Laws Desktop Support Interview Questions Answers Pdf


Thursday, June 13, 2019

Top 50 Desktop Support Interview Questions & Answers . 43) What is the difference between server OS and desktop OS? Download PDF. Desktop & Technical Support Interview Questions and Answers - Free download as Word Doc .doc), PDF File .pdf), Text File .txt) or read online for free. Interview question for desktop support engineer - Free download as Word Doc . doc /.docx), PDF File .pdf), Download as DOCX, PDF, TXT or read online from Scribd .. Desktop & Technical Support Interview Questions and Answers.

Desktop Support Interview Questions Answers Pdf

Language:English, Spanish, Japanese
Genre:Science & Research
Published (Last):13.11.2015
ePub File Size:20.51 MB
PDF File Size:16.13 MB
Distribution:Free* [*Regsitration Required]
Uploaded by: VICTORINA

+ Desktop Support Interview Questions and Answers, Question1: What is active directory? Question2: What is DHCP and what it is used for? Question3. 3 This ebook includes two parts: Part I: 85 desktop support interview questions with answers (pdf, free download) - Part II: Top 12 tips to. Desktop Support Engineer Interview Questions and Answers. Updated on March . Download the Questions as a PDF file. Link to the PDF file.

What is difference safe mode normal mode? Safe mode is a troubleshooting option for Windows that starts your computer in a limited state. Only the basic files and drivers necessary to run Windows are started.

In normal mode all basic files and drivers are necessary to run windows. Think about ur college network if three departments where there and and 25 computers in each department and if someone ask u to group the computer s,what will be ccriteria to do that.

What is Firewall and types of firewall? A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.

There are several types of firewall techniques: Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers.

This is very effective, but can impose a performance degradation. Circuit-level gateway: Once the connection has been made, packets can flow between the hosts without further checking. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

What is troubleshooting? To isolate the source of a problem and fix it. What is shadow copy? It is implemented as a Windows service called the Volume Shadow Copy service. How do you check whether Active Directory has been installed properly or not? A web server can be referred to as either the hardware the computer or the software the computer application that helps to deliver content that can be accessed through the Internet. A web server is what makes it possible to be able to access content like web pages or other data from anywhere as long as it is connected to the internet.

Application server is a program that handles all application operations between users and an organization's backend business applications or databases.

An application server is typically used for complex transaction-based applications. A database server is a computer program that provides database services to other computer programs or computers, as defined by the client—server model.

In case DHCP fails in your server then how do you satisfy that problem within some minutes? What is the Protocol? The main difference is that BOOTP was designed for manual pre-configuration of the host information in a server database, while DHCP allows for dynamic allocation of network addresses and configurations to newly attached hosts.

How to rename domain name in win server? To rename a domain controller Open Command Prompt. NewComputerName Restart the computer. From the command prompt, type: To rename a domain controller in a domain that contains a single domain controller Install a Windows Server member server in the domain. On the new server, create an additional domain controller by installing Active Directory.

After Active Directory is installed, enable the global catalog on the new domain controller. Transfer the operations master roles from the domain controller that you want to rename to the new domain controller.

Note that you must transfer the roles, do not seize them. Verify that the new domain controller is functioning correctly by doing the following: Verify authentications and global catalog searches.

Desktop Support Related Tutorials

Run Dcdiag. Perform any other appropriate tests to verify that the new domain controller can provide all of the domain functions of the first domain controller. On the new domain controller, open Command Prompt. Net share In the list that is generated, verify the existence of Sysvol and Netlogon. Uninstall Active Directory from the domain controller that you want to rename to be a member server. Rename the member server. Install Active Directory on the renamed server to create an additional domain controller.

Transfer the operations master roles back to the renamed domain controller. Enable the global catalog on the renamed domain controller. What is Wi-Fi? What is the latest version? The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. What is mean topology and types of topology? Network topology refers to the way that your computer network is arranged.

The network can have a physical or a logical topology. The physical topology describes the layout of computers and where the workstations are positioned.

The logical network topology describes how the information flows through the network. The different kinds of topology are: The word "bus" refers to the physical line that joins all the machines on the network. The advantages of this topology are that it is easy to implement and functions easily; on the other hand, it is highly vulnerable, since if one of the connections is defective, the whole network is affected.

Star topology In star topology, the network computers are linked to a piece of hardware called a hub. Unlike networks built with bus topology, networks which use star topology are much less vulnerable, as one of the connections can easily be removed by disconnecting it from the hub, without paralyzing the rest of the network. However, a star topology network is bulkier than a bus network, as additional hardware is required the hub.

Ring topology A ring topology is a network topology where each node device on the network connects to two other nodes. This forms a continuous path for the signal through each device. This works because data travels from node to node device to device.

In a ring topology also called a ring network , each node handles the data packets itself, then passes it to the next node, which also handles the packets. Mesh topology A mesh topology is made up of a network where each device has a point-to-point connection to every other device on the network.

This provides the dedicated capacity of a point-to-point link to each device and significant fault tolerance. The tree like structure allows you to have many servers on the network and you can branch out the network in many ways. This is particularly helpful for colleges, universities and schools so that each of the branches can identify the relevant systems in their own network and yet connect to the big network in some way.

What is a wild card certificate? A wildcard certificate allows you to secure multiple web sites with a single SSL certificate. Wildcard certificates are a service provided under Certificate Management Service.

How many scopes con create in one dhcp? You can configure as many scopes on a DHCP server as is required in your network environment. What is VPN and what are the main advantages? A virtual private network VPN is the extension of a private network that encompasses links across shared or public networks like the Internet. With a VPN, you can send data between two computers or two networks across a shared or public network in a manner that emulates a point-to-point private link.

Virtual private networking is the act of creating and configuring a VPN. What is dhcp? DHCP includes the following features to reduce network administration: What is secured socket layer and what is the requirement of its in networking? SSL Secure Sockets Layer is the standard security technology for establishing an encrypted link between a web server and a browser.

This link ensures that all data passed between the web server and browsers remain private and integral. Http is hyper text transfer protocol which is responsible for transmitting and receiving information across the Internet where as https is secure http, which is used exchanging confidential information with a server, which needs to be secured in order to prevent unauthorized access.

HTTPS is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. What is Peer to peer Network? Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data.

Peer-to-peer networking also known simply as peer networking differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers. What is the difference between a Virtual Server and a Dedicated Server? A dedicated server is a type of Internet hosting in which the client leases an entire server not shared with anyone.

This is more flexible than shared hosting, as organizations have full control over the server s , including choice of operating system, hardware, etc. A dedicated server could also be a computer that manages printer resources. However, that not all servers are dedicated.

In some networks, it is possible for a computer to act as a server and perform other functions as well. In the Web hosting business, a dedicated server is typically a rented service. The user rents the server, software and an Internet connection from the Web host. A server, usually a Web server, that shares computer resources with other virtual servers. Virtual Web servers are a very popular way of providing low-cost web hosting services.

Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer.

Desktop & Technical Support Interview Questions and Answers

In most cases, performance is not affected and each web site behaves as if it is being served by a dedicated server. If too many virtual servers reside on the same computer, or if one virtual server starts hogging resources, Web pages will be delivered more slowly. What is Antivirus? Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.

What are Cold Boot and Warm Boot? A hard reboot also known as a cold reboot, cold boot or cold start is when power to a computer is abruptly turned off, then turned back on. A soft reboot also known as a warm reboot is restarting a computer under software control, without removing power or directly triggering a reset line.

What is the type of dsl technologies? According to the FCC, the different types of DSL technologies provide transmission speeds ranging from several hundred thousand bits per second to millions of bits per second. All types of DSL Internet service can be categorized as either asymmetric or symmetric. Asymmetric means that most of the bandwidth is for sending data to the user downloading and only a small amount is available for uploading data.

ADSL requires a splitter at the user's end to split the Internet data signal from the telephone signal. DSL Lite also known as G. Lite is a slower version of ADSL that doesn't require a splitter at the user's end because the splitting happens remotely at the telephone company.

Larger businesses often use SDSL. SHDSL, which is faster and can optimize performance based on telephone line conditions. IDSL runs over a single pair of wires. How to take backup of Outlook Express explain all the steps in detail. To back up Outlook Express items Step 1: Copy message files to a backup folder Step A: Locate the Store folder 1.

Start Outlook Express. Click Tools, and then click Options. On the Maintenance tab, click Store Folder. In the Store Location dialog box, copy the store location. To do this, follow these steps: Put the mouse pointer at one end of the box under the Your personal message store is located in the following folder box.

Press and hold the left mouse button, and then drag the mouse pointer across the Your personal message store is located in the following folder box. Click Cancel, and then click Cancel again to close the dialog box. Step B: Copy the contents of the Store folder 1. On the Edit menu, click Select All. On the Edit menu, click Copy, and then close the window. Step C: Create a backup folder 1. Right-click any empty area on your desktop, click New, and then click Folder. Step D: Paste the contents of the Store folder into the backup folder 1.

Double-click the Mail Backup folder to open it. Right-click inside the Mail Backup folder window, and then click Paste. Step 2: Export the Address Book to a. On the File menu, click Export, and then click Address Book. Click Browse. Select the Mail Backup folder that you created.

In the File Name box, type address book backup, and then click Save. Click OK, and then click Close. Step 3: Export the mail account to a file 1. On the Tools menu, click Accounts. On the Mail tab, click the mail account that you want to export, and then click Export. Repeat these steps for each mail account that you want to export.

Click Close. Step 4: Export the newsgroup account to a file 1. On the News tab, click the news account that you want to export, and then click Export. Repeat these steps for each news account that you want to export.

To restore Outlook Express items Step 1: Import messages from the backup folder 1. On the File menu, point to Import, and then click Messages. Click Browse, and then click the Mail Backup folder.

Click OK, and then click Next. Click All folders, click Next, and then click Finish. Import the Address Book file 1. Select the Mail Backup folder, click the address book backup. Click Next, and then click Finish. Import the mail account file 1. On the Mail tab, click Import. In the Look In box, select the Mail Backup folder. Click the mail account that you want to import, and then click Open. Repeat these steps for each mail account that you want to import.

Import the newsgroup account file 1. On the News tab, click Import. Click the news account that you want to import, and then click Open.

Repeat these steps for each news account that you want to import.

What is folder sharing? Hiden Sharing: Open Sharing: Broadcast Domain: Broadcast domain is a restricted area in which information can be transmitted for all devices in the domain to receive.

More specifically, Ethernet LANs are broadcast domains. Any devices attached to the LAN can transmit frames to any other device because the medium is a shared transmission system. Frames are normally addressed to a specific destination device on the network. While all devices detect the frame transmission on the network, only the device to which the frame is addressed actually receives it.

All network traffic is sent across the repeater unaltered. In addition, bridges maintain separate collision domains, so that computers on each segment only contend with other computers on the same segment for access.

Collision Domain: The protocol allows multiple devices connected to a shared network cable to use that cable by taking turns accessing it.

The basic strategy goes like this: A computer listens on the cable to see if another computer is transmitting, which is indicated by a voltage change on the cable. If busy, the computer waits and listens. When the cable is not busy, a computer attempts to transmit. Another computer may attempt to transmit at the same time, which causes a collision. Both computers that attempted to transmit must back off, wait, and then attempt to transmit again.

Computers on the network detect collisions by looking for abnormally changing voltages. Signals from multiple systems overlap and distort one another. Overlapping signals will push the voltage above the allowable limit. This is detected by attached computers, which reject the corrupted frames called runts. How do you check the listening ports on a windows box? Command line. Diffrent types of cables used in lan cabling?

UDP uses the Internet Protocol to actually get a data unit called a datagram from one computer to another. However, UDP does not provide the service of dividing a message into packets datagrams and reassembling it at the other end.

This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. Network applications that want to save processing time because they have very small data units to exchange and therefore very little message reassembling to do may prefer UDP to TCP. Explain Application Layer with the help of application layer protocol?

In the Open Systems Interconnection OSI communications model, the application layer provides services for an application program to ensure that effective communication with another application program in a network is possible. The application layer is not the application itself that is doing the communication. What is modem and what use of in networking?

A modem is a Modulator and Demodulator. It's like a bridge between computer and ordinary telephone lines. Telephone lines only accept analog signals but computers only accept digital binary signals so modems help link them. Routers then emit the digital signal. A modem is a device that modulates an analog carrier signal to incode digital infomation.

How to connect two hosts with different subnet each other to communicate? How to connect How to configure SMTP connector in exchange server for external outgoing mail? To create and securely configure the SMTP connector follows these steps: Start Exchange System Manager.

Start the System Manager from the Microsoft Exchange program group. Right click the top-level node and on the shortcut menu, click Properties. In the message box that informs you that you need to restart the System Manager, click OK, and then restart System Manager.

There should be a container called Administrative Groups in the console tree. Expand the nodes. Click the Members container within the First Routing Group object. Your server is the Master server in the First Routing Group.

Expand the Administrative Groups container. Click the administrative group that you want to work with, and then expand it. Expand the Routing Groups container. Click the routing group that you want to work with, and then expand it. Click the Connectors container. On the General tab, provide an appropriate identifying name for the connector. Choose to use DNS or forward to a smart host if you are relaying through an Internet service provider send-mail server.

If you are forwarding to a smart host, use the IP address of the smart host in square brackets. Under Local Bridgeheads, click Add. Add the server that becomes the bridgehead server for the routing group. This can be either the server that you are working on or another server in the same routing group. Alternatively, this duty can be shared by multiple servers. Click the Address Space tab.

Clicking to select the Allow messages to be relayed to these domains check box would open your server for relay to the world. The Allow messages to be relayed to these domains check box should be for secure domain to domain connections only. If you have chosen forward all mail to a smart host, click the Advanced tab.

Click the Outbound Security option, and then select an appropriate authentication method for your relay host. The default is Anonymous Access. Anonymous is the method that must be used if you are forwarding to an ISP, unless you have made prior arrangements with the ISP for another security level. If you are forwarding to your own server or to another server outside your environment, work with the administrator of that server to select the appropriate security level for both servers.

You can add more than one smart host. Click OK to exit Outbound Security. Click OK to exit the Advanced tab. What are two characteristics of clients in data networks? Initiate data exchanges. May upload data to servers. What is L1, L2, L3 Support? Level 1 L1 This is the initial support level responsible for basic customer issues.

Level 2 L2 This is a more in-depth technical support level than Tier I containing experienced and more knowledgeable personnel on a particular product or service. Technicians in this realm of knowledge are responsible for assisting Tier I personnel solve basic technical problems and for investigating elevated issues by confirming the validity of the problem and seeking for known solutions related to these more complex issues.

Level 3 L3 This is the highest level of support in a three-tiered technical support model responsible for handling the most difficult or advanced problems. These individuals are experts in their fields and are responsible for not only assisting both Tier I and Tier II personnel, but with the research and development of solutions to new or unknown issues. Note that Tier III technicians have the same responsibility as Tier II technicians in reviewing the work order and assessing the time already spent with the customer so that the work is prioritized and time management is sufficiently utilized.

Level 4 L4 While not universally used, a fourth level often represents an escalation point beyond the organization. This is generally a hardware or software vendor. Within a corporate incident management system it is important to continue to track incidents even when they are being actioned by a vendor and the Service Level Agreement SLA may have specific provision for this. What is Spyware and Firmware? Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.

The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. What is difference between static ip address and dynamic ip address?

Why LDAP is called light weight? LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X. FTP provides user authentication. TFTP does not. What is a network management system? How do you double-boot a Win server box? The Boot. To change the Boot.

When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. If you uninstall Windows Server , which operating systems can you revert to? Note, however, that you cannot upgrade from ME and 98 to Windows Server How do you get to Internet Firewall settings? What are the Windows Server keyboard shortcuts? Winkey opens or closes the Start menu. What is Active Directory?

Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices.

Each object has certain attributes and its own security access control list ACL. The Active Directory replaces them. Now all domain controllers share a multimaster peer-to-peer read and write relationship that hosts copies of the Active Directory.

How long does it take for security changes to be replicated among the domain controllers? Security-related modifications are replicated within a site immediately.

These changes include account and individual user lockout policies, changes to password policies, changes to computer account passwords, and modifications to the Local Security Authority LSA.

When DC promotion occurs with an existing forest, the Active Directory Installation Wizard contacts an existing DC to update the directory and replicate from the DC the required portions of the directory.

If the wizard fails to locate a DC, it performs debugging and reports what caused the failure and how to fix the problem. When should you create a forest?

Organizations that operate on radically different bases may require separate trees with distinct namespaces.

Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions. How can you authenticate between forests? Four types of authentication are used across forests: What snap-in administrative tools are available for Active Directory?

What types of classes exist in Windows Server Active Directory? Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created.

Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes. Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates abstracts and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.

Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action.

The 88 class includes object classes defined prior to , when the X. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server environments. How do you delete a lingering object? Windows Server provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory. What is Global Catalog? The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree.

Every domain has at least one GC that is hosted on a domain controller. In Windows , there was typically one GC on every site in order to prevent user logon failures across the network. How is user account security established in Windows Server ? When an account is created, it is given a unique access number known as a security identifier SID. Every group to which the user belongs has an associated SID.

SIDs from the security token are mapped to the access control list ACL of any object the user attempts to access. If I delete a user and then create a new account with the same username and password, would the SID and permissions stay the same? If you delete a user account and attempt to recreate it with the same user name and password, the SID will be different. What do you do with secure sign-ons in an organization with many roaming users?

Credential Management feature of Windows Server provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X. Anything special you should do when adding a user that has a Mac? What remote access options does Windows Server support?

Dial-in, VPN, dial-in with callback. Where are the documents and settings for the roaming profile stored? All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder.

Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is. Where are the settings for all the users stored on a given machine?

Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains. I am trying to create a new universal user group. Universal groups are allowed only in native-mode Windows Server environments. Native mode requires that all domain controllers be promoted to Windows Server Active Directory. You change the group policies, and now the computer and user settings are in conflict.

Which one has the highest priority? The computer settings take priority. You want to set up remote installation procedure, but do not want the user to gain access over it. What do you do? Microsoft NetMeeting policies.

How can you restrict running certain applications on a machine? Via group policy, security settings for the group, then Software Restriction Policies. You need to automatically install an app, but MSI file is not available.

Plus, it uses. Users may be selectively restricted from modifying their IP address and other network configuration parameters.

You want to create a new group policy but do not wish to inherit. Make sure you check Block inheritance among the options when creating the policy. What is "tattooing" the Registry?

The user can view and modify user preferences that are not stored in maintained portions of the Registry. If the group policy is removed or changed, the user preference will persist in the Registry.

How do you fight tattooing in installations? What does IntelliMirror do? It helps to reconcile desktop settings, applications, and stored files for users, particularly those who move between workstations or those who must periodically work offline.

Only native NTFS provides extensive permission control on both remote and local files. However, newly created subfolders will inherit this permission. I have a file to which the user has access, but he has no folder permission to read it. Can he access it? It is possible for a user to navigate to a file for which he does not have folder permission. This involves simply knowing the path of the file object.

The best way to start would be to type the full path of a file into Run… window. For a user in several groups, are Allow permissions restrictive or permissive? For a user in several groups, are Deny permissions restrictive or permissive? What hidden shares exist on Windows Server installation? The standalone server stores the Dfs directory tree structure or topology locally. Thus, if a shared folder is inaccessible or if the Dfs root server is down, users are left with no link to the shared resources.

A fault-tolerant root node stores the Dfs topology in the Active Directory, which is replicated to other domain controllers. Thus, redundant root nodes may include multiple connections to the same data residing in different shared folders. Use the UNC path, not client, only and clients can access Server fault-tolerant shares.

In Partition Knowledge Table, which is then replicated to other domain controllers. What problems can you have with DFS installed? Two users opening the redundant copies of the file at the same time, with no file- locking involved in DFS, changing the contents and then saving. Only one file will be propagated through DFS.

Install a standalone one. Is Kerberos encryption symmetric or asymmetric? How does Windows Server try to prevent a middle-man attack on encrypted line? Time stamp is attached to the initial client request, encrypted with the shared key. What hashing algorithms are used in Windows Server? What third-party certificate exchange protocols are used by Windows Server?

If hashing is one-way function and Windows Server uses hashing for storing passwords, how is it possible to attack the password lists, specifically the ones using NTLMv1?

A cracker would launch a dictionary attack by hashing every imaginable term used for password and then compare the hashes. More restrictive in Windows Server How many passwords by default are remembered when you check "Enforce Password History Remembered"? What is presentation layer responsible for in the OSI model?

Does Windows Server support IPv6? Yes, run ipv6. Can Windows Server function as a bridge? You can combine several networks and devices connected via several adapters by enabling IP routing. It is any compilation of disks or tapes with the same administrative properties.

How do you install recovery console? Supports audio transmissions as well, although prepare for heavy network load. What scripts ship with IIS 6. It is the point of contact for all incoming HTTP requests.

It listens for requests and queues them until they are all processed, no more queues are available, or the Web server is shut down. On disk, as opposed to memory, as it used to be in IIS 5. What is socket pooling? Non-blocking socket usage, introduced in IIS 6. More than one application can use a given socket. Describe the process of clustering with Windows Server when a new node is added.

As a node goes online, it searches for other nodes to join by polling the designated internal network. What applications are not capable of performing in Windows Server clusters? The number of times a restart is attempted, when the node fails. In environment you can do that via cluster. For the document of size 1 MB, what size would you expect the index to be with Indexing Service?

No, because users can only view the indices of documents and folders that they have permissions for. Less then K documents - up to MB. Which add-on package for Windows Server would you use to monitor the installed software and license compliance? Which service do you use to set up various alerts?

What is SMTP? Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. In addition, SMTP is generally used to send messages from a mail client to a mail server.

How would you troubleshoot a printer? How does traceroute work? It works by sending a packet to the intended host with a TTL value of 1.

The first router will send back the ICMP "time exceeded" message to the sending host. Then the traceroute program will send a message with a TTL of 2, then 3, etc. This way it will get information about each router using the information received in the ICMP packets. To get information about the receiving host, the message is sent to a port that is not likely to be serviced by that host.

A ICMP "port unreachable" error message is generated and sent back. What is a Global Catalog? The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory Domain Services AD DS forest.

The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.

Explain the function of DNS. A DNS server hosts the information that enables client computers to resolve memorable, alphanumeric DNS names to the IP addresses that computers use to communicate with each other. One-Way Trust A one-way trust is a unidirectional authentication path created between two domains trust flows in one direction, and access flows in the other.

This means that in a one-way trust between a trusted domain and a trusting domain, users or computers in the trusted domain can access resources in the trusting domain.

However, users in the trusting domain cannot access resources in the trusted domain. Some one-way trusts can be either nontransitive or transitive, depending on the type of trust being created. Two-Way Trust A two-way trust can be thought of as a combination of two, opposite-facing one-way trusts, so that, the trusting and trusted domains both trust each other trust and access flow in both directions. This means that authentication requests can be passed between the two domains in both directions.

Some two-way relationships can be either nontransitive or transitive depending on the type of trust being created. All domain trusts in an Active Directory forest are two-way, transitive trusts.

When a new child domain is created, a two-way, transitive trust is automatically created between the new child domain and the parent domain. Transitive and Nontransitive Trust A two-way trust relationship is established by creating two one-way trust relationships. Domains can be connected by explicit one-way or two-way trust relationships for the purpose of enabling access to resources, but they are not necessarily related in any other way.

In Windows , domains can be joined to a domain tree or forest, and each child domain has an automatic two-way trust relationship with the parent domain. This trust relationship is also transitive. Transitive trust means that the trust relationship extended to one domain is extended automatically to any other domain that is trusted by that domain. Transitive trust is applied automatically for all domains that are members of the domain tree or forest.

In Windows , transitive trust relationships are always two-way trust relationships.

Top Interview Questions for Desktop Support Engineer (Microsoft)

A nontransitive trust relationship can be created between Windows domains when a transitive trust relationship is not appropriate, but this trust relationship must be created explicitly. It can be created, for example, between two Windows domains that are not in the same forest. A trust relationship between a Windows domain and a Windows NT 4. If one of these domains is an account domain and the other is a resource domain the trust relationship is usually created as a one-way trust relationship.

If there are user accounts in both domains, two one- way trust relationships can be created between them. The trust relationship between two domains — whether one-way or two-way, transitive or nontransitive — is stored as an interdomain trust account object in Active Directory.

How many passwords by default are remembered in an active directory? User's last 6 passwords. What is a C name record in DNS? What is a LM host file used for? WINS, fail. It is used in conjunction with workgroups and domains. Explain Active Directory sites and services and linked cost routing? You can use the Active Directory Sites and Services snap-in to manage the site- specific objects that implement the intersite replication topology.

In addition, Active Directory Sites and Services provides a view of the Services container, which you can use to view service-related objects that are published in AD DS. The System Volume Sysvol is a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain. Sysvol uses junction points-a physical location on a hard disk that points to data that is located elsewhere on your disk or other storage device-to manage a single instance store.

How do you create a new application partition. Applications and services can use application directory partitions to store application-specific data. Application directory partitions can contain any type of object, except security principals. TAPI is an example of a service that stores its application-specific data in an application directory partition.

Application directory partitions are usually created by the applications that will use them to store and replicate data. Members of the Enterprise Admins group can manually create or manage application directory partitions using the Ntdsutil command-line tool.

To create or delete an application directory partition 1. Open Command Prompt. At the ntdsutil command prompt, type: At the domain management command prompt, type: At the server connections command prompt, type: At the domain management command prompt, do one of the following: How do you view replication properties for AD partitions and DCs? Why not make all DCs in a large forest as GCs? Unless you have some really bad connections that may not be able to handle the extra traffic, you should make every DC a GC.

In ANY single domain forest, it is recommended and beneficial to make all DCs GCs since it has no replication impact and serves to better distribute query load. What are the Support Tools? Why do I need them? Support Tools are the tools that are used for performing the complicated tasks easily.

What is LDP? Replmon is the first tool you should use when troubleshooting Active Directory replication issues. Network administrators can use it for common administrative tasks such as adding, deleting, and moving objects with a directory service. It is used for batch management of trusts, joining computers to domains, verifying trusts, and secure channels. EXE is a command line tool used to monitor and troubleshoot replication on a computer running Windows. This is a command line tool that allows you to view the replication topology as seen from the perspective of each domain controller.

It performs the following actions: EXE to force replication between the site connection objects. What is the KCC? With in a Site, a Windows server service known as the KCC automatically generates a topology for replication among the domain controllers in the domain using a ring structure. USB ports. Sound ports. LAN or Ethernet ports. VGA ports. The lights are: Power light — indicates if the power is on. Link light — indicates if the modem is receiving broadband or Internet signals from the ISP.

Data light — indicates if the Internet is working. Connectivity light — indicates if the modem is connected to a computer. Check the following: Speaker volume, cable connections, power to the speakers and device drivers. It is used for the temporary storage of data that is being worked on. Hard disk partitions divide the hard disk drive into smaller segments to enable better space management.

Each partition on the disk can then be considered as a separate disk allowing different file systems to be used on each. This question is designed to test your familiarity with imaging software.

Describe image testing and the attributes of particular software to show your familiarity with imaging. You will need to have familiarized yourself with the system used by the organisation you are hoping to join. Focus your answer on those systems, but also mention other systems with which you have experience. Device Drivers are the software required to run hardware components.

It helps in loading the operating system. It is normally found in a bit OS, for example 64bit Win7. This folder is very similar to the system32 folder of the bit OS. Locate Windows Update. Right click on Service and select Properties. In Start-up type, select Enable. Click Start under Service status.

Click OK. What is the maximum length of LAN cable for proper communication? After about 80 meters feet , you will usually see a reduction in speed. You can use trusted anti-virus software and update it regularly.

Make sure it checks every file on the computer. Backup your system periodically in case a major infection occurs, and be aware of all software and programs that run on your computer. Never click a suspicious link or download a suspicious file. Go to Run then type diskmgmt. After that, right click on hard disk to convert a basic disk to dynamic disk. Note: You should be logged in with an administrator account. A Blue Screen error is mainly due to hardware or software incompatibility within the system.

Try the following options. Pull out the RAM card, rub it with rubber on the chip side, and re-insert. Every BSD has a unique code; try searching it on Google to find a solution. Select the tab labelled BOOT. Click the button labelled Check All Boot Paths. A dialog box will open detailing the location of any invalid operating system locations. The boot. Click Apply and your computer will boot into Safe Mode the next time it restarts. Reboot the computer. Start pressing the F8 key as soon as your system starts to boot.

This will open multiple boot options including Safe Mode. When should we use it in Windows? Often, we have to start Windows in Safe Mode in order to remove spyware or for troubleshooting driver problems and other diagnostic purposes. Only specific programs and files with limited driver support are needed to run the operating system. This will allow you to attempt to remove viruses, change bad drivers and perform other diagnostic tasks that cannot be done in Normal Mode.

A default gateway is a routing device used to forward all traffic that is not addressed to a destination within the local network or local sub-net. Dial-up internet connections do not require a default gateway though because it is present in the ISP itself. The DNS address is configured on workstations. Windows redirects all domain names to resolve into IP addresses. Be sure to do a little reading on the systems you are familiar with, so you can showcase your skills.

Have you interacted with the IT staff? Communicate your ability to handle different tasks and challenges. Show how you are well versed with special systems and communicate with professionals in your area of expertise. Include coordinating with Information Technology professionals to enhance system communication, peripherals and network operation. You may also relate your experience in installing computer performance monitoring equipment. Explain methods used to assess future computer needs in the organization.

Do you worked independently as well? As a desktop engineer you must have the ability to work with others and alone.One of the computers stops working and reports that the virus was detected.

Describe a time when you had a conflict. How many passwords by default are remembered in an active directory? Active Directory is a centralized and standardized system that automates network management of user data, security and distributed resources and enables interoperation with other directories.

Broadcast Domain: Uninstall Active Directory from the domain controller that you want to rename to be a member server. What is Denial of Service attack in hacking What is eavesdropping with respect to hacking What is virus with respect to computer technology? Via group policy, security settings for the group, then Software Restriction Policies.

Known as Thicknet. The patch files are used to record these splits, and "patch" the transaction back together during restoration.

HEIDI from Mississippi
Look through my other posts. One of my extra-curricular activities is woodworking. I do like reading novels unaccountably.