernel maintains an oom_score for each of the processes.
You can see the oom_score of each of the processes in the /proc filesystem under
the pid directory:

$ cat /proc/10292/oom_score

The higher the value of oom_score for any process, the higher its likelihood is of
being killed by the OOM Killer in an out-of-memory situation. (Citation)

Conclusion

System administration salaries have a wide range with some sites mentioning


$70,000 to $100,000 a year, depending on the location, the size of the organization,
and your education level plus years of experience. In the end, the system
administration career path boils down to your interest in working with servers and
solving cool problems. Now, I would say go ahead and achieve your dream path.

What is LDAP?

LDAP (Lightweight Directory Access Protocol) is an open and cross platform


protocol used for directory services authentication.
LDAP provides the communication language that applications use to communicate
with other directory services servers. Directory services store the users, passwords,
and computer accounts, and share that information with other entities on the
network.

What is Active Directory?

Active Directory is a directory services implementation that provides all sorts of


functionality like authentication, group and user management, policy
administration and more.

Active Directory (AD) supports both Kerberos and LDAP – Microsoft AD is by far


the most common directory services system in use today. AD provides Single-
SignOn (SSO) and works well in the office and over VPN. AD and Kerberos are
not cross platform, which is one of the reasons companies are implementing access
management software to manage logins from many different devices and platforms
in a single place. AD does support LDAP, which means it can still be part of your
overall access management scheme.
Active Directory is just one example of a directory service that supports LDAP.
There are other flavors, too: Red Hat Directory Service, OpenLDAP, Apache
Directory Server, and more.

LDAP vs. Active Directory

LDAP is a way of speaking to Active Directory.

LDAP is a protocol that many different directory services and access management
solutions can understand.

The relationship between AD and LDAP is much like the relationship between
Apache and HTTP:

 HTTP is a web protocol.


 Apache is a web server that uses the HTTP protocol.
 LDAP is a directory services protocol.
 Active Directory is a directory server that uses the LDAP protocol.
Occasionally you’ll hear someone say, “We don’t have Active Directory, but we
have LDAP.” What they probably mean is that they have another product, such as
OpenLDAP, which is an LDAP server.
It’s kind of like someone saying “We have HTTP” when they really meant “We
have an Apache web server.”

What is LDAP Authentication?

There are two options for LDAP authentication in LDAP v3 – simple and SASL
(Simple Authentication and Security Layer).

Simple authentication allows for three possible authentication mechanisms:

 Anonymous authentication: Grants client anonymous status to LDAP.


 Unauthenticated authentication: For logging purposes only, should
not grant access to a client.
 Name/Password authentication: Grants access to the server based on
the credentials supplied – simple user/pass authentication is not secure
and is not suitable for authentication without confidentiality protection.
SASL authentication binds the LDAP server to another authentication mechanism,
like Kerberos. The LDAP server uses the LDAP protocol to send an LDAP
message to the other authorization service. That initiates a series of challenge
response messages that result in either a successful authentication or a failure to
authenticate.
It’s important to note that LDAP passes all of those messages in clear text by
default, so anyone with a network sniffer can read the packets. You need to add
TLS encryption or similar to keep your usernames and passwords safe.

What is an LDAP Query?

An LDAP query is a command that asks a directory service for some information.
For instance, if you’d like to see which groups a particular user is a part of, you’d
submit a query that looks like this:

(&(objectClass=user)(sAMAccountName=yourUserName)
(memberof=CN=YourGroup,OU=Users,DC=YourDomain,DC=com))
Beautiful syntax, huh? Not quite as simple as typing a web address into your
browser. Feels like LISP.
Luckily, in most cases, you won’t need to write LDAP queries. To maintain your
sanity, you’ll perform all your directory services tasks through a point-and-click
management interface like Varonis DatAdvantage or perhaps using a command
line shell like PowerShell that abstracts away the details of the raw LDAP
protocol.
TL;DR: LDAP is a protocol, and Active Directory is a server. LDAP authenticates
Active Directory – it’s a set of guidelines to send and receive information (like
usernames and passwords) to Active Directory. Want to learn more? Get a 1:1 AD
demo and learn how Varonis helps protect your Active Directory environment.

Top 20 System Administrator Interview Questions and Answers

In the modern world, no organization can maximize its production and maintain a
competitive edge without using systems. For any system to operate optimally, it
must be maintained and configured appropriately and this is where the role of a
systems administrator comes in hardly.

System administrators or sysadmins ensure that a company’s client computers and


servers remain secure and perform well. Thus, the most appropriate candidate for
this role should be skilled and show a clear understanding of the technical feats
needed to keep systems running smoothly.

But how do find the right candidate from among a multitude of applicants? It is all
about asking the right questions and getting them answered correctly. Here are the
top 20 system administrator interview questions and answers to help you get the
most appropriate individual.

1. Describe your Daily Routine as a Systems Administrator?


The interviewer seeks to assess your familiarity with what a sysadmin does daily

Tip #1: Describe what a sysadmin is involved in on a typical day

Tip #2: Demonstrate that you are well-aware of your responsibilities

Sample Answer

As a sysadmin, my responsibilities include performing software installations and


updates, creating user accounts, and providing system access control. Other duties
include reviewing system logs, allocating storage to resources, optimizing and
monitoring computer systems, creating backups, and ensuring data recovery
measures are in place.

2. What Qualities Should A System Administrator Possess?


The interviewer wants to assess whether you understand the qualities that make a
good sysadmin.

Tip #1: State several qualities that sysadmins should have

Tip #2: Demonstrate your understanding by explaining each point briefly

Sample Answer

A sysadmin should be a problem solver since the role is often faced with issues
that need to be resolved. Keen intuition coupled with precise and quick decision
making is very vital.

People skills are necessary as sysadmins deal with end users who don’t know much
about IT. Such users need to be guided in a concise and clear manner.

Patience is another great quality in this role because it involves handling tasks that
need concentration and much time to complete.

Besides, the willingness to learn and being a team player are other vital qualities in
system administration.
3. What is Windows Deployment Services (WDS)?
The interviewer wants to understand your knowledge about WDS.

Tip #1: Define windows deployment services

Tip #2: Briefly describe how WDS functions

Sample Answer

WDS is a server role that offers the ability to remotely deploy Windows operating
systems. It can be used to set up new computers in network-based installations so
that each operating system doesn’t have to be installed.

4. What is the Advantage of Using RAID?


Here, the interviewer tests your understanding of data storage technology

Tip #1: Describe RAID by providing a clear definition

Tip #2: Explain the benefit of using RAID

Sample Answer

A RAID is a virtualization data storage technology that integrates multiple


components of a physical disk drive into a single or several logical units. The
advantage of using RAID is that it increases a system’s storage capacity, improves
overall performance, and offers fault tolerance.

5. Define DHCP and Explain its Importance


Here, the interviewer wishes to test your understanding of the Dynamic Host
Configuration Protocol.

Tip #1: Provide the meaning of DHCP

Tip #2: Briefly explain why DHCP is used

Sample Answer

Dynamic Host Configuration Protocol or DHCP is a protocol that is used to


automatically assign dynamic IP addresses to computers or other devices on
a network. This means a device acquires a new IP address every time it’s
connected to the network. The benefit of DHCP is that it reduces operation tasks
such that a sysadmin doesn’t have to manually configure each device. Besides, the
protocol optimizes the IP addressing plan meaning that unused addresses are made
available to new devices or clients.

6. What Three Attributes Makes You a Great Systems Administrator


The interviewer wants to know whether you have values that match with those of
the company.

Tip #1: State three main attributes that make you the best

Tip #2: Make your answer prompt and precise

Sample Answer

I am curious and analytical. I always explore a problem to find out what really
caused it. If the root cause of an issue is not identified and resolved, the problem
will reoccur and hurt the business. Besides, I am a good communicator with the
ability to share insights in a jargon-free language.

7. Is it a Good Idea to Restore a DC that was Backed Up 7 Months


Ago?
Your technical knowledge about DCs is under test here and the interviewer seeks a
candidate who is knowledgeable about DCs.

Tip #1: Provide a direct and clear answer

Tip #2: Support your answer by explaining it briefly

Sample Answer

Restoring a domain controller that was last backed up 7 months ago is a bad idea.
This is because lingering objects are likely to be encountered that will lead to
inconsistent data. The general rule is that backup files shouldn’t be more than 180
days old.

8. Briefly Tell Us About Your Technical Background


The interviewer is looking for an individual with relevant certifications and
experience.
Tip #1: State your qualifications that are relevant to the systems administrator role

Tip #2: Mention your experience

Sample Answer

I graduated four years ago with a bachelor’s degree in computer science. Besides, I
have earned a CompTIA certification and also worked mainly in the area of server
and PC installation. In my previous assignments, I have been esteemed for
identifying faulty machines early on and providing lasting solutions.

9. What Are You Proud of in Your Working with Endpoint Systems


and Offering Support to Users?
Here, the interviewer wants to assess your user support skills and the ability to
resolve users’ issues.

Tip #1: Think quickly about the experience you have had with users

Tip #2: Demonstrate your user support capabilities and ability to resolve users’
problems

Sample Answer

I am especially proud of being able to identify users’ problems and resolve them
effectively using appropriate tools. My clients as well as the users I have supported
have often referred their friends to me to help them resolve their computer issues. I
always resolve issues without taking much of my clients’ time.

10. What is an Active Directory?


The interviewer wants to assess your understanding of an active directory.

Tip #1: Provide the meaning of an active directory

Tip #2: Support your answer by briefly explaining how an active directory
functions

Sample Answer

An active directory offers centralized control for network security and


administration. It stores all settings and information in a central database and
enables a system administrator to deploy and update software as well as assign
policies. Server computers that are configured with an active directory are called
domain controllers.

11. What is a Domain?


The interviewer is looking for an individual who is knowledgeable about domains
and how they work

Tip #1: Provide the meaning of a domain

Tip #2: Ensure to be brief and precise

Sample Answer

A domain consists of a group of network objects that are organized logically and
share the database of a single active directory. These objects include users,
computers, and network devices among others.

12. Differentiate a Gateway from a Router


Here, the interviewer is interested in testing your ability to differential a router
from a gateway

Tip #1: Provide the difference in a clear and precise manner

Tip #2: Make sure to be prompt and don’t mull over the answer

Sample Answer

Basically, a router is a layer-3 device that functions by forwarding data packets


between networks. On the internet, a router directs traffic. On the other hand, a
gateway is a network device that functions as an entrance to a network.

13. Which Port is Used to Perform a Ping Command?


The interviewer wants to assess your technical know-how regarding the ping
command.

Tip #1: State the port that is utilized by the ping command

Tip #2: Demonstrate that you can use this command effectively
Sample Answer

The ping command utilized ICMP, which doesn’t use TCP or UDP communication
services. In particular, it makes use of the ICMP echo packets and echo requests.

14. Explain the Proc File system


Here, the interviewer tests your familiarity with the Linux operating systems.

Tip #1: Describe the meaning of the proc filesystem

Tip #2: Let the interviewer know that you can use procfs

Sample Answer

The proc file system or procfs is a special file system in Linux operating systems
that offer an interface to the kernel data structures. Although majority of files in
this file system are read-only, some are writable meaning that they permit kernel
variables to be altered. Besides, procfs have a hierarchy of special files that reflect
the kernel’s current state.

15. What do you Understand by Forests and Trees in System


Administration?
The interviewer examines whether you are aware of trees and forests as used in
networks.

Tip #1: Provide the meaning of trees and forests

Tip #2: Ensure to demonstrate how forests and trees are related

Sample Answer

A tree consists of a collection of one or several domains or domain trees that are
found in a contiguous namespace, which is connected in a transitive trust
hierarchy.

On the other hand, a forest refers to a tree collection, which shares a common
global catalog, directory configuration, logical structure, and directory schema.

16. What is the Difference between NTFS and FAT?


The interviewer evaluates your familiarity with FAT and NTFS.
Tip #1: Define FAT and NTFS

Tip #2: Provide a clear distinction between these two terms

Sample Answer

NTFS refers to the current file system utilized by Windows. This file system offers
various features including security permissions, back up, and quotas so that one
can fill up a disk.

FAT is an older file system developed by Microsoft that was chiefly used in
Windows operating systems up to the XP version. FAT doesn’t offer most of the
key features including security and back up that are provided by NTFS.

17. Differentiate an Antivirus from a Firewall


A sysadmin needs to be aware of tools such as a firewall and an antivirus and that
is exactly what the interviewer is testing here.

Tip #1: Define an antivirus and a firewall

Tip #2: Ensure to provide the difference between them

Sample Answer

An antivirus is a program that is designed to protect a computer from viruses. Once


installed on a computer, an antivirus monitors the system continuously to identify
any threat from the internet, external storage devices, or other sources.

A firewall consists of a program that protects a system from hackers, intruders, or


outsiders. Attacks from these sources may be viruses or unauthorized access
intended to steal or destroy sensitive and valuable information. Firewalls come
either as software or hardware. A software firewall is installed on a computer while
organizations install a hardware firewall to safeguard all their systems.

18. What do You Understand by VOIP?


A competent sysadmin needs to be familiar with internet protocol. That is what the
interviewer wants to assess here.

Tip #1: Describe the meaning of VOIP


Tip #2: Provide the impression that you are well-aware of this protocol

Sample Answer

VOIP is an acronym for Voice Over Internet Protocol. It is a category of software


and hardware that helps people in using the internet as a medium of transmission
for telephone calls. This is accomplished by forwarding data in packets through an
IP instead of the traditional circuit transmissions.

19. Explain How a Tracert Works


Here, the interviewer test your understanding of a tracert and how it functions

Tip #1: Define a tracert

Tip #2: Describe the functionality of a tracert

Sample Answer

Tracert or traceroute consists of a command-line tool that can be initiated using a


prompt. It is used to track the path taken by IP packets to their destination. A
Tracert command tracks a route by sending ICMP echo packets to a given
destination. In the end, the command helps you determine where the chain of
connection stops.

20. As a System Administrator, is Team Work Part of Your Typical


Day?
The interviewer wants to know whether your daily work involves working with
others.

Tip #1: Provide a relevant answer concerning your daily activities

Tip #2: Make sure that your answer is satisfactory

Sample Answer

As a sysadmin, I would often provide technical support to teams and end-users.


This may involve software installation, technical troubleshooting, or other
technical duties associated with the role. Thus, I would not be engaged directly in
teamwork. However, I would work with teams occasionally in developing and
explaining technological strategies.
Conclusion
Asking these interview questions for system administrator would enable an
interviewer to assess candidates and determine their level of familiarity with
system administration. Besides, these system admin questions will help to know
the level of experience of every candidate. This understanding is very vital in
identifying the best individual for the system administrator position.

The field of network administration is associated with enormous responsibility. A


network administrator’s core responsibility is to maintain computer networks. This
includes installation and configuration of networks and systems including
troubleshooting all network issues.

Thus, the role of a network administrator requires an individual with significant


know-how and experience on how network systems work. Without relevant
experience and knowledge, it is difficult to succeed in network administration.
Companies always look for the best and most qualified person for this role.

To find the best person, it is imperative to know the right questions to ask
interviewees. Similarly, you should look out for specific answers to identify the
right person. This article discusses the questions to ask during an interview and the
answers to expect from the right person.

1. What is the Basic Role of a Network Administrator?


This is a common question and the interviewer wants to assess whether you are
well-aware about the role performed by a network administrator.

Tip #1: Revise the main roles in your mind promptly so that you will not have to
think deeply about them.

Tip #2: Be clear and precise so that the interviewer can be convinced that you
know your roles.

Sample Answer

First, a network administrator performs a management role that includes user


training, updating networks, maintaining access privileges and user accounts, and
maintaining network logs.
Secondly, the administrator undertakes an implementation role that consists of
installation and configuration of networking software, establishing user accounts,
and installing storage are networks.

Thirdly, the network administrator troubleshoots network issues and responds to


service interruptions.

2. What Qualities Should a Good Network Administrator Possess?


Network administration requires more than just technical competence. Certain
qualities make a network administrator very effective. The interviewer wants to
know whether you are aware of these qualities.

Tip #1: Briefly describe the key nontechnical qualities

Tip #2: Make sure to relate your answer with the role of a network administrator

Sample Answer

Critical thinking and analytical skills are vital for network admins in facilitating
logical and consistent problem-solving. Good time management is another great
quality that enables a network admin to juggle several people, projects, and
problems simultaneously. Interpersonal skills are essential because a network
administrator works with different individuals, from end users to network
engineers.

3. Describe Your Daily Routine as a Network Administrator?


On a daily basis, a network admin ensures that the network is safe, optimized, and
well-protected. The duties involved in accomplishing this objective are what the
interviewer wants to hear.

Tip #1: State several duties performed by a network admin daily

Tip #2: Be precise and direct with your answer

Sample Answer

A network admin configures network hardware such as switches, routers, and


servers. He or she repairs and upgrades computer networks, troubleshoots network
issues, updates and deploys software, and implements basic network testing and
security measures. Moreover, network admins monitor networks to determine ways
to improve their performance and plans for network infrastructure resources.

4. How is Your Decision for Setting up a Network Affected by a


Network Topology?
The interviewer wants to assess whether you know why considering a network
topology is important when you want to set a network.

Tip #1: Be precise and demonstrate that you are knowledgeable about network
topologies.

Tip #2: Provide the answer in a manner that reflects your ability to set a network

Sample Answer

A network topology directs the media that should be used to interconnect devices.
The topology of a network also acts as a basis for determining the
terminations, connectors, and materials that are applicable for setting a network.

5. Describe Ways you can Secure a Computer Network


The interviewer wants to determine whether you can implement measures to
protect a network.

Tip #1: Promptly revise the main points in your head

Tip #2: Be direct with your answer and don’t mull over it

Sample Answer

Firstly, a computer network can be protected by setting up firewalls and ensuring


they are configured correctly. Secondly, installing an updated and reliable anti-
virus program is another sure way to secure a network.

Thirdly, user authentication helps to prevent unauthorised access to a network. A


combination of these methods can make a computer network highly secure.

6. What is the Largest Network Size that you have Ever Setup?
The interviewer wants to determine whether you have hands-on experience on a
network sized to that of the hiring organization.
Tip #1: Describe the biggest size of network you have setup

Tip #2: Be brief and to the point.

Sample Answer

In the past, I have been tasked with creating and implementing a network for a
business with 200 employees. The network supported a simple physical location
where the business offices were housed.

7. What Troubleshooting Process do You Use after Your Network


Configuration Fails to Yield Expected Performance
The interviewer is interested in knowing how you approach complex problems
relating to network performance.

Tip #1: Describe the approach you take when troubleshooting network
performance issues

Tip #2: Ensure to be brief and precise with your answer

Sample Answer

I begin by checking hardware failures, network outages, high network activity, or


other poor performance triggers. After ruling out these, I use analytics and
monitoring tools to find more information concerning the problem. I also reach out
to other technicians and IT staff to expedite the process.

8. What Major Challenge did You Face during Your Last Role? How
did You Handle It?
Network admins encounter various challenges and the interviewer wants to assess
your ability to handle challenging situations and offer appropriate solutions.

Tip #1: Briefly describe a major challenge that you have faced previously

Tip #2: Explain how you solved the issue

Sample Answer

Sometime during my last role, employees started losing data from their computers.
This used to happen even with software and hardware firewalls in place and the
pressure was on me to ensure employee data is secure. While troubleshooting the
issue, I discovered the problem was caused by malicious applications sent via
email. Thus, I educated the staff on how to deal with suspicious emails to avoid
data loss. Besides, I developed an email policy that provided guidelines on
appropriate use of emails.

9. What Authentication Method do You Apply for Network Access?


Security is very critical when it comes to networks. The interviewer wants to
assess your knowledge about security protocols and whether you can apply the
latest and most effective security protocols.

Tip #1: Demonstrate your familiarity about the latest authentication method
applied for network access

Tip #2: Briefly explain situations under which these methods would be most
effective.

Sample Answer

I use the two-factor authentication method is because it is highly secure compared


to single-factor authentication. To secure sensitive information, I would
recommend that you upgrade if you are not using the two-factor method. The use
of biometrics is another effective method and is particularly the easiest for users,
provided appropriate hardware is in place. If you don’t plan to spend much on
hardware, using a token is an effective method for adding security.

10. Differentiate Workgroups from Domains


The role of a network administrator involves setting up and maintaining servers.
The interview wants to know whether you are well-aware of domains and
workgroups.

Tip #1: Provide a clear difference between domains and workgroups

Tip #2: Briefly demonstrate how they are applied in networking

Sample Answer

Domains have a server-to-client set up with a central authentication server where


rules for communication are set. Centralized security and access control minimize
the risk of attacks. On the other hand, workgroups are managed at an individual
system level. With a workgroup, each system controls itself and decides about
what to exchange with users in the same workgroup.

11. Briefly Describe a Firewall and how it is applied in Networks


Firewalls are among the essential tools for network security. The interview wants
to assess whether you understand firewalls and how they are applied in networks.

Tip #1: Define a firewall in a direct and precise manner.

Tip #2: Demonstrate your understanding by explaining how a firewall is used to


secure a network.

Sample Answer

A firewall is a device that monitors incoming and outgoing traffic to block specific
traffic based on the set security criteria. The device filters traffic and prevents
unauthorized access to a network. A firewall achieves this by scanning all
messages entering or leaving a network and blocking those that violate the set
rules.

12. Based on your Previous Experience, what Monitoring Tools


Would You Recommend?
A competent network administrator should be knowledgeable about different
monitoring tools. The interviewer wants to examine your skillset and determine
whether you are a good fit.

Tip #1: State the monitoring tools that you would recommend.

Tip #1: Support your answer by pointing out the main features of each of those
tools.

Sample Answer

I would recommend Idera, Lab Tech, and Logic Monitor. Lab Tech not only
provides network monitoring but also infrastructure management. Logic Monitor
provides both network monitoring and application performance monitoring. Idera
offers all these capabilities but doesn’t allow customization of the dashboard for
quicker access to commonly used features.

13. What is the Difference in the Application of a LAN and VPN?


Expertise in working with different types of networks is critical for a network
administrator. The interviewer wants to understand your knowledge about different
networks.

Tip #1: Demonstrate your understanding of these types of networks by stating the
kind of setting each is applied.

Tip #1: Make sure not to mull as this may suggest that you are struggling to answer
the question or you are not sure.

Sample Answer

A virtual private network (VPN) is the best solution for businesses or organizations
with multiple locations or a large physical footprint both locally and overseas. On
the contrary, a local area network (LAN) perfectly suits businesses that operate
from a single physical location.

14. How do You Make People without Tech Skills Understand


Network Issues?
The interviewer wants to assess how you work with individuals who don’t
understand computer technology.

Tip #1: Demonstrate your ability to explain tech issues to a layman

Tip #2: Be clear and precise with your answer

Sample Answer

Whenever a network issue arises, I always ensure to explain it in layman’s terms to


people with no tech skills. I draw diagrams, use analogies and metaphors to
describe different networking processes and the applications that support those
processes. By using these techniques, people always remark that they have finally
understood the matter at hand and hence work accordingly.

15. As a Network Administrator, Which Resource do you utilize to


Stay Informed about the Innovations in your Industry?
New network solutions can enhance network infrastructures and performance. The
interviewer wants to assess whether you keep up to date with the developments in
the industry.
Tip #1: Make the interviewer understand that you stay informed about new
developments in networking

Tip #1: Avoid mulling as that may make your answer questionable

Sample Answer

I read Network World about innovations, developments, and trends in the industry.
Besides, I have an RSS reader that I use to consolidate various news sources
covering network innovations.

16. What Safeguards can be put in Network Designs to Minimize Data


Loss
Data loss can halt processes, systems, and significantly reduce productivity. Here
the interviewer seeks to know how you can safeguard a network.

Tip #1: Demonstrate that you are knowledgeable about different kinds of
safeguards

Tip #2: Answer the question promptly to show that you have experience with such
situations

Sample Answer

Building disaster recovery resources into network plans is a great way to protect
against data loss. This includes making regular backups and having distributed
storage locations to reduce the chances of losing data.

17. How do Proxy Servers Protect Computer Networks?


Proxy servers are commonly used to offer varying levels of privacy, security, and
functionality and the interviewer wants to assess whether you can deploy them
effectively.

Tip #1: Describe the way a proxy server can offer protection to a network

Tip #2: Give the impression that you have worked with proxy servers

Sample Answer
A proxy server mainly hides the IP address of an internal network from external
users. Proxy servers make it impossible to determine the physical location of a
network. In doing so, they make it virtually invisible to all external users.

18. What Role does the OSI Session Layer Play in a Network?
The interviewer would want to know whether you understand this network layer.

Tip #1: Describe the role played by the OSI Session layer

Tip #2: Demonstrate that you are knowledgeable about the OSI model

Sample Answer

This is the fifth layer of the OSI model and it primarily manages connections
between networked computers. In particular, it establishes connections between
local and remote applications. Besides, it manages and terminates those
connections. This involves establishing procedures for restating, suspending, and
ending connection sessions.

Conclusion
These questions and answers will help you hire the most qualified individual for
the network administrator position for your organization. As an interviewer, ensure
to ask the right questions. Also, allow the interviewee to take his or her time to
provide the correct answer. With these questions, you are set to interview and
select the best network admin.

System engineers work in engineering management or IT industry with the primary


skills of designing, integrating, and managing complex technological systems. At
its core, the professionals work around many principles to combine various
components for a generally useful function. System engineers first have to discover
a particular problem and then identify meaningful solutions. They also analyze
various impacts that might be probable, should the problems fail to be resolved. 

In essence, companies are always looking for experienced system engineers who
are good at what they do. Like any other job application, interested applicants
would be required to participate in an interview to determine their competency for
the engineering job. As an interviewer, you ask various questions and expect
specific answers to help select the best person for the systems engineer position.
Here are the common interview questions for the position of a systems engineer.

1. What are the Roles of a Systems Engineer?


Primarily, the interviewer wants to determine if you are familiar with the systems
engineering role and may probably bring this question first to determine if you are
well-versed to proceed with the interview session.

Tip #1: Silently revise the significant critical points in your head before you
answer. Don’t hesitate at this point, as that would give the impression that you
aren’t sure about the field.

Tip #2: Don’t go about giving in-depth explanations about everything that a
systems engineer does. Be precise and accurate in displaying basic knowledge that
deems important and time-saving.

Sample Answer

A systems engineer works with other departments in large organizations to meet


the needs of customers and clientele base. The professional has three primary roles.
First, he focuses on installing, setting up, configuring, and maintaining hardware
and software systems. This also includes solving every technical problem about the
system, should they arise. Second, he analyzes data in an organization to improve
it and helps to balance complex aspects of a project. Third, he ensures that
upgrades to the systems are implemented so as to enhance security.

2. What Qualities should a Systems Engineer Possess?


The interviewer wants to gather if you know what it takes to be a good systems
engineer, including the inculcation of the essential skills during your time in the
company.

Tip #1: Don’t get too overambitious and over mention many skills.

Tip #2: Don’t refer the skills to your competency level: leave it to the interviewer. 

Sample Answer

My skills go beyond long years of experience in the field of systems engineering.


For instance, I have patience and perseverance in working with complicated
systems. I also have significant technical and analytical skills to perform various
tasks, thus growing the business.

3. What Major Challenge Did You Face during Your Last Role? How
Did You Handle It?
Before hiring you, the interviewer wants to be sure that you can handle any
shortfall in your career.

Tip #1: Use the most recent challenges that you handled in the best way

Tip #2: Keep your explanations informative and direct to the point.

Sample Answer

One major challenge that arose in my previous role was the increasing complexity
of various problems that I was called upon to solve including system failure. The
organization has inadequate procedures to effectively resolve these problems. To
address this issue, I created a systems engineering plan that described the
procedures to be followed in implementing system maintenance processes and
activities to minimize or eliminate system failure.

4. Does Learning About New Technology Excite You?


Here, the interviewer is looking for a candidate that is ready to learn despite the
demand of the job.

Tip #1: Describe how you learn new concepts

Tip #2: Let the interviewer know that you keep up-to-date about technological
developments

Sample Answer

I am always open to discover new things since technology is ever-changing. On


top of my experience, I seek to be better to make my skills more efficient. I also
attend technical training every year to polish my skills and learn new ones.
5. As a Systems Engineer, Which Part of the Job will You Find Most
Challenging?
Operations such as coordinating various teams, designing, and implementing
various strategies can become difficult for system engineers.

Tip #1: Focus on your area of expertise

Tip #2: Conclude with a stronghold

Sample Answer

Looking into complex systems and their behavior is a challenge, mainly because of
the future`s uncertainty-markets, environments, and properties are changing, in
addition to arising threats. However, I am always inspired to bridge the gap in the
best way to defeat several performance challenges.

6. How Would You React to a Team Member Who has made an


Intense Mistake?
The interviewer wants to have an idea of how you would react when faced with an
unexpected problem.

Tip #1: Don’t take the matter into your hands

Tip #2: Consider the chain of authority

Sample Answer

I understand that it is not in my place to discipline my team members when they


make a mistake. In light of the issue, I would report it further to
higher management personnel if I am unable to address them accordingly.

7. Have You Ever Led a Team Before? What Was Your Experience?
The interviewer is trying to determine if you are responsible for leading a team to
attain specific goals.

Tip #1: Give the most recent experience

Tip #2: Share your success story

Sample Answer
I once had to lead a systems development committee to gather effective ways of
improving the performance of one of the website’s software. We used great
approaches that increased sales for the company. They included adequate system
analysis and the total systems concept to achieve maximum results in the overall
output.

8. Where Do You See Yourself in Five Years?


The interviewer wants to know your thoughts about future expectations/

Tip #1: Be brief and precise

Tip #2: State your future expectations

Sample Answer

I look forward to assuming more management responsibilities and getting involved


in solving more complex challenged in the field of systems engineering.

9. Why do you think you are the Best Candidate for the Job?
The interviewer wants to find out if you would be an asset or a liability.

Tip #1: Don’t over present yourself

Tip #2: Keep it simple and accurate

Sample Answer

I am passionate about designing, integrating, and managing complex systems.


Besides, I am well-trained and experienced to effectively execute this role.

10. Have You Ever Designed a Software or System? Describe the


Relevance of the Process
The interviewer wants to measure the weight of your knowledge on the
significance of the systems engineering process.

Tip #1: Reflect on a system you designed and the process involved

Tip #2: Be direct and brief with your answer

Sample Answer
The process comprises of four steps:

 Analyzing the requirements, including the suitability of the environment


 System analysis control to measure and manage risks
 Allocation/ functional analysis to allocate performance and other
requirements.
 Synthesis of a suitable design to configure various system elements and
items
The system adds value to a particular development by ensuring that various
requirements and functions are in order. It also demonstrates the completeness of
the design of system elements, and for validation and verification.

11. What’s your take on the Frequency of Upgrading Systems?


Systems need to be upgraded regularly to ensure effective performance. The
interviewer is trying to determine if you understand the significance of updating
machines and software in your job description,

Tip #1: Highlight the need and importance of upgrading systems regularly.

Tip #2: Keep your answer simple and avoid exaggerations

Sample Answer

Security in an organization is enhanced when systems cannot be hacked or bugged,


to mention a few. Therefore, it is crucial to upgrade systems to prevent such issues
from arising. The upgrades can be carried out to full capacity every two years.

12. How Would You Breakdown a Complex Technical Problem to


Stakeholders Who are not Familiar with Technology?
On some occasions, you will have to interact with non-technical individuals in a
company to explain systems engineering concepts. Here, the interview wants to
determine if you are fit to help them understand such concepts.

Tip #1: Prove that you can break down complex engineering concepts to simplify.

Tip #2: Explain the approach you would use

Sample Answer
I would use a cheat sheet, for instance, to help explain to them the technical terms
in a simple way that they can understand. This would involve illustrating concepts
and using analogies to make them understand. A network/ system diagram and
business process flow would also be ideal.

13. What Would You Recommend for the Improvement of Our


Current Systems?
The interviewer wants to have insight into how you can be productive and of
quality to the current teams. Simply put, how detail-oriented are you?

Tip #1: Focus on the company without trying to pinpoint its downfalls directly.

Tip #2: Bring out precise details on the approaches you plan on taking.

Sample Answer

As a systems engineer, my principal responsibility would be to evaluate the


performance of the existing systems and identify areas that need useful
improvement.

14. How do You Plan and Prioritize Work during Your Time with
Our Company?
Your ability to prioritize work is assessed at this point.

Tip #1: Demonstrate your ability to prioritize work

Tip #2: Focus on how to become an asset that adds value the company

Sample Answer

I plan all my projects with a checklist and order them according to the urgency. I
take my time to work on them attentively while managing my time significantly to
handle the rest. The flexibility of attending multiple tasks is also an essential aspect
of maintaining my schedule as it is.

15. Suggest any Methods that would help to Monitor and Maintain
Systems for Maximum Productivity
The performance of all systems in an organization is of great concern. The
interviewer wants to know the approaches that you would utilize to maintain the
company’s systems’ proper functioning.
Tip #1: Use your experience to focus on how you can build the systems of the
company

Tip #2: Suggest one ideal method that would work for the company’s betterment

Sample Answer

Monitoring should be done frequently, say weekly, to identify flaws before they


become rampant. When they arise, issues should be dealt with immediately by
individuals who are highly trained to ensure that operations run smoothly in the
company. I would use IT365 technology to monitor systems, network usage, and
performance.

16. How Would You Handle High-Severity Issues and Challenges?


Many at times, issues are inevitable in a working environment. They crop up when
you least expect, mainly when things seemed to run smoothly. Here, the
approaches that you would use to address such mishaps are in the spotlight.

Tip #1: Avoid making it personal

Tip #2: Be smart, lest you fall into a tricky trap

Sample Answer

As I can work under pressure, unexpected issues wouldn’t limit me from


outperforming to the best of my abilities. In case of unforeseen issues, I would
effectively dedicate my experience to calm everything down once again. I would
also bring other departments on board to resolve the issue faster.

17. What Would Be Your First Step in Solving a Situation Whereby


Production is Decreasing?
In essence, this is a situational question to test your attitude towards addressing
problems that require immediate attention for the sake of the profitability of the
company.

Tip #1: Use examples to support the relevancy of your answers

Tip #2: While the question is more practical, theoretical knowledge would also
come in handy.
Sample Answer

I cannot solve a problem without understanding what caused it in the beginning.


First, I would seek to understand the issue at hand. Ideally,
decreasing production may be as a result of systems failure or inefficiency of
managing the systems. Correspondingly, I would establish where to start in
bringing everything back to order. I would also perform a root cause analysis to
identify the major problems that led to the issue.

18. Have You Ever Created a Plan for Disaster Recovery? How Did
You Succeed?
Tip #1: Reflect a similar past experience

Tip #2: Describe the recovery plan you created

Sample Answer

During my previous role, I came up with a design for a data recovery center. The
organization adopted the designed and implemented it. In the end, the organization
had an active data recovery center.

19. How Do You Keep Up with the Latest System Engineering


Technology?
These type of system engineering interview questions require in-depth analysis and
critical thinking to employ the most advanced solutions towards solving problems.

Tip #1: Give specific answers and the willingness to learn

Tip #2: Present logical suggestions for future improvements

Sample Answer

I have access to relevant materials and websites that showcase the latest
technology in systems engineering. I also read publications often in appreciation of
the work that other engineers have done and think of ways to improve it. Finally, I
attend training to learn more about innovations and how to be part of them.

20. How would You Troubleshoot the Problem of a Slow Running


system?
The question demands an effective strategy tailored to the improvement of the
system to improve performance and productivity.

Tip #1: Walk the interviewer through a step-by-step process

Tip #2: Have relevant examples of the possible ways of fixing the troubleshoot

Sample Answer

I would begin by monitoring how the system is operating versus the expected


performance. Following this, I would assess every element or subsystem to identify
the faulty areas. Once identified, I would ensure that that fault is rectified to
achieve the expected functionality.

Conclusion
The above questions and answers can prepare an interviewer adequately to hire the
best systems engineer. On the other hand, knowing what to expect in an interview
will help an applicant to answer questions relevantly and as expected. Hopefully
these system engineer interview questions guide will help you land your next
dream job.

Systems Administrator Interview Questions

1. According to an HTTP monitor, a website is down. You’re able to telnet


to the port, so how do you resolve the issue? See answer 
2. What are you especially proud of in your experience with support for
users and endpoint systems? See answer 
3. Suppose you try to fix a problem, such as passwords not working for a
group of users, but your attempt fails. What would you do?

Show more questions 

8 Systems Administrator Interview Questions and Answers


According to an HTTP monitor, a website is down. You’re able to telnet to the port, so
how do you resolve the issue?

Technical skills matter a lot in systems administrator jobs. Thus, many of your
interview questions should deal with assessing candidates’ hard skills, and this
question covers several areas of required knowledge.

Look for:

 Identifying the problem instead of just telling hardware techs something is


wrong

 Ability to troubleshoot

 Curiosity to figure out the “why”

Example:
“Assuming the web page is up, I would investigate what could be wrong with the
monitor. It could be a system overload or flapping, among other issues. Identifying
the problem helps me prevent it in the future.”

Suppose you try to fix a problem such as passwords not working for a group of users,
but your attempt fails. What would you do?

It is important for systems administrators to be unafraid of failure and


experimentation. In fact, it can be rare for a first attempt at fixing a problem to
succeed, and your candidates should have logical strategies for coming up with
solutions.

Look for:

 A real strategy instead of trying things randomly

 Recognition that multiple attempts are often necessary

 A walk through the process

Example:
“I’ve learned from experience that a first attempt doesn’t always work. I always
make sure to have at least two other backup plans. Here’s something that happened
at my previous job …”

What are three attributes that make you a great systems administrator?

This question lends insight into candidates’ self-awareness skills as well as


whether their values match those of your business.

Look for:

 Answers that match areas of emphasis in your job description

 At least one soft skill

 Attributes that fit your company culture

Example:
“I’m analytical and curious. I always dig to find out why a problem occurred.
Otherwise, it is liable to happen again and hurt the business. I am also a great
communicator, able to share my insight with anyone in jargon-free language.”

Why is it a bad idea to restore a DC last backed up seven months ago?

This question gets to candidates’ technical knowledge. DC means domain


controller, and your candidates should know what it is.

Look for:

 Use of lingo or jargon

 A mention of lingering objects

 Knowledge of 180 days

Example:
“If you back up a DC seven months old, you could encounter lingering objects that
lead to inconsistent data. Backup files, as a general rule, shouldn’t be over 180
days old.”
What is your technical background?

Systems administrators can have a tremendous range of experiences and


certifications, so it’s important to hire one who can do the specific job your
business needs. Even if candidates’ resumes and/or cover letters gave an overview
of their technical background, this question lets them explain some aspects in more
depth.

Look for:

 Qualifications that match what you’re looking for

 An explanation of how the candidate compensates for any gaps (work


experience in lieu of schooling, for example)

 Specific certifications

Example:
“I earned a bachelor’s degree in computer science four years ago. Since then, I’ve
obtained my CompTIA certification and worked primarily in installing PCs and
servers. I’ve developed a reputation for identifying problematic machines early on,
and I enjoy customer service and software programs such as Adobe Acrobat.”

What are you especially proud of in your experience with support for users and
endpoint systems?

Many systems administrator jobs require interaction with users and knowledge of
remote techniques and ticketing systems. This question ensures that the candidate
will be able to do the customer service you require.

Look for:

 Ability to help and please clients

 Specific examples) of accomplishments

 Recognition of the value of a good client experience

Example:
“I’m particularly proud of the fact that I can effectively identify a problem and the
best tools to resolve it. My clients often refer me to others and talk about how I
quickly restore their functionality. In fact, here’s something that happened while I
was at HTWW company …”

We’re looking for someone who works well independently since the position involves
field work and telecommuting. Give an example of how you’re a self-starter.

This question is position-specific and gets to the heart of whether the candidate’s
personality fits the requirements. Someone who needs a lot of team support might
not fare well here.
Look for:

 An actual example from previous work

 A tie-in to telecommuting or field work for even more insight

 How the example benefited the worker, client or another party

Example:
“I was fortunate enough to have a mentor at my first systems administrator job. He
taught me the importance of initiative and preventing problems. So, I make it a
point to touch base with clients regularly. In one of these instances last year, a
check-in led to a conversation where I was able to identify the early stages of a
badly written application. If not for that check-in, the problem could’ve gotten
worse and proven extremely costly for the client.”

You encounter a system defect but still can't figure out the cause. What do you do?

Systems administrators are responsible for maintaining computer systems for


businesses and often receive calls from company employees to diagnose and fix
system issues. This question allows interviewers to determine a candidate's ability
to ask for help and acknowledge when they've reached their professional
limitations.

A candidate's answer should emphasize:

 Problem-solving skills
 Ability to consult others

 Verbal communication

Here is an example of a quality candidate answer:

Example:
"The first thing I do is remind myself not to be discouraged. I have specific
qualifications and a limited scope of knowledge about in-depth system
components, so in these situations, I'm happy to consult with the systems engineer.
I can even learn more about how to diagnose and solve more complex defects in
the process."

Top 20 Database Administrator Interview Questions & Answers

The role of database administration is very critical when it comes to managing


databases and ensuring their information is accessible when needed. For this role,
you need to hire a person who can efficiently manage the company’s data,
databases, and servers. These are critical assets that must be handled by a
competent individual. Here are the top 20 questions and answers that will help you
select an expert database administrator for your company.

1. What Roles are Performed by a Database Administrator?


Your familiarity with the roles performed by database administrators is assessed
here.

Tip #1: Mention some roles that a database administrator perform

Tip #2: Make it prompt and brief

Sample Answer

A database administrator plans about the installation of organization-wide database


systems, implements departmental work plans, monitors the functionality of
database resources, and reviews and evaluates database software. Other roles
include maintaining relevant standards, securing databases, and troubleshooting
database problems.

2. Describe Your Previous Experience with Database Servers.


The interviewer wants to know if you have any experience working with database
servers and how that experience will help the company.

Tip #1: Describe your experience of working with database servers.

Tip #2: Explain anything that stood out for you.

Sample Answer

I have worked with different databases including oracle for the past five years.
Whenever failure occurs, I capitalize on my skills and knowledge to identify the
problem and rectify it promptly. To overcome certain security and functionality
issues, I make sure to upgrade a database to a more recent and better version. I
have been involved in setting up databases as well as migrating data from one
platform to another.

3. How Will You Help a Client Get the Best SQL Server?
The interviewer wants to test your knowledge on servers and how you can use it to
help clients.

Tip #1: Describe how you assisted a client set up a server.

Tip #2: Clearly describe your role in the process of helping the client.

Sample Answer

I will ask the clients about the size of the organization so that I can determine the
best SQL that will suit her organization’s needs. I would also ask about the uptime
and any unique security requirements as well as other applications that the client
will use.

I once assisted a client who was experiencing trouble with her new SQL server.
The system was very slow, and it was affecting her business. I analyzed and
discovered a lack of compatibility between the new and old databases, so I
upgraded the databases, and the system functioned well.

4. As a Database Administrator, How Do You Prevent Data Loss?


The interviewer is testing whether you can prevent data loss.

Tip #1: State how you prevent data losses.


Tip #2: Show that you can help to secure data at all times.

Sample Answer

I make sure to perform regular data backups. Before migrating any data, I ensure
that it is backed up and the backup is secure and in good condition.

5. Describe How You Would Use SQL Agent.


The interviewer is testing your depth of experience using SQL server

Tip#1: Clearly explain the purpose of the SQL agent.

Tip#2: Describe a situation where you used it.

Sample Answer

SQL agents enable you to perform commands at a specific time repeatedly. For
example, backups are done frequently at particular times. I use SQL agents to
perform backups daily at a time when no one is using the system. I do my backups
at 3:00 am using SQL agents.

6. What Database Tools Do You Use?


The interviewer is seeking to find out how you use tools to solve problems.

Tip #1: Mention the tools you use and why you prefer them

Tip#2: Cite a situation when you used the tools

Sample Answer

Navicat allows me to connect many servers and work quickly and more efficiently.
I once used Navicat and MS Access to help a client to migrate and clean up data
quickly.

7. How Do You Handle Complains About Database Performance from


Users?
Here, the interviewer wants to test your problem-solving skills.

Tip #1: Explain in detail the problems the users experienced and the process you
used to solve it.
Tip #2: Describe an experience when this happened.

Sample Answer

I regularly check and monitor the database to ensure it is working properly.


However, if I receive user complaints concerning a particular issue, I start by
analyzing the problem. After carefully analyzing the problem, I am able to identify
the root cause. Then, I take appropriate actions to rectify it. Once the issue is
eliminated, I seek feedback from users to know whether they are satisfied.

8. Briefly describe a Database?


Your basic knowledge of databases is tested in this question.

Tip #1: Define a database

Tip #2: Show that you understand the database concept.

Sample Answer

A database is a collection of organized and structured data or information that is


typically stored electronically. A database is controlled and managed using a
database management system.

9. What is a Database Query?


The interviewer is testing your knowledge about database query

Tip #1: Clearly define a Query

Tip #2: In simple terms, state the function of the query

Sample Answer

A query consists of instructions directed to a database. It instructs it on what to do,


like to create a table, read, update a record, or delete data. Database queries are
written in the form of questions or statements.

10. What is SQL?


The interviewer is testing your knowledge of languages used to manipulate the
database.
Tip #1: Clearly define the term

Tip#2: Describe in detail the functions of SQL.

Sample Answer

SQL stands for a sequential query language that you use to instruct the database to
do what you want. You can give the database instructions through questions or
statements and manipulate the data already in the database.

11. Explain the Function of a Primary Key


Your technical skills are tested with this question. The interviewer wants to know
if you have interacted extensively with databases.

Tip #1: Clearly state the function of a primary key

Tip #2: Give examples of a primary key

Sample Answer

A primary key is a unique value of a table that is used to index that table. The
primary key is used to retrieve a particular record from a table within a database.
For example, in a school, every student is given an admission number. The
admission number is unique and cannot be shared by two students. If you want to
retrieve all the information of a particular student from the database, you will use
this unique identifier.

12. Differentiate between a Navigational Database and a Relational


Database.
The interviewer is testing your knowledge of the different types of databases and
how they differ from each other.

Tip #1: Describe each database type and its function

Tip #2: Clearly describe how the two databases differ from each other

Sample Answer

A navigational database is structured like a tree. A value has a parent and a child,
and that is how they link to each other. If you want to access data, you have to
follow a particular route as you move from parent to child. On the other hand, a
relational database is more flexible and uses a primary key, which is a unique
identifier to access data.

13. What Types of Database have You Used?


The interviewer wants to know if you are conversant with different database
systems.

Tip #1: Describe in detail your experience with various databases

Tip #2: Be honest and straight to the point

Sample Answer

I have worked with the Microsoft SQL Server. I worked with the 2012 version for
seven years. I have also worked with Oracle for three years. Besides, I am well-
versed in using centralized, distributed, and cloud databases.

14. Share your Experience with Cloud Databases?


The interviewer wants to test your level of knowledge on cloud databases.

Tip #1: Describe cloud databases

Tip #2: Show that you are experienced in using this type of database

Sample Answer

Cloud databases are database services that are built and accessed using a cloud
platform. Although they offer the services provided by traditional databases, they
have added flexibility that is enabled by cloud computing functionality. The good
thing about a cloud database is that no physical space is required. Besides, it is
highly secure and can be accessed simply using a web interface.

15. What Do You Understand by ODBC?


The interviewer wants to know whether you are familiar with ODBC interface.

Tip #1: Show that you understand what is meant by ODBC

Tip #2: Make it prompt to avoid becoming questionable


Sample Answers

ODBC is an acronym for open database connectivity. This is an interface


developed by Microsoft that permits applications to gain access to data stored in a
database using SQL. The functionality of ODBC is supported by its four
components: an application, driver manager, driver, and data source.

16. What is your daily routine as a database administrator?


This question tests whether you are familiar with the duties and responsibilities
performed by database administrators daily.

Tip #1: State the duties performed by a database administrator

Tip #2: Make it quick and don’t mull

Sample Answer

My daily routine includes monitoring user access and security, managing


parameters to offer prompt responses to end users, monitoring database
performance, and installing new versions of the DBMS. Besides, I will perform
data backup, control access permissions, train users on accessing the database
information, and troubleshoot related issues and resolve them quickly.

17. Explain How You Troubleshoot Database Issues?


The interviewer wants to know the strategy that you use for troubleshooting
database problems.

Tip #1: Clearly state the procedure you use to analyze and solve a database
problem.

Tip #2:  Show that you can identify database problems and find solutions.

Sample Answer

I continuously monitor the database server. I use a ticketing system for users to
report any issues that they are experiencing. If there is a problem, I analyze and
identify the cause. After I have successfully identified the cause, I will solve the
problem immediately. However, if it’s a simple technical issue, I will designate it
to a technical person and follow up to ensure the issue has been resolved
successfully and quickly.
18. What Do You Understand by a Database Schema?
This question tests your knowledge about the internal communication of tables in
databases.

Tip #1: Define the term database schema

Tip #2: Be precise and provide all important points

Sample Answer

A database schema represents how tables within a database communicate with


each other. It’s usually a two-dimensional representation. For example, a relational
database will have tables linked to each other using a primary key and a foreign
key. This linking is what enables the communication between the tables.

19. Explain Log Shipping in the Microsoft SQL Server.


The interviewer is testing your knowledge in the Microsoft SQL Server.

Tip #1: Define the term log shipping

Tip #2: Show a clear understanding of log shipping and its function

Sample Answer

Log shipping is the same as a backup in Microsoft SQL. It uses rapid failover in
instances when the main server is not working. Therefore, Log shipping is done
manually.

20. Briefly describe your experience with Hadoop?


The interviewer wants to know whether you are familiar with Hadoop.

Tip #1: Describe Hadoop and its application

Tip #2: Demonstrate that you are experienced in Hadoop

Sample Answer

Hadoop enables companies to work with huge data sets. In my previous


assignments, I have implemented and optimized Hadoop solutions for different
enterprises. I ensure to stay abreast of new methods of using Hadoop. I engage in
forums where this technology is discussed and through that, I learn a lot.

Conclusion
Understanding interview questions and the responses to look for is a great step
towards finding the right candidate. Since the database administration role is
critical in any company today, employers need to make sure they ask the right
questions to help them get the best and most qualified person for the job.

Here are some of the most common windows server administrator interview


questions you should prepare to do well in the interview.

1. In the context of the Registry, how do you define “tattooing”?

“Tattooing” the registry suggests that customers can change and view the
preference of the customers that are not placed away in the preserved prescribed
Registry portions. Irrespective of the assembly approach is evacuated or changed,
the preference of the client will currently be kept in the registry.

2. What is an Active Directory?

Active Directory is an organization of the inventory in a library to gather objects


such as computers, customer profiles, etc. It effectively controls the framework
through Domain Controllers that are available at many zones with the database of
the Active Directory. A section of the limits fuse dynamic association with
numerous land zones, check of computers and customers in the space offered by
windows, using the Domain Controller to copy Active Directory. In accumulation
to that these lines will be returned to every Domain Controllers.

3. Distinguish between a computer process and a thread.


Computer Process

In computing, a process is a computer program case that is performed repeatedly


by a computer, that can run numerous programs on computer at the same time.

Thread

A thread comprises the many executable programs that collaborate as a solitary


process. For instance, a thread might send a notification error to the customer; an
alternative might contract with the signals of error although the third thread may
perform the primary action.

4. What do you know about authorizing DHCP Servers in Active Directory?

In case, a DHCP server is to function in an Active Directory domain (and the


domain controller is not used to running it) it should first be approved to Active
directory.

5. What Is Group Policy?

Group Policy is a Microsoft Windows NT feature that is also a family of OS that


manages the work setting of computer accounts and user accounts. Group Policy
offers the central configuration management and of OS, users’ settings, and
applications in an Active Directory setting.       

6. List flexible single master operations (FSMO) roles by Windows Server?

Following are some of the roles of FSMO:

 Infrastructure Master
 Schema Master
 PDC
 RID Master
 Domain Naming Master

7. What do you understand by domains, forests and trees?

The rational units of any organization of Active Directory are usually called tree,
domain, and forest. Various articles in the procedure of a rational section join
accompanying: customers, computers, devices, etc. that share an analogous active
database registry that is normally known as a “domain”.

A tree is an assortment of domains in the Active Directory that starts at one root
and branches out into child domains, peripheral. This might similarly comprise an
adjoining namespace linked in a transitive order.

The domains collection is often known as “forest” that shares general logical


structure, inventory, registry pattern and registry setup. It typifies the limits of
security for groups, clients, and devices for example computers.

8. What is Group Policy Objects (GPO) and list different kinds of GPO?

The setting that controls the client records the workplace, and also computer
records, are called Group Policy Object (GPO). This help is describing the
programming establishment, security alternatives, upkeep choices and library-
based arrangements, folder redirection choices and content choices. There are
usually 2 categories of GPO:

Local GPO: These are put away on close devices.


Nonlocal GPO: These are available on Active Directory and are put away on a
domain controller.

9. Can we link third-party Directory service to an Active Directory?

Yes, why not, it is possible to link third-party directory services to Active


Directory with by using different versions of Microsoft. dirXML or LDAP can be
used to link Active Directory to other retailers.

10. What commands you will use to check TCP/IP configurations?

The 2 most often used check TCP/IP configurations commands are:

Ipconfig: To check the IP setup of the computer, we can use the command Ipconfig
and additionally it can be very well applied to reestablish the IP address of the
users if it is specified by a DHCP server.

Ping: To check the link among the computer in use and the other computers, we
can use the Ping command.

11. What do you know about working of IntelliMirror?

IntelliMirror supports to settle settings of desktop, stored files and applications for


users especially the one who move among workstations and works offline.

12. How you can install an app MSI file when the is not available?

To install the application without using the MSI file, the Software Installer. ZAP
text file can be used in its place.

What is the domain controller’s basic function?


The domain controller function is to verify customers to many networks and bring
a set of objects that involved the Active Directory.

13. What is the goal of installing local DNS servers?

A local DNS server offers the local mapping of fully competent domains to IP
addresses. To resolve requests concerning the domains on network, local DNS
servers can offer record data to distant DNS servers.

14. What’s new in Windows Server 2019?

It is the latest window server version that uses the shortened LTSC or long-term
servicing channel. Some of the most dominant features if the new windows server
2019 are:

 Support for Kubernetes


 Storage Space Direct
 Storage Replica
 Improved Windows Defender
 Windows Subsystem for Linux
 Other GUI new features from Win10 version 1809
 Storage Migration Service
 System Insights

15. What is Windows Server’s default user interface?

Windows PowerShell is said to be the default user interface and command-Line


Shell made by Microsoft. The main goal of the PowerShell is to systematize
administrative tasks that work both remote and local windows machines. .NET
Framework is used to build PowerShell.

16. What is INODE?

The file’s metadata are kept by INODE holds; INODE is said to be a unique
pointer to a disk block. You can also say that it is a unique number owed to a file
in UNIX-like Operating system.

17. Explain what is RAID in Windows Server?

For storing the same data at a different place RAID or Redundant Array of
Independent Disks strategy is used. It is a strategy for building fault tolerance and
increase storage capacity. On separate drives it allows you to combine one or more
volumes so that they are accessed by a single drive letter

18. What Are the System Administrator Roles?

The System Administrator role varies in the organization. The 2 key System
Admin tasks are Supporting, Installing and maintaining computers & servers.

 Install patches & OS Updates


 Access user’s administration
 Creating and Restoring system backups
 Access control
 Review system logs access administration
 Planning Disaster recovery
 Comply with password needs
 System audit logging
19. Can you name Different Version of Windows Server?

The version of windows servers till now are:

 Windows Server 2003 (2003)


 Windows Server 2003 R2 (2005)
 Windows Server 2008 (2008)
 Windows Server 2008 R2 (2009)
 Windows Server 2012 (2012)
 Windows Server 2012 R2 (2013)
 Windows Server 2016 (2016)

20. What is the global catalog?

The Global Catalog is a kind of database that comprises all of the data relating to
objects in Active Directory environment domains.

21. Explain the difference between local, universal and global groups?

Domain local groups allocate access approvals to international groups of domains


for local resources of the domain. Global groups offer access to other trusted
domains’ resources. The Universal groups grant access to all trusted domains
resources.

22. Can Active Directory Partitions Be Restored?

We can authoritatively restore the objects from domain and configuration partition.
Authoritative restores of schema-naming are not supported here.

23. Explain different types of active directory partitions.


Configuration Partition– it is a partition that stores all the data of Active
Directory. The data comprises site-link, Site, subnet etc. This partition copies all
domain controllers that are available in the Forest.

Application Partition– it stores the information of applications in Active


Directory. For examples DomainDNSZones and ForestDNSZones.

Schema Partition–It stores all the information of the objects and their qualities; it
copies to other domain controllers in the Forest

Domain Partitions– it stores the domain information that includes a computer,


user, printer, group, etc. It also copies to all domain controllers in the domain.

24. What is a Proxy Server?


It is a computer that is actually a doorway between a local network (such as all
computers in one organization or in a building) and a larger-scale system such as
the Internet. Proxy servers offer increased security and performance. In most of the
cases, they monitor employees using outside resources.

25. What is WINS server?

Windows Internet Name Service (WINS) servers map the IP addresses to NetBIOS
names. This lets employers access resources by name of the computer rather than
the IP address. To keep a check on the IP addresses and names of other computers
network, this computer can be configured as a WINS server.

We may not able to connect to a remote network through its NetBIOS name, in
case you are not using WINS in a network,

26. Define Dora Procedure & its usage.

Discover, request, Offer and acknowledgement. it is used to automatically allocate


an IP address to systems of the client.

27. In which order the GPOs are applied?

We can apply the GPO is an order of

 Local Group Policy object site,


 Domain and
 organizational units.

28. Can you state a few benefits of GPMC?


One of the major benefits of GPMC is its easy management of all GPOs diagonally
the whole Active Directory Forest View of GPOs in one list. We can do the GPOs
backup and restore, Immigration of GPOs across many forest and domains.

29. How you will do the backup for Group policy?

1. For back up, one single GPO, right-click the GPO and then click Back Up.
2. For backup, all GPOs in the domain, right-click Group Policy Objects and
click Back Up All.

30. What is the group nesting?

When we add one group as an element of another group is known as ‘group


nesting’. It also helps in easy management and reduced traffic replication.

31. What is Domain control?

A domain controller is a server that manages the security requests from other
servers and computers in the Windows Server domain. There are two kinds of the
domain controller that is a backup domain controller and a primary domain
controller. The primary domain controller emphasis on services of the domain to
avoid the system possibility of a crash or slowing down because of the overtasking
from handling other security requests and functionality. If the primary domain
controller goes down, a backup domain controller is promoted and become the
primary domain controller to preserve the server systems working appropriately.

32. What is tree?

A tree is actually a collection of domains in the Active Directory that starts at one
root and branches out into child domains, peripheral. This can similarly comprise
an adjoining namespace linked in a transitive order. An Active Directory forest is
an assortment of Active Directory trees, just like a real-world forest.

Conclusion

This article contains a fine collection of windows server interview questions and
answers. You can get help from these server administrator interview questions
provided in this article to prepare for your interview.

You can also share with us some interview server questions and answers that you
have been asked by interviewer, in the comments section.

You might also like