You are on page 1of 35

Desktop Support Engineer

Interview Questions

To view the live version of the


page, click here.

© Copyright by Interviewbit
Contents

Desktop Support Interview Questions for Freshers


1. Who is a desktop support engineer?
2. Explain the roles and responsibilities of desktop support engineers.
3. Can you explain Active Directory?
4. What is DHCP?
5. Explain scope and superscope.
6. What is DNS (Domain Naming Service)?
7. Explain forward and reverse lookup in DNS.
8. What is an IAS Server?
9. State difference between DC (Domain controller) and ADC (Additional Domain
Controller).
10. Explain the default gateway.
11. What is BUS Speed?
12. Define FIXMBR command.
13. What is SID (Security Identifier)?
14. State difference between Desktop OS and Server OS.
15. Is it possible to convert a Hard Disk to Dynamic? If so, how?
16. Can a client be accessed from a different location other than the server?
17. State difference between Tree and Forest in Active Directory.
18. Explain safe mode.
19. How do you start a computer in safe mode?
20. Define Permissions, Policy, and Rights.

Page 1 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Desktop Support Interview Questions for


Freshers (.....Continued)

21. What is group policy?

Desktop Support Interview Questions for


Experienced
22. What is IPCONFIG? What is its purpose?
23. Can you explain about the NTLDR Error?
24. Is there a way to fix NTLDR error?
25. State difference between Incremental and Differential Backup.
26. State difference between an MSI and an EXE File.
27. What do you mean by BSOD (Blue Screen Of Death)?
28. Explain the term Reservation.
29. What is IMAP and SMTP?
30. State difference between SMTP and POP Server.
31. How will you backup your data if your system is infected with malware?
32. How do you back up your Microso Outlook emails?
33. Do you know about the "Windows Cannot Currently Connect For Updates"
error?
34. What do you know about Firewire ports?
35. Explain PST andcOST File.
36. How can OST mailboxes be exported or converted to PST files?
37. What can you do to fix a system that keeps restarting itself?
38. What is the process of adding a system to a domain?

Page 2 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Desktop Support Interview Questions for


Experienced (.....Continued)

39. State difference between RAS and VPN Server.


40. What do you mean by child and tree domain?

Frequently Asked Questions


41. Tell me about yourself?
42. Why did you choose a career in desktop support?
43. What is desktop support engineer salary in India and U.S.?
44. Why are you interested in our company?
45. What is the next level a er desktop support engineer?

Page 3 © Copyright by Interviewbit


Let's get Started
Since the modern world is a technologically driven place, it makes it practically
impossible for people to perform their jobs without the use of a computer, so in the
event that an employee encounters a problem with their computer, a Desktop
Support Engineer may be able to assist them.
A Desktop Support Engineer is responsible for offering technical assistance and
troubleshooting help to clients and users regarding their computer hardware and
so ware. Most of the time, they assist in getting the IT equipment up and running so
that everything runs as smoothly as possible. Also, Desktop Support Engineers are
required to assist with the initial setup, installation, and maintenance of computers
and other IT components as well.
IT/Desktop support is a career full of opportunities, may offer you a way to break into
almost any tech-oriented industry, and is an excellent way to learn great technical
skills from the best in the industry. If you enjoy working with computers, networking
devices and people, then a career in IT support may be the right choice for you.
As an applicant for this field, you should be able to demonstrate that you are
proficient at problem-solving and enjoy interacting with others. Having said that, you
should be ready with answers to the most frequently asked questions during the
Desktop Support Interview.

Page 4 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

In this article, we will discuss what is Desktop Support Engineer (Roles and
Responsibilities) is as well as the most common Desktop Support interview questions
and answers that have been grouped based on their difficulty level, both for freshers
and for experienced candidates. Practice these questions on a regular basis to
increase the likelihood of getting acquitted of the interview.
Listed below are some of the most common interview questions asked during
Desktop Support interviews.

Desktop Support Interview Questions for Freshers


1. Who is a desktop support engineer?
Desktop support engineers are typically IT experts who resolve issues related to
Information Technology (IT) within an organization or for individuals. Also, they are
able to aid with the setting up and maintenance of laptops and the resolution of
security and server issues that affect businesses. It is their job to assist companies or
individuals in installing, patching, upgrading, and troubleshooting so ware and
fixing any security issues with these machines, and even assisting with issues related
to servers or racks.

Page 5 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

2. Explain the roles and responsibilities of desktop support


engineers.
Here is a list of some of the Desktop Support Engineer Roles and Responsibilities:

Troubleshoot your system to fix any problems you may encounter.


Install, upgrade, and maintain so ware and equipment.
Ask questions to determine the cause of the problem.
Provide remote troubleshooting services.
Assist new employees in setting up their workstations.
Train new employees on the company's so ware and apps.
Identify and evaluate new technologies with existing vendors.
Provide timely responses to ad hoc and urgent requests.
Provide technical advice to an organization's executives.
Monitor and optimize the performance of an organization's desktop
infrastructure.
Analyze connection issues.

3. Can you explain Active Directory?

Page 6 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Active Directory (AD) is a directory service that allows users to connect with the
network resources they need to complete their tasks. Essentially, the database (or
directory) is a place where you store information about your environment, such as
what users and computers you have and who is allowed to do what. The Active
Directory service allows administrators to control users' access to network resources
and manage permissions. The data in Active Directory is stored as objects, such as
users, groups, applications, and devices. These objects are classified according to
their names and attributes.

4. What is DHCP?
DHCP or Dynamic Host Configuration Protocol: As a network management protocol
or application layer protocol, it is used to automatically assign an IP (Internet
Protocol) host with its IP address, as well as related configuration details such as
Subnet mask, DNS address, Default gateway, Router address, and Vendor class
identifier.

5. Explain scope and superscope.


IP addresses such as the subnet mask, gateway IP, and DNS server IP are all included
in the scope. It can be used as a means of communication with the other computers
in the network. A superscope is formed by combining two or more scopes.

6. What is DNS (Domain Naming Service)?


Essentially, DNS (Domain Name System) is what acts as the phone book of the
Internet. Domain names such as scaler.com and interviewbit.com are used by
humans to access information online. A web browser interacts with the Internet
using IP addresses. DNS transforms domain names into IP addresses for browsers to
access Internet resources.
Every connected device to the internet has an IP address that can be used by other
machines to find that device. With DNS servers, humans no longer need to memorize
IP addresses like 172.158.1.16 (in IPv4), or complex addresses like
2550:ab00:2628:1::c629:d5a6 (in IPv6).

7. Explain forward and reverse lookup in DNS.

Page 7 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Once you install the DNS (Domain Name System) Server role in a Windows
environment, you'll have the ability to create new forward and reverse lookup zones.
Each zone serves a different purpose.
Forward lookup zone: This zone maps hostnames to IP addresses. Whenever a
computer requests an IP address by providing the hostname, the forward look-
up zone is queried to obtain the IP address for that hostname. For example, if
you type www.scaler.com into the address bar of your browser, the forward zone
is queried and it will return the IP address 137.336.245.17, which is actually the IP
address of the site you are looking at.
Reverse lookup zone: This zone maps an IP address to the hostname. Whenever
a computer requests a hostname (domain name) by using an IP address, the
reverse zone is queried to obtain the hostname for that IP address. For example,
if you request the hostname for an IP address 137.336.245.17, the reverse zone is
queried and will return the hostname www.scaler.com.

8. What is an IAS Server?


Internet Authentication Service (IAS) is a network server owned by Microso that
authenticates users. It offers authorization and authentication services to remote
users connecting to corporate networks. The IAS is a side server that is not directly
connected to any traffic, and instead, communicates only with the RAS (Remote
Access Service) server. When a client computer requests to connect to a network, the
RAS must validate its credentials, and since credentials are stored on the IAS server,
the RAS contacts the IAS server with the user name of the applicant to obtain
authentication details.

9. State difference between DC (Domain controller) and ADC


(Additional Domain Controller).

Page 8 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

DC (Domain controller): A DC is a server in a Windows Server domain that


handles authentication requests like usernames and passwords. This is
responsible for granting hosts access to Windows domain resources. This first DC
is a Global Catalog (GC) that handles all five FSMO responsibilities: PDC
Emulator, RID Master, Infrastructure Master, Schema Master, and Domain Name
Master.
ADC (Additional Domain Controller): An ADC is a backup for a domain
controller. In ADC, there are only three operational roles, namely PDC Emulator,
RID Master, and Infrastructure Master.

10. Explain the default gateway.


Default Gateways are nodes (physically connected devices) that allow devices from
one network to communicate with devices from another network. Any host trying to
reach a destination outside its own network must use a default gateway. The default
gateway is simply one that is used by default unless there is no other gateway
specified.

11. What is BUS Speed?


A bus is a simple circuit that is used to connect one part of the motherboard to
another by means of an electrical path. When a bus can handle more data at once, it
will transfer data more quickly between computer components. "Bus speed" refers
to the rate at which data can be transferred from one computer component to
another. The speed of the bus can be expressed in megahertz (MHz), which indicates
how much data can be transported across the bus at one time.

12. Define FIXMBR command.


The fixmbr command is essentially a Recovery Console command you can use to
write a new master boot record on the computer hard disk drive that is specified in
the command. Only Windows 2000 and Windows XP provide access to this command.
Syntax: fixmbr device_name

Device_name specifies the drive location to which a master boot record will be
written. By default, the master boot record is written to the primary boot drive if no
device is specified.

Page 9 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

13. What is SID (Security Identifier)?


Security Identifiers (SIDs) are the unique identification numbers that are used by
computers or domain controllers to uniquely identify you. Its purpose is to uniquely
identify a user, a group of users, or another security principal by using a string of
alphanumeric characters. SID is assigned to the security principal for the lifetime of
the principal (within a given domain) and all the principal's properties, including its
name, are associated with that SID. It is designed in such a way that a principal may
be renamed (for example, from "Make Smith" to "Make Jones") without affecting the
security attributes of objects associated with that principal.

14. State difference between Desktop OS and Server OS.


Differences between Server OS and Desktop OS are as follows:

Page 10 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Desktop (Client) OS Server OS

It is a type of operating
system that runs on desktop
computers as well as some A server OS is one that runs on
other portable devices, such a server.
as laptops and mobile
phones.

In fact, it may handle It is an enhanced version of an


several hardware operating system that
components, including provides additional features
printers, monitors, cameras, and capabilities to multiple
and other components, that connected devices or client
are connected to it. machines.

It serves just one user at a Multiple clients can be served


time. simultaneously.

It is an operating system for The operating system is


desktop computers. designed for use on servers.

It has a higher processing


Less security is provided. power, is more stable, and is
highly efficient.

It is less stable, less efficient,


Providing greater security.
and less powerful.

Examples: Android, Examples: Linux, Red Hat,


Windows, etc. etc.

Page 11 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

15. Is it possible to convert a Hard Disk to Dynamic? If so, how?


Yes, Hard disks can be converted to Dynamic Disks. Here are the steps:
Firstly, log in to your administrator account and open the Run window.
Enter the diskmgmt.msc command and click Enter to complete.
A new screen will appear. Right-click on the Basic hard disk option and select
Convert to Dynamic Disk.

16. Can a client be accessed from a different location other than


the server?
MSTSC command (Remote Desktop Command) is available to enable access to a
client from a different location than the server. Basically, it enables you to get access
to another person's computer as if you were next to it. To do this, you have to know
the IP address of the remote computer or you have to be connected to the same
network.
If you want to use this command, you simply need to launch a run window and then
type mstsc/v:COMPUTER/f. Here, V stands for the remote computer and f stands for
full screen. Click on next. You may also type mstsc and hit Enter to open the Remote
Desktop dialogue box. There, you can enter the name of the computer or IP address
to connect to.

17. State difference between Tree and Forest in Active


Directory.
The difference between Tree and Forest are as follows:

Page 12 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Page 13 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Tree Forest

A collection of domains which


Forests are collections of
are connected together in an
trees, or domain trees,
Active Directory hierarchy is
which provide the highest
referred to as a tree, a tree
level of security.
domain, or a domain tree.

The tree domain contains Furthermore, objects within


multiple domains that can the same forest are able to
communicate with each other communicate with one
by using trusts. another.

The two forests should have


They can communicate one
forest-level trust in order for
way or two ways.
objects in one forest to
Furthermore, a tree follows a
exchange information with
parent-child hierarchy.
objects in another forest.

18. Explain safe mode.


When you start your computer in safe mode, it will only run the essential programs
that are needed to run your computer. As soon as you turn on your computer, a
number of drivers are loaded, which are programs that enable your operating system
(OS) to communicate with so ware and devices. In contrast, when you boot your
computer in safe mode, only a minimal number of drivers (typically only the
keyboard, mouse, and display drivers) are loaded. In safe mode, your operating
system is loaded in a very basic state, allowing you to potentially determine what is
causing the issue.

19. How do you start a computer in safe mode?


Sol: The following are the two ways you can launch your computer in safe mode:

Page 14 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Method 1:
Restart the computer.
Tap the F8 key as soon as the system begins to boot. This will lead you to a
range of boot options, including Safe Mode.
Method 2:
Press Windows + R together to open the Run command window, and then
type "msconfig" into the box.
The system configuration window will appear. Select the Boot tab, check
the "Safe boot", and choose "Minimum" for a normal safe boot.
By clicking Apply, your computer will start in Safe Mode the next time it is
started.

20. Define Permissions, Policy, and Rights.


Permission: An administrator has the right to assign permissions to network
resources such as files, folders, printers, etc.
Policies: Policies are assigned to containers of Active Directory, such as
domains, sites, OU (Organizational Unit), etc. In general, policies are defined by
organizations and applied to their objects and resources.
Rights: Users and groups are given rights, and as an Administrator, you
determine which user has access to those resources. The user's rights tell you
how they are going to access the resources.

21. What is group policy?


Group Policy is primarily used for security purposes and can be used to configure
security settings for users and computers. Essentially, it provides administrators with
a central location for managing and configuring operating systems, applications, and
users' preferences. With it, you are able to control certain things like the user's ability
to shut down the system, run a command, or access the control panel. When used
correctly, group policies can be a great tool for increasing the security of user
computers and preventing both insider threats and external threats from exploiting
their computer systems.

Page 15 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Desktop Support Interview Questions for


Experienced
22. What is IPCONFIG? What is its purpose?
Internet Protocol Configuration (IPCONFIG) is a command-line utility that gathers and
displays information about current (TCP/IP) Transmission Control Protocol/Internet
Protocol configuration values on the screen. In other words, it allows you to view and
manage the IP address of the machine. Every time IPCONFIG is invoked, it will also
refresh the DHCP ( Dynamic Host Configuration Protocol) and DNS (Domain Name
System) settings. If the IPCONFIG command is executed without any parameters, it
only displays the default gateway, IP address, and subnet mask of every available
network adapter.
Here is the syntax: ipconfig /parameter_name

For instance, if you run "ipconfig /all", you can see the complete TCP/IP configuration
of all available network adapters.

23. Can you explain about the NTLDR Error?


NTLDR (New Technology Loader) serves as the boot loader for all versions of the
Windows NT operating system. In most cases, NTLDR runs from a primary hard drive
or from a portable device like a USB flash drive or CD-ROM. Also, the NT loader is
capable of loading non-NT-based operating systems with the appropriate boot sector
on a file. The NTLDR consists of three major files:
NTLDR file: It is the main boot loader.
NTDETECT file: This file is required to boot an NT-based OS. It detects basic
hardware information to ensure a successful boot.
boot.ini file: Contains information about the system configuration.
In the event that Windows NT OS continues to fail to boot, you may receive the
following NTLDR errors. Usually, the cause for NTLDR errors is the failure to boot from
a non-bootable device, a damaged or not detected hard drive, BIOS outdated, file
deletion or damage, or corrupted files.

Page 16 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

"NTLDR is missing
Press Ctrl+Alt+Del to restart.”

"NTLDR is missing
Press any key to restart.”

"Boot: Couldn't find NTLDR


Please insert another disk.”

Page 17 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

24. Is there a way to fix NTLDR error?


If you encounter the NTLDR missing error in your system, you may try either of the
following methods to resolve the problem:
Restart your computer: The NTLDR missing error might just be a fluke.
Plug out all removable media: Some accessories might be hindering the boot
process. Typically, this issue appears when the BIOS attempts to load from a
non-bootable external drive. Remove all external drives and removable media
(CDs, floppy disks, memory cards, and USBs) to ensure the BIOS cannot be
loaded from these devices.
Change the BIOS boot order: If removing the external drive isn't possible or
doesn't work, you can manually adjust the boot order in BIOS/UEFI to make sure
the computer boots from the internal hard drive.
Step 1: Restart the computer.
Step 2: Press and hold F10, F8, F2, or Del to enter BIOS.
Step 3: Click on the BOOT tab. Consider placing the bootable hard drive
with the NT Loader files, where you have installed Windows OS, at the top
of your priority list.
Step 4: Boot your computer again and check whether you still receive the
NTLDR is missing error.
Upgrade your outdated BIOS: You may occasionally encounter the NTLDR
missing issue if the basic input/output system (BIOS) on your computer is
outdated. Accordingly, it is imperative that you install the most recent version of
BIOS on your computer. It is best to contact the computer manufacturer to see
how to obtain and install the latest BIOS update.

25. State difference between Incremental and Differential


Backup.
Incremental and Differential backups are two different backup strategies with the
same purpose i.e., to optimize the backup space as well as the backup time.

Page 18 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Incremental Backup Differential Backup

An incremental backup
preserves all changes made
Different backup strategies
since the previous full or
backup only the files that
incremental backup. It does
have changed since the last
not copy previously backed
full backup.
up files, only newly altered or
created ones.

In this type of backup, Recovery is easier with


recovery is difficult. differential backups.

It reduces bandwidth This type of backup uses less


utilization, reduces storage storage space than full
space requirements, and backups, but more than
provides faster backups. incremental backups.

Example: Consider doing a


Example: Consider doing a
full backup on Sunday.
full backup on Sunday.
Sunday: A full backup of
Sunday: A full backup of
the data.
the data.
Monday: This backs up
Monday: On Monday,
Monday's data.
incremental backup
Tuesday: The backup
copies just Monday's
includes Monday's and
changes without
Tuesday's data.
copying Sunday's
Wednesday: The
backup.
backup comprises
Tuesday: On Tuesday,
Monday's, Tuesday's,
the backup only retains
and Wednesday's data,
the changes/additions
and so on. Next
made on Tuesday. This
Monday's full backup
is also true for
will be referenced in
Wednesday, Thursday,
next week's differential
and Friday.
backup.

Page 19 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

26. State difference between an MSI and an EXE File.

MSI File: The .msi extension is used for MSI files, which are compressed
packages of installer files. It contains information regarding how to add, modify,
store, or remove the respective so ware. In the MSI file, you will find
instructions, data, processes, and add-ons that are essential to running the
application normally. The reason that developers prefer MSI over EXE when
creating an installer for their application is that MSI is easier to create. On top of
that, they also reduce the time and coding efforts involved in the process.
EXE File: In general, .exe extensions are only used for executable files that
contain lines of instructions or code that can directly be run by the window's
operating system. When opening the executable files received via email, users
should be aware that the files run some type of code once opened. Exe files are
executable programs.

27. What do you mean by BSOD (Blue Screen Of Death)?

Page 20 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Blue screen of death (BSOD), also referred to as blue screen error or stop error, is an
error screen displayed by the Windows operating system in the event that a fatal
error is encountered. It typically occurs because of a critical condition affecting the
operating system, e.g., hardware failure, or unexpected termination of a critical
process. A BSOD causes Windows to enter a state of frozen mode, requiring the
system to be restarted in order to continue operating.

28. Explain the term Reservation.


A DHCP (Dynamic Host Configuration Protocol) reservation is a permanent
assignment of an IP address. Essentially, it is a specific IP address, within the scope of
a DHCP server, which is being permanently reserved for lease used by a particular
DHCP client. In cases where network equipment or computer systems require a
specific IP address, we will create a reservation for that computer system in the DHCP
server. DHCP reservations can be configured in the DHCP server when users need a
permanent IP address. The reservation includes the following elements:

Page 21 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Reservation Name
IP Address
MAC Address
Description
Supported Types

29. What is IMAP and SMTP?


SMTP: SMTP (Simple Mail Transfer Protocol) is the industry-standard protocol
for email transmission. SMTP is a protocol used to send, relay, or forward email
messages from a mail client to a receiving mail server. An SMTP server is used for
the process of sending an email message.
IMAP: IMAP (Internet Access Message Protocol) is an email protocol for
managing and retrieving messages from receiving servers. The IMAP protocol is
designed for message retrieval, so it cannot be used for sending emails.

30. State difference between SMTP and POP Server.


SMTP and POP are the two protocols that control email transmission on the Internet
(both send and receive).

Page 22 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

SMTP: SMTP (Simple Mail Transfer Protocol) is a protocol that allows email to be
sent from a client to a receiver server in a very simple and fast manner.
POP: By contrast, POP ("Post Office Protocol") is a protocol that allows the user
(receiver) to download the message into his own inbox: it is actually the
incoming server that collects the message. Today, POP3 is the most recent
version.

31. How will you backup your data if your system is infected
with malware?
If you would like to successfully and safely recover data from an infected computer,
you would need to extract the hard drive from the PC. It needs to be saved to a
computer that has the latest virus definitions and Microso patches installed.
A erwards, you'd check the disc for viruses, and a er they were removed, you'd be
able to extract any data you needed.

32. How do you back up your Microso Outlook emails?


Following are the steps for making a backup in Microso Outlook:
Go to the control panel and select the mail option.
Click on the data file, then select the personal folder from the drop-down list,
and click on Open.
You must then copy the .pst file and paste it into the location where you would
like the backup to be stored.

33. Do you know about the "Windows Cannot Currently Connect


For Updates" error?
The error message "Windows Cannot Connect For Updates" is mainly caused by one
of the two reasons listed below:
Either the files are corrupt, missing, or have been deleted.
If update services have been disabled.
The following two methods can be followed to resolve this problem:

Page 23 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Method 1: To troubleshoot this issue by yourself, follow these steps:


Initially, launch the Run command and type services.msc. Click the Enter
key. A new window will open.
Look for the option to update Windows. Then right click it and select
properties.
Once the startup page has opened, type 'enable' in the box and click on the
Start button. Now click OK, and the problem will be resolved.
Method 2: The easiest way to fix this error is by contacting Microso and
reporting the problem.

34. What do you know about Firewire ports?


The IEEE 1394 port, more commonly referred to as FireWire, facilitates high-speed
communication between two computers or between a computer and peripheral
devices (such as keyboards, digital video cameras, printers, scanners, and external
hard drives). The terms FireWire refers to the types of ports, cables, and connectors
that enable computers to connect to external devices.

35. Explain PST andcOST File.


There are two types of Outlook data files - Personal Storage Tables (PST) and Offline
Storage Tables (OST), both of which store synchronized copies (either in a local drive
or for offline utilization) of mailbox items - email messages, contacts, attachments,
notes, etc.

Page 24 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

PST OST

In MS Outlook, OST (Offline


PST (Personal Storage Table) is
Storage Table) is basically
an exclusive MS Outlook file
your offline data files.
format used to store backups
Offline Storage Files
of calendars, contacts,
include the dra s of a
messages, etc., on the user's
user's mailbox data, for
computer from the account
offline use on a local
configured in Outlook.
system.

Provides access to mailbox


It is not possible to access items even if the system is
mailbox items offline. offline or network issues
are present.

The PST file format is


compatible with many email Support for all Exchange
servers, including Exchange server versions is available.
Server.

Syncing of data occurs


automatically when a
Auto-sync is not possible.
network connection is
available.

If users want to work with a


It is typically used by users who
domain where the internet
want to have a backup of their
connection is low or poor,
Outlook components.
then it comes in handy.

Page 25 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

36. How can OST mailboxes be exported or converted to PST


files?
Manually convert OST to PST
The below steps will guide you through this method:
Open the File menu in Outlook, then choose Open & Export.
Click the Import/Export option.
Scroll down to Export to a file, then tap Next.
Click on .pst (Outlook Data File) and tap Next.
Select the folder that you wish to export and click on Next.
Lastly, select the export location and click Finish.
Archive Method
The below steps will guide you through this method:
Start by logging into your Outlook account.
Go to the File menu.
From the list, select Archive.
Click on the file you wish to archive.
Choose the location for your new archive file.
Lastly, click Finish.

37. What can you do to fix a system that keeps restarting itself?
In most cases, your computer restarts in a loop because it has been affected by a
hardware failure, a corrupt driver, malware infection, or due to dust and dirt. Here
are some ways to troubleshoot and fix the computer restarting issue.

Page 26 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Turn Off the automatic restart feature: It is very annoying to see your


computer continuously rebooting and there is nothing you can do about it other
than turn off the Automatically restart feature.
Check the hardware issue: A faulty hardware component can cause a computer
to malfunction. Therefore, you should verify that your hardware is in proper
working order.
Check the RAM: RAM is o en the cause if your computer restarts. Check out
your RAM, or the slot in which it is inserted.
Check the CPU: Processor overheating is another issue that may result in
the system restarting, so you should make sure that your CPU is functioning
correctly.
Check your external devices: Unplug all external devices connected to
your computer and check if the issue is resolved.
Keeping your computer clean: A buildup of dust within your computer can
cause overheating and damage to its components, resulting in frequent
restarting.
Update your drivers: Drivers that are outdated or missing may cause the
computer to restart because the devices are not able to communicate with your
computer. Thus, you need to check and verify that all your drivers are up-to-
date, and update those that aren't. Driver updates can be done manually or
automatically.
Scan for viruses: Malware or virus infection is likely to result in your computer
continually restarting. To prevent this, you should perform a full virus scan on
your computer.

38. What is the process of adding a system to a domain?


Follow the steps below to join a computer to a domain:

Page 27 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Open the Start screen, then type Control Panel into the search box, and press
Enter to open it.
Go to System and Security, and click System.
Scroll down to Computer name, domain, and workgroup settings, and then
click on Change settings.
From the Computer name tab, select Change.
Click on Domain under Members of, type the domain name you wish the
computer to join, and click OK.
Finally, Click OK and restart the computer.

39. State difference between RAS and VPN Server.


The difference between RAS and VPN server is as follows:

Page 28 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

RAS VPN

RAS (Remote Access Services) A virtual private network


can be defined as any (VPN) is a network that is
combination of hardware and used to create a private,
so ware components secure connection that
compatible with IT devices that enables you to
allow remote access to tools communicate over a
and information stored on these public network in a
devices. confidential way.

Basically, it is the industry- It was specially designed


standard method of setting up for medium and large-
remote connections. sized networks.

Data is not authenticated or Data is authenticated or


encrypted when transferred encrypted when
over RAS. transferred over a VPN.

It is extremely cost-
The price of it is quite high.
effective.

The system is stable and


It is a very unstable system.
secure.

It isn't a fun experience dealing It is hassle-free and


with the system. straightforward.

40. What do you mean by child and tree domain?

Page 29 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

Tree Domain: A collection of domains which are connected together in an Active


Directory hierarchy is referred to as a tree, a tree domain, or a domain tree. The
tree domain contains multiple domains that can communicate with each other
by using trusts. They can communicate one way or two ways.
Child Domain: A domain tree is formed on the basis of the parent-child
hierarchy. Child domains are basically a logical grouping of network objects
(domains) beneath a parent domain in an Active Directory hierarchy.

Useful Resources

Technical Support Interview Questions


Application Support Interview Questions
Linux Interview Questions
Operating System Interview Questions
Networking Interview Questions
Interview Preparation Articles
Technical Interview Guide

Frequently Asked Questions


41. Tell me about yourself?
Every industry and profession gives you ample opportunity to speak about yourself.
In asking this question, hiring managers want to learn several things about you and
give you a chance to highlight your relevant qualifications and experience for the
position.
Outline your current job duties and key traits making you a good fit for the
position.
Describe how your skill in desktop support helped you resolve a problem in real-
life.
Consider what the hiring manager expects from the ideal candidate and respond
accordingly. Also, refrain from disparaging your former job or boss.
Sample Answer:

Page 30 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

“Working for a Fintech company, I troubleshoot network issues and connect


computers to the internet and the company intranet. I completed my bachelor's
degree in Information Technology and I am a Microso Certified Network Engineer.
Additionally, I have Cisco and Oracle certifications. Working knowledge of computer
hardware systems, memory modules, chipsets, and peripheral components. Because
of my technical expertise, I have held positions in the desktop support field at a bank,
a 5-star hotel, and an insurance company, where I helped to keep computers and IT
systems functioning in a safe environment. Experience installing and upgrading
operating systems and computer so ware, as well as repairing, maintaining, and
replacing hardware and computer peripherals.
It is essential for someone not only to have technical skills but also to have
interpersonal skills. Stay up late at night to ensure that employees can resume
working without experiencing computer malfunctions the next morning. One of my
goals is to keep the organization on track."

42. Why did you choose a career in desktop support?


This question provides insight into what motivates you as a candidate. Recruiters
want to know if you are motivated by the attractive compensation plan or if you want
to help solve problems.
Show your knowledge of the industry and your potential value if hired.
Aside from money, talk about other aspects of the role that make you
passionate. What drives you? Is it a passion for troubleshooting computers or a
deep understanding of programming and its applications?
Make sure that you understand how vital desktop support is to the smooth
operation of the entire office since most departments are reliant on IT support.
Sample Answer:

Page 31 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

“Choosing a career as a technical support specialist has enabled me to pursue my


passion for computers and solve the problems of others. Although technical
knowledge is o en taken for granted, it can make or break clients' businesses and
operations. It provides an easier way to get into almost any tech industry while also
improving your technical skills. Taking on a position as a desktop support technician
will allow me to make customers' lives and businesses easier while continuing to do
what I enjoy doing."

43. What is desktop support engineer salary in India and U.S.?


In India, a Desktop Support Engineer's salary ranges from Rs 1.3 Lakhs to Rs 3.5 Lakhs
per annum, with an average annual salary of Rs 2.2 Lakhs. In the United States, a
computer engineer earns an average salary of $52,133 per year.

44. Why are you interested in our company?


Your response to this question demonstrates your commitment to that specific
employer and will provide insight into whether you have researched the company
beforehand. Don't miss the opportunity to demonstrate your genuine passion for the
organization.
Demonstrate to the recruiter that you understand the company's mission and
vision and desire to contribute to its success.
You might mention how you like the company culture or employee
development programs.
Perhaps you could also mention whether the organization has a public service or
environmental initiative that resonates with you.
Sample Answer:
“Considering that your products contribute to lessening the carbon footprint and
making food production more environmentally friendly, this is why I applied to your
company. The work you do, especially in developing countries, makes a positive
impact on millions of lives around the world. It will enrich my career and my personal
life as well. Having an interest in network systems, computer systems, and interacting
with people, I believe working for your organization would be an excellent stepping
stone into a career as a desktop engineer”.

Page 32 © Copyright by Interviewbit


Desktop Support Engineer Interview Questions

45. What is the next level a er desktop support engineer?


Since you are a Desktop Engineer, you can grow your career further by gaining
experience in server administration. This can comprise Windows/Unix administration
or even Cisco networking that can provide a lot of opportunities for you. A desktop
support specialist may choose to pursue a computer-related position such as
database administrator, network administrator, computer network architect,
SharePoint administrator, and technology director.

Page 33 © Copyright by Interviewbit


Links to More Interview
Questions

C Interview Questions Php Interview Questions C Sharp Interview Questions

Web Api Interview Hibernate Interview Node Js Interview Questions


Questions Questions

Cpp Interview Questions Oops Interview Questions Devops Interview Questions

Machine Learning Interview Docker Interview Questions Mysql Interview Questions


Questions

Css Interview Questions Laravel Interview Questions Asp Net Interview Questions

Django Interview Questions Dot Net Interview Questions Kubernetes Interview


Questions

Operating System Interview React Native Interview Aws Interview Questions


Questions Questions

Git Interview Questions Java 8 Interview Questions Mongodb Interview


Questions

Dbms Interview Questions Spring Boot Interview Power Bi Interview Questions


Questions

Pl Sql Interview Questions Tableau Interview Linux Interview Questions


Questions

Ansible Interview Questions Java Interview Questions Jenkins Interview Questions

Page 34 © Copyright by Interviewbit

You might also like