TECHNICAL SUPPORT ENGINEER INTERVIEW QUESTIONS AND ANSWERS PDF
Top 25 Technical Support Interview Questions & Answers It has a limitation on the size of the data, also most microprocessor does not support floating point operations. 13) What do you mean Download PDF · Facebook. Top 50 Desktop Support Interview Questions & Answers. last updated March Desktop Support. 6) What is 'A' . Download PDF · Facebook. This set of Technical Support Engineer interview questions can help you identify candidates with Technical Support Engineers handle customers' issues when your first-level (non-technical) support cannot find a solution. Pdf Document.
|Language:||English, Spanish, French|
|Genre:||Academic & Education|
|ePub File Size:||16.59 MB|
|PDF File Size:||11.52 MB|
|Distribution:||Free* [*Regsitration Required]|
+ Technical Support Interview Questions and Answers, Question1: What is a technical support engineer by looking into the technical support job interview. Desktop & Technical Support Interview Questions and Answers - Free download as Word Doc .doc), PDF File .pdf), Text File .txt) or read online for free. ( Microsoft Certified Systems Engineer). In 2 domain controllers, One has some 3 roles. Whether you are preparing to interview a candidate or applying for a job, review our list of top Technical Support interview questions and answers.
A web server can be referred to as either the hardware the computer or the software the computer application that helps to deliver content that can be accessed through the Internet.
A web server is what makes it possible to be able to access content like web pages or other data from anywhere as long as it is connected to the internet. Application server is a program that handles all application operations between users and an organization's backend business applications or databases. An application server is typically used for complex transaction-based applications.
A database server is a computer program that provides database services to other computer programs or computers, as defined by the client—server model.
In case DHCP fails in your server then how do you satisfy that problem within some minutes? What is the Protocol? The main difference is that BOOTP was designed for manual pre-configuration of the host information in a server database, while DHCP allows for dynamic allocation of network addresses and configurations to newly attached hosts. How to rename domain name in win server?
To rename a domain controller Open Command Prompt. NewComputerName Restart the computer. From the command prompt, type: To rename a domain controller in a domain that contains a single domain controller Install a Windows Server member server in the domain.
On the new server, create an additional domain controller by installing Active Directory.
After Active Directory is installed, enable the global catalog on the new domain controller. Transfer the operations master roles from the domain controller that you want to rename to the new domain controller. Note that you must transfer the roles, do not seize them.
Verify that the new domain controller is functioning correctly by doing the following: Verify authentications and global catalog searches. Run Dcdiag. Perform any other appropriate tests to verify that the new domain controller can provide all of the domain functions of the first domain controller. On the new domain controller, open Command Prompt. Net share In the list that is generated, verify the existence of Sysvol and Netlogon.
Uninstall Active Directory from the domain controller that you want to rename to be a member server. Rename the member server. Install Active Directory on the renamed server to create an additional domain controller. Transfer the operations master roles back to the renamed domain controller. Enable the global catalog on the renamed domain controller.
What is Wi-Fi? What is the latest version? The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. What is mean topology and types of topology? Network topology refers to the way that your computer network is arranged.
The network can have a physical or a logical topology. The physical topology describes the layout of computers and where the workstations are positioned. The logical network topology describes how the information flows through the network. The different kinds of topology are: The word "bus" refers to the physical line that joins all the machines on the network.
The advantages of this topology are that it is easy to implement and functions easily; on the other hand, it is highly vulnerable, since if one of the connections is defective, the whole network is affected. Star topology In star topology, the network computers are linked to a piece of hardware called a hub.
Unlike networks built with bus topology, networks which use star topology are much less vulnerable, as one of the connections can easily be removed by disconnecting it from the hub, without paralyzing the rest of the network.
However, a star topology network is bulkier than a bus network, as additional hardware is required the hub. Ring topology A ring topology is a network topology where each node device on the network connects to two other nodes. This forms a continuous path for the signal through each device.
This works because data travels from node to node device to device. In a ring topology also called a ring network , each node handles the data packets itself, then passes it to the next node, which also handles the packets.
Mesh topology A mesh topology is made up of a network where each device has a point-to-point connection to every other device on the network. This provides the dedicated capacity of a point-to-point link to each device and significant fault tolerance. The tree like structure allows you to have many servers on the network and you can branch out the network in many ways.
This is particularly helpful for colleges, universities and schools so that each of the branches can identify the relevant systems in their own network and yet connect to the big network in some way. What is a wild card certificate? A wildcard certificate allows you to secure multiple web sites with a single SSL certificate. Wildcard certificates are a service provided under Certificate Management Service. How many scopes con create in one dhcp?
You can configure as many scopes on a DHCP server as is required in your network environment. What is VPN and what are the main advantages? A virtual private network VPN is the extension of a private network that encompasses links across shared or public networks like the Internet. With a VPN, you can send data between two computers or two networks across a shared or public network in a manner that emulates a point-to-point private link.
Virtual private networking is the act of creating and configuring a VPN. What is dhcp? DHCP includes the following features to reduce network administration: What is secured socket layer and what is the requirement of its in networking?
SSL Secure Sockets Layer is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
Http is hyper text transfer protocol which is responsible for transmitting and receiving information across the Internet where as https is secure http, which is used exchanging confidential information with a server, which needs to be secured in order to prevent unauthorized access. HTTPS is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server.
What is Peer to peer Network? Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data. Peer-to-peer networking also known simply as peer networking differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers.
What is the difference between a Virtual Server and a Dedicated Server? A dedicated server is a type of Internet hosting in which the client leases an entire server not shared with anyone.
This is more flexible than shared hosting, as organizations have full control over the server s , including choice of operating system, hardware, etc. A dedicated server could also be a computer that manages printer resources. However, that not all servers are dedicated. In some networks, it is possible for a computer to act as a server and perform other functions as well. In the Web hosting business, a dedicated server is typically a rented service.
The user rents the server, software and an Internet connection from the Web host. A server, usually a Web server, that shares computer resources with other virtual servers. Virtual Web servers are a very popular way of providing low-cost web hosting services. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. In most cases, performance is not affected and each web site behaves as if it is being served by a dedicated server.
If too many virtual servers reside on the same computer, or if one virtual server starts hogging resources, Web pages will be delivered more slowly.
What is Antivirus? Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. What are Cold Boot and Warm Boot? A hard reboot also known as a cold reboot, cold boot or cold start is when power to a computer is abruptly turned off, then turned back on.
A soft reboot also known as a warm reboot is restarting a computer under software control, without removing power or directly triggering a reset line. What is the type of dsl technologies? According to the FCC, the different types of DSL technologies provide transmission speeds ranging from several hundred thousand bits per second to millions of bits per second.
All types of DSL Internet service can be categorized as either asymmetric or symmetric. Asymmetric means that most of the bandwidth is for sending data to the user downloading and only a small amount is available for uploading data. ADSL requires a splitter at the user's end to split the Internet data signal from the telephone signal.
DSL Lite also known as G. Lite is a slower version of ADSL that doesn't require a splitter at the user's end because the splitting happens remotely at the telephone company.
Larger businesses often use SDSL.
SHDSL, which is faster and can optimize performance based on telephone line conditions. IDSL runs over a single pair of wires. How to take backup of Outlook Express explain all the steps in detail. To back up Outlook Express items Step 1: Copy message files to a backup folder Step A: Locate the Store folder 1. Start Outlook Express. Click Tools, and then click Options.
On the Maintenance tab, click Store Folder. In the Store Location dialog box, copy the store location. To do this, follow these steps: Put the mouse pointer at one end of the box under the Your personal message store is located in the following folder box. Press and hold the left mouse button, and then drag the mouse pointer across the Your personal message store is located in the following folder box.
Click Cancel, and then click Cancel again to close the dialog box. Step B: Copy the contents of the Store folder 1. On the Edit menu, click Select All.
On the Edit menu, click Copy, and then close the window. Step C: Create a backup folder 1. Right-click any empty area on your desktop, click New, and then click Folder. Step D: Paste the contents of the Store folder into the backup folder 1. Double-click the Mail Backup folder to open it. Right-click inside the Mail Backup folder window, and then click Paste. Step 2: Export the Address Book to a.
On the File menu, click Export, and then click Address Book. Click Browse. Select the Mail Backup folder that you created. In the File Name box, type address book backup, and then click Save. Click OK, and then click Close. Step 3: Export the mail account to a file 1.
On the Tools menu, click Accounts. On the Mail tab, click the mail account that you want to export, and then click Export. Repeat these steps for each mail account that you want to export. Click Close. Step 4: Export the newsgroup account to a file 1. On the News tab, click the news account that you want to export, and then click Export.
Repeat these steps for each news account that you want to export. To restore Outlook Express items Step 1: Import messages from the backup folder 1. On the File menu, point to Import, and then click Messages. Click Browse, and then click the Mail Backup folder. Click OK, and then click Next. Click All folders, click Next, and then click Finish. Import the Address Book file 1. Select the Mail Backup folder, click the address book backup.
Click Next, and then click Finish. Import the mail account file 1. On the Mail tab, click Import. In the Look In box, select the Mail Backup folder. Click the mail account that you want to import, and then click Open. Repeat these steps for each mail account that you want to import. Import the newsgroup account file 1. On the News tab, click Import.
Click the news account that you want to import, and then click Open. Repeat these steps for each news account that you want to import.
What is folder sharing? Hiden Sharing: Open Sharing: Broadcast Domain: Broadcast domain is a restricted area in which information can be transmitted for all devices in the domain to receive. More specifically, Ethernet LANs are broadcast domains. Any devices attached to the LAN can transmit frames to any other device because the medium is a shared transmission system.
Frames are normally addressed to a specific destination device on the network. While all devices detect the frame transmission on the network, only the device to which the frame is addressed actually receives it. All network traffic is sent across the repeater unaltered. In addition, bridges maintain separate collision domains, so that computers on each segment only contend with other computers on the same segment for access.
Collision Domain: The protocol allows multiple devices connected to a shared network cable to use that cable by taking turns accessing it. The basic strategy goes like this: A computer listens on the cable to see if another computer is transmitting, which is indicated by a voltage change on the cable. If busy, the computer waits and listens. When the cable is not busy, a computer attempts to transmit. Another computer may attempt to transmit at the same time, which causes a collision. Both computers that attempted to transmit must back off, wait, and then attempt to transmit again.
Computers on the network detect collisions by looking for abnormally changing voltages. Signals from multiple systems overlap and distort one another. Overlapping signals will push the voltage above the allowable limit.
Most common interview questions and answers
This is detected by attached computers, which reject the corrupted frames called runts. How do you check the listening ports on a windows box? Command line. Diffrent types of cables used in lan cabling? UDP uses the Internet Protocol to actually get a data unit called a datagram from one computer to another. However, UDP does not provide the service of dividing a message into packets datagrams and reassembling it at the other end.
This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. Network applications that want to save processing time because they have very small data units to exchange and therefore very little message reassembling to do may prefer UDP to TCP. Explain Application Layer with the help of application layer protocol?
In the Open Systems Interconnection OSI communications model, the application layer provides services for an application program to ensure that effective communication with another application program in a network is possible. The application layer is not the application itself that is doing the communication. What is modem and what use of in networking?
A modem is a Modulator and Demodulator. It's like a bridge between computer and ordinary telephone lines. Telephone lines only accept analog signals but computers only accept digital binary signals so modems help link them. Routers then emit the digital signal. A modem is a device that modulates an analog carrier signal to incode digital infomation. How to connect two hosts with different subnet each other to communicate? How to connect How to configure SMTP connector in exchange server for external outgoing mail?
To create and securely configure the SMTP connector follows these steps: Start Exchange System Manager. Start the System Manager from the Microsoft Exchange program group. Right click the top-level node and on the shortcut menu, click Properties. In the message box that informs you that you need to restart the System Manager, click OK, and then restart System Manager.
There should be a container called Administrative Groups in the console tree. Expand the nodes. Click the Members container within the First Routing Group object. Your server is the Master server in the First Routing Group. Expand the Administrative Groups container. Click the administrative group that you want to work with, and then expand it.
Expand the Routing Groups container. Click the routing group that you want to work with, and then expand it.
Technical Support Engineer interview questions
Click the Connectors container. On the General tab, provide an appropriate identifying name for the connector. Choose to use DNS or forward to a smart host if you are relaying through an Internet service provider send-mail server. If you are forwarding to a smart host, use the IP address of the smart host in square brackets.
Under Local Bridgeheads, click Add. Add the server that becomes the bridgehead server for the routing group. This can be either the server that you are working on or another server in the same routing group.
Alternatively, this duty can be shared by multiple servers. Click the Address Space tab. Clicking to select the Allow messages to be relayed to these domains check box would open your server for relay to the world.
The Allow messages to be relayed to these domains check box should be for secure domain to domain connections only. If you have chosen forward all mail to a smart host, click the Advanced tab. Click the Outbound Security option, and then select an appropriate authentication method for your relay host. The default is Anonymous Access. Anonymous is the method that must be used if you are forwarding to an ISP, unless you have made prior arrangements with the ISP for another security level.
If you are forwarding to your own server or to another server outside your environment, work with the administrator of that server to select the appropriate security level for both servers. You can add more than one smart host. Click OK to exit Outbound Security. Click OK to exit the Advanced tab. What are two characteristics of clients in data networks?
Initiate data exchanges. May upload data to servers. What is L1, L2, L3 Support? Level 1 L1 This is the initial support level responsible for basic customer issues. Level 2 L2 This is a more in-depth technical support level than Tier I containing experienced and more knowledgeable personnel on a particular product or service.
Technicians in this realm of knowledge are responsible for assisting Tier I personnel solve basic technical problems and for investigating elevated issues by confirming the validity of the problem and seeking for known solutions related to these more complex issues.
Level 3 L3 This is the highest level of support in a three-tiered technical support model responsible for handling the most difficult or advanced problems. These individuals are experts in their fields and are responsible for not only assisting both Tier I and Tier II personnel, but with the research and development of solutions to new or unknown issues. Note that Tier III technicians have the same responsibility as Tier II technicians in reviewing the work order and assessing the time already spent with the customer so that the work is prioritized and time management is sufficiently utilized.
Level 4 L4 While not universally used, a fourth level often represents an escalation point beyond the organization.
7 Technical Support Interview Questions and Answers
This is generally a hardware or software vendor. Within a corporate incident management system it is important to continue to track incidents even when they are being actioned by a vendor and the Service Level Agreement SLA may have specific provision for this.
What is Spyware and Firmware? Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.
The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. What is difference between static ip address and dynamic ip address?
Why LDAP is called light weight? LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X. FTP provides user authentication. TFTP does not. What is a network management system?
How do you double-boot a Win server box? The Boot. To change the Boot. When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. If you uninstall Windows Server , which operating systems can you revert to? Note, however, that you cannot upgrade from ME and 98 to Windows Server How do you get to Internet Firewall settings?
What are the Windows Server keyboard shortcuts? Winkey opens or closes the Start menu. What is Active Directory? Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups.
An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list ACL. The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.
How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately. These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority LSA.
When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory. If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. When should you create a forest? Organizations that operate on radically different bases may require separate trees with distinct namespaces.
Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions. How can you authenticate between forests? Four types of authentication are used across forests: What snap-in administrative tools are available for Active Directory?
What types of classes exist in Windows Server Active Directory? Structural class.
The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created.
Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.
30 Common Interview Questions and Answers for IT Support
Abstract classes are so named because they take the form of templates that actually create other templates abstracts and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.
Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action. The 88 class includes object classes defined prior to , when the X. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server environments. How do you delete a lingering object?
Windows Server provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. What is Global Catalog? The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller.
In Windows , there was typically one GC on every site in order to prevent user logon failures across the network. How is user account security established in Windows Server ? When an account is created, it is given a unique access number known as a security identifier SID.
300+ TOP DESKTOP ENGINEER Interview Questions and Answers
Every group to which the user belongs has an associated SID. SIDs from the security token are mapped to the access control list ACL of any object the user attempts to access.
If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different.
What do you do with secure sign-ons in an organization with many roaming users? Credential Management feature of Windows Server provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.
Anything special you should do when adding a user that has a Mac? What remote access options does Windows Server support? Dial-in, VPN, dial-in with callback. Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder.
Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is. Where are the settings for all the users stored on a given machine? Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains.
I am trying to create a new universal user group. Universal groups are allowed only in native-mode Windows Server environments. Native mode requires that all domain controllers be promoted to Windows Server Active Directory. You change the group policies, and now the computer and user settings are in conflict. Which one has the highest priority? The computer settings take priority. You want to set up remote installation procedure, but do not want the user to gain access over it.
What do you do? Microsoft NetMeeting policies. How can you restrict running certain applications on a machine? Via group policy, security settings for the group, then Software Restriction Policies. You need to automatically install an app, but MSI file is not available.
Plus, it uses. Users may be selectively restricted from modifying their IP address and other network configuration parameters. What to look for in an answer: The candidate is willing to go the extra mile for customers The candidate has the ability to look at a problem from many perspectives The candidate can work with others to develop a new solution or fix Example: "At my previous company, I remember one customer had an issue that kept happening.
The common fixes we were using were only temporarily solving the problem. After doing a bit of research, I was able to design and develop a new solution. I called the customer personally and implemented the repair. Technical support specialists must have the right mix of technical and people skills.
What to look for in an answer: The candidate uses reasoning and logic there is no correct answer, as it's an opinion question The candidate views both skills as important, even if they choose one skill over the other The candidate understands how both skills play a role in the job Example: "First, let me say that customer service skills are very important.
You must be able to empathize with people and address needs. Good communication is crucial. With that said, I have a technical background, and I understand the amount of knowledge you need to actually solve issues. Technical skills are more important because, without in-depth knowledge of the hardware and software, you won't be able to efficiently do your job.
With this question, you can understand career goals. What to look for in an answer: The candidate is proactive and willing to learn The candidate is excited about the job at hand The candidate sees your company as part of their future Example: "In this position, I plan to add skills and experience.
Honestly, I would like to move into a management role in technical support within five years. Jump to section: Introduction Operational and Situational questions Behavioral questions. Download this sample as Pdf Document. Get a free trial. Similar to this Maintenance Supervisor interview questions Pediatrician interview questions Insurance Agent interview questions Regional Sales Manager interview questions Technical interview questions. Ebooks by Workable. Conduct a more effective Technical Support Engineer interview Learn how to implement structured interviews Get the guide.This slows your e-mail substantially.
Note 2: It does this by using the rising and falling edges of the clock signal, also known as "double pumping" and employing a prefetch buffer capable of accessing two datawords at a time. This is a warm-up question and does not waste your best points on it.
Types of operating system There are several types of operating system, defined according to whether they can simultaneously manage information measuring 16 bits, 32 bits, 64 bits or more.
In the right-pane, double-click ProductType. How do you get to Internet Firewall settings? If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. System Restore The System Restore feature enables users and administrators to restore a computer to a previous state without losing data.
Click OK to exit the Advanced tab.