Professional Documents
Culture Documents
Interview Questions
© Copyright by Interviewbit
Contents
In this article, we will discuss what is Desktop Support Engineer (Roles and
Responsibilities) is as well as the most common Desktop Support interview questions
and answers that have been grouped based on their difficulty level, both for freshers
and for experienced candidates. Practice these questions on a regular basis to
increase the likelihood of getting acquitted of the interview.
Listed below are some of the most common interview questions asked during
Desktop Support interviews.
Active Directory (AD) is a directory service that allows users to connect with the
network resources they need to complete their tasks. Essentially, the database (or
directory) is a place where you store information about your environment, such as
what users and computers you have and who is allowed to do what. The Active
Directory service allows administrators to control users' access to network resources
and manage permissions. The data in Active Directory is stored as objects, such as
users, groups, applications, and devices. These objects are classified according to
their names and attributes.
4. What is DHCP?
DHCP or Dynamic Host Configuration Protocol: As a network management protocol
or application layer protocol, it is used to automatically assign an IP (Internet
Protocol) host with its IP address, as well as related configuration details such as
Subnet mask, DNS address, Default gateway, Router address, and Vendor class
identifier.
Once you install the DNS (Domain Name System) Server role in a Windows
environment, you'll have the ability to create new forward and reverse lookup zones.
Each zone serves a different purpose.
Forward lookup zone: This zone maps hostnames to IP addresses. Whenever a
computer requests an IP address by providing the hostname, the forward look-
up zone is queried to obtain the IP address for that hostname. For example, if
you type www.scaler.com into the address bar of your browser, the forward zone
is queried and it will return the IP address 137.336.245.17, which is actually the IP
address of the site you are looking at.
Reverse lookup zone: This zone maps an IP address to the hostname. Whenever
a computer requests a hostname (domain name) by using an IP address, the
reverse zone is queried to obtain the hostname for that IP address. For example,
if you request the hostname for an IP address 137.336.245.17, the reverse zone is
queried and will return the hostname www.scaler.com.
Device_name specifies the drive location to which a master boot record will be
written. By default, the master boot record is written to the primary boot drive if no
device is specified.
It is a type of operating
system that runs on desktop
computers as well as some A server OS is one that runs on
other portable devices, such a server.
as laptops and mobile
phones.
Tree Forest
Method 1:
Restart the computer.
Tap the F8 key as soon as the system begins to boot. This will lead you to a
range of boot options, including Safe Mode.
Method 2:
Press Windows + R together to open the Run command window, and then
type "msconfig" into the box.
The system configuration window will appear. Select the Boot tab, check
the "Safe boot", and choose "Minimum" for a normal safe boot.
By clicking Apply, your computer will start in Safe Mode the next time it is
started.
For instance, if you run "ipconfig /all", you can see the complete TCP/IP configuration
of all available network adapters.
"NTLDR is missing
Press Ctrl+Alt+Del to restart.”
"NTLDR is missing
Press any key to restart.”
An incremental backup
preserves all changes made
Different backup strategies
since the previous full or
backup only the files that
incremental backup. It does
have changed since the last
not copy previously backed
full backup.
up files, only newly altered or
created ones.
MSI File: The .msi extension is used for MSI files, which are compressed
packages of installer files. It contains information regarding how to add, modify,
store, or remove the respective so ware. In the MSI file, you will find
instructions, data, processes, and add-ons that are essential to running the
application normally. The reason that developers prefer MSI over EXE when
creating an installer for their application is that MSI is easier to create. On top of
that, they also reduce the time and coding efforts involved in the process.
EXE File: In general, .exe extensions are only used for executable files that
contain lines of instructions or code that can directly be run by the window's
operating system. When opening the executable files received via email, users
should be aware that the files run some type of code once opened. Exe files are
executable programs.
Blue screen of death (BSOD), also referred to as blue screen error or stop error, is an
error screen displayed by the Windows operating system in the event that a fatal
error is encountered. It typically occurs because of a critical condition affecting the
operating system, e.g., hardware failure, or unexpected termination of a critical
process. A BSOD causes Windows to enter a state of frozen mode, requiring the
system to be restarted in order to continue operating.
Reservation Name
IP Address
MAC Address
Description
Supported Types
SMTP: SMTP (Simple Mail Transfer Protocol) is a protocol that allows email to be
sent from a client to a receiver server in a very simple and fast manner.
POP: By contrast, POP ("Post Office Protocol") is a protocol that allows the user
(receiver) to download the message into his own inbox: it is actually the
incoming server that collects the message. Today, POP3 is the most recent
version.
31. How will you backup your data if your system is infected
with malware?
If you would like to successfully and safely recover data from an infected computer,
you would need to extract the hard drive from the PC. It needs to be saved to a
computer that has the latest virus definitions and Microso patches installed.
A erwards, you'd check the disc for viruses, and a er they were removed, you'd be
able to extract any data you needed.
PST OST
37. What can you do to fix a system that keeps restarting itself?
In most cases, your computer restarts in a loop because it has been affected by a
hardware failure, a corrupt driver, malware infection, or due to dust and dirt. Here
are some ways to troubleshoot and fix the computer restarting issue.
Open the Start screen, then type Control Panel into the search box, and press
Enter to open it.
Go to System and Security, and click System.
Scroll down to Computer name, domain, and workgroup settings, and then
click on Change settings.
From the Computer name tab, select Change.
Click on Domain under Members of, type the domain name you wish the
computer to join, and click OK.
Finally, Click OK and restart the computer.
RAS VPN
It is extremely cost-
The price of it is quite high.
effective.
Useful Resources
Css Interview Questions Laravel Interview Questions Asp Net Interview Questions