Most Commen Interview Questions for Desktop Engineer
INTERVIEW
QUESTIONS
1. 1.What is antivirus? Types of antivirus?
Antivirus is a program which is used to detect and
delete the virus.
2. What is Backup? Types of backups?
Creating a duplicate copy of
existing data is called a backup.
XP: normal backup, daily
backup, copy backup, incremental backup, and differential backup.
Vista/win-7: normal and
incremental backup.
Incremental backup: A security copy
which contains only those files which have been altered since the last full
backup.
A differential backup is a type
of backup that copies all the data that has changed since the last
full backup. For example, if a full backup is done on Sunday,
Monday's differential backup backs up all the files changed or added
since Sunday's full backup.
3. What is restore point?
A restore point is a saved
"snapshot" of a computer's data at a specific time.
By creating a restore point, you can save the state
of the operating system and your data so that if future changes cause a
problem, you can restore the system and your data to the way it was before the
changes were made.
4. What is a printer and what types of
printer?
A printer is an output
device which is used to convert softcopy into hardware copy.
Types of printers: impact
and non-impact
Impact—dot matrix
Non-impact – laser, inkjet.
5. What is print spooler?
A software program responsible for managing all
print jobs currently being sent to the Computer printer
6. What is a network and its types?
A network is a collection of
connected devices together through a transmission media for sharing resources.
7. Types of networks:
LAN (Local Area Network): if
the devices are connected with in a diameter of 1Km is called LAN.
WAN (Wide Area Network): WAN is a collection of two
or more LAN. It covers entire geographical area.
8. What is networking?
Creating communication between connected devices on
a network is called networking.
9. What is protocol?
Protocol is a set of rules which are predefined for
the purpose of communication.
10. What is port no? what are the port no for
DHCP, DNS, FTP, HTTP, HTTPS, TFTP, Telnet, SMTP, POP3 &IMAP?
Every service protocol has its own service address
which is known as Port no.
11. What is telnet?
Telnet provided access to a command-line
interface (usually, of an operating system) on a
remote host
12. List out the OSI Layers.
Application layer, Presentation layer, Session
layer, Transport layer, Network layer, Data link layer, and Physical layer.
13. What is the function of application layer?
It is responsible for providing access to the
network resources. It is also called as user interaction layer.
14. What are the protocols works at
application layer?
DHCP, DNS, FTP, Telnet, SMTP, HTTP
15. What is the function of presentation
layer?
It is responsible for translation, encryption and
data compression.
16. What are the protocols works at
presentation layer?
SSL(Secure Socket Layer) it is similar to telnet,
MMIE: Multipurpose Internet Mail Extensions (MIME) is an Internet standard that
extends the format of e-mail
17. What is the function of session layer?
It is responsible for establishing, managing and
terminating sessions.
18. What are the protocols works at session
layer?
PPTP (Point to Point Tunneling Protocol), L2TP
(Layer2 Tunneling Protocol), NetBIOS (Network Basic Input Output System)
19. What is the function of transport layer?
It is responsible for end to
end delivery of entire message.
It is also responsible for segmentation.
20. Transport layer is also called as ____CORE____
layer?
21. What are the protocols works at transport
layer?
UDP (User Datagram Protocol), TCP (Transmission
Control Protocol)
22. What is the function of network layer?
Network layer is responsible
for end to end delivery of packets and routing.
Routing is the process of
selecting the best path if multiple path is available.
Data unit at network layer is called Packet which
contains source IP address and Destination IP address.
23. What are the protocols works at network
layer?
IP, IPSec, ICMP, and APPLE
TALK.
ICMP (Internet Control Message Protocol): it is used
to send error and query messages to the sending device.
24. What are the devices works at network
layer?
Router, Layer3switch.
Layer3 switch has functionality of Router and
Switch.
25. What is the function of data link layer?
It is responsible for node
to node delivery of frames.
A frame contains source MAC
address and destination MAC address.
Data unit at the data link layer is called Frames.
26. What are the sub layers of data link
layer?
Data link layer has two sub layers. 1) MAC (Media
Access Control) 2) LLC (Logic Link Control)
27. What are the protocols works at data link
layer?
PPP (Point to Point Protocol), HDLC (High-Level Data
Link Control)
28. What are the devices works at data link
layer?
Switch, Layer3switch and NIC.
29. What is the function of physical layer?
Physical layer is responsible for actual
transmission of bits over the medium. It deals with electrical and mechanical
functions.
30. What are the devices works at physical
layer?
Repeater and Hub
31. What is FTP and its function?
FTP stand for (File Transfer Protocol) it is used to
upload and downloading of files and folders from server to client and client to
server.
32. What is TFTP and its function?
TFTP stands for (Trivial
File Transfer Protocol) its function similar to that of FTP but it is a
connectionless protocol.
33. What is SMTP and its function?
SMTP stands for (Simple Mail Transfer Protocol): it
is used to transfer the mails from one mail sever to another mail server.
34. What is ARP and RARP?
ARP stand for (Address
Resolution Protocol): it is used to find MAC address of the device if IP
address is known.
RARP stands for (Reverse
Address Resolution Protocol): it is used to find the IP address of the device
if MAC address is known.
35. What is POP & IMAP with its functions?
POP(Post Office Protocol):
it is used to download mails form mail server to client pc.
IMAP(Internet Message Access
Protocol):it is used to access the emails from a remote server and it does not
download the mails.
36. What is the difference between hub and
switch?
HUB
SWITCH
it is a broad cast device
it is a unicast device
it works at physical layer of OSI model
it works at data link layer of OSI model
max no of ports are 24
max no of ports are 48
it shares the bandwidth
it does not shares the bandwidth
37. What is bandwidth?
It is the capacity of the medium to carry the signal.
38. What is the difference between switch and router?
SWITCH
ROUTER
it works at data link layer of OSI model
it works at network layer of OSI model
it works based up on MAC address
it works based up on IP address
switch transfer the data between LAN segments
Router transfer the data between LAN and WAN segments
it cannot share or transfer the data using internet connection
Routers are capable of sharing an internet connection
39. What is the difference between UDP & TCP?
TCP
UDP
it is connection oriented protocol
it is connection less protocol
it is reliable
it is not reliable
it is slower
it is faster
acknowledgement is possible
no acknowledgement
40. What do you mean by topology?
Topology defines the physical and logical structure of the network.
41. What are the types of topology?
Physical topology: it defines the way in which the devices are connected over a network.
Logical topology: it defines the way in which the devices are communicating with each other over the physical topology.
42. Which cable support maximum distance and maximum speed?
Fiber optic cable and its speed is 1Gbps to 10Gbps (theoretically unlimited)
43. What is the max speed and distance supported by UTP cable and its types?
1000Mbps and distance up to 100M.
Cat-1, cat2, cat-3, cat4, cat-5, cat-5e, cat6-, cat7
44. What is the difference between cat5, cat5e, cat6 and cat7?
Max speed of cat5, cat5e, cat6 and cat7 is same but the signaling frequency is different.
Cat5 and Cat5e🡪100MHz, Cat6🡪250MHz, Cat7🡪600MHz.
45. What is IP address? Types of IP address?
IP address is logical address which is used to identify the device on a network.
IP address is of two types.
Private IP address and Public IP address.
Public IP address is given by an ISP where as Private IP address is used in organization.
46. What is the difference between broad band and base band signal?
Base band
Broad band
digital signals are transmitted by using Base band
analog signals are transmitted by using Broad band
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signa
In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
it is a bi-direction communication
it is a unit-direction communication
47. What is the difference between IPV4 and IPV6?
IPV4
IPV6
it is a 32 bit address
it is a 128bit address
it is a binary address
it is a hexadecimal address
it is separated by .
it is separated by colon :
It is not well suited for mobile network
it is better suited to mobile networks
48. What is subnet mask and what are the default subnet mask for class A, class B and class C?
Subnet mask: it is used to identify the network bit and host bit of the network.
CLASS | SUBNET
MASK | |
A | 255.0.0.0 | |
B | 255.255.0.0 | |
C | 255.255.255.0 | |
49. What are the private IP addresses for class A, class B, and class C?
CLASS | RANGE |
A | 10.0.0.0 to 10.255.255.255 |
B | 172.16.0.0
to 172.31.255.255 |
C | 192.168.0.0
to 192.168.255.255 |
50. What is wireless network?
Wireless network is a network set up by using radio signal frequency to communicate among computers and other network device
51. What are the IEEE standards for wireless networks?
standard | speed | max
range |
802.11 | 2Mbps | 46meters |
802.11a | 54Mbps | 46meters |
802.11b | 11Mbps | 91meters |
802.11g | 54Mbps | 91meters |
52. What is Wi-Fi?
Wi-Fi (wireless fidelity) is technically an industry term that represents a type of wireless local area network (LAN) protocol based on the 802.11 IEEE network standard
53. What are WPA and WPA2 in wireless network?
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks
54. What is SSID?
A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN
55. What are the devices used to create wireless LAN?
Wireless NIC card, Access point
56. What is MAC address?
MAC address is the hardware or physical address which is embedded in the device given by IEEE.
57. What are the commands to view the MAC address?
Get mac and ipconfig /all is the command to find the MAC address.
IPV4 | MAC
|
It
is a logical address | it is a physical
address |
it
is a 32 bit binary address | it is 48 bit hex
decimal address |
it
is temporary address | it is permanent
address |
Separated
by . | separated by - |
58. What is the max distance supported by fiber optic cable?
100KM
59. What is host and node?
Host: any device on a network with valid IP address is called as Host. (example: PC network printer)
Node: any device on a network is called Node. (example: switch)
60. What is gateway?
The entry and exit of the network
61. What are server and client?
Server provides the services to the client request.
Client request for the services from the server.
62. What is domain?
Domain is a collection of devices with centralized administrator
63. What is work group?
Workgroup is a collection of devices without centralized administrator.
64. What is domain controller?
Domain controller is a server that control or responsible of provide to host access of all resource like printer, files, mail within the domain.
65. What is active directory?
Active directory is data base which stores the information about the objects likes users, group, O.U etc.
66. Where does active directory database is stored?
Active directory information will be stored in a file NTDS.DIT (New Technology Directory Service. Directory Information Tree) default size of NTDS.DIT is 12.1Mb
Default Location of NTDS.DIT is C:/Windows/NTDS
67. What are the protocols for active directory and port no’s?
Kerberos and LDAP are the protocol of active directory.
Ports no for Kerberos (88) and LDAP (389)
68. What is Kerberos?
Kerberos is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner
69. What is Sysvol?
The System Volume (Sysvol) is a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain.
70. What is tree and forest?
Tree: The hierarchical of individual domains is called tree.
Forest: The hierarchical of individual domains tree is called forest.
71. Where the domain user information does is stored?
NTDS.DIT file
72. Where the local user information does is stored?
SAM (Security Account Manager)
73. When do we called a server as active directory?
A sever which has FSMO roles is called is active directory.
74. What is FSMO roles and how many types of FSMO Roles are there?
FSMO stands for Flexible Single Master Operation.
It has 5 roles and they are classified into two types forest wide and domain wide
Schema master (forest wide), 2. Domain Naming Master (forest wide), 3. PDC Emulator (domain wide), 4. PDC Emulator (domain-wide), 5. RID Master (domain-wide).
75. What is DCHP? What is the function of DHCP?
DHCP (Dynamic Host Configuration Protocol) is used to assign an IP address to the client automatically.
76. What do you mean by APIPA and its range?
APIPA stands for Automatic Private IP Address. Whenever a DHCP server unable to assign IP address client system then client system generates an IP address itself is known as APIPA.
Range of APIPA 169.254.0.1 to 169.254.255.254
77. What is the default lease period of the IP address?
8 days
78. What do you mean by DHCP scope and what does it store?
A DHCP scope is a valid range of IP addresses which are available for assignments or lease to client computer.
It contains IP address range (address pool), address leases, reservation, and exclusion.
79. What do you mean by reservation, exclusion, address leases, and address pool?
Reservation: means a particular IP is reserved for a particular PC
Address leases: it maintains the list of IP addresses that are assigned to the client PC’s.
Address Pool: it contains a range of IP addresses to be assigned to the clients.
80. How to troubleshoot basic DHCP issues?
Ipconfig /release is the command to remove the current IP address.
Ipconfig /renew is the command to request for new IP address.
81. What is DNS? What is the function of DNS?
DNS means Domain Naming Service/server used for name resolution.
Name resolution: mapping hostname with IP address and IP address with hostname
82. What do you mean by zone in DNS and its types?
Zones are places where resource records are stored.
The zone is of two types. 1. Forward Lookup Zone: this contains information about the hostname with IP address
Reverse Lookup Zone: this contains information about an IP address with the hostname
83. What are primary and secondary DNS servers?
Primary DNS servers are called master servers whereas Secondary DNS servers are called alternate or backup DNS servers.
84. How to verify whether DNS is properly configured or not?
DNS lookup is the command to check whether the DNS is correctly configured or not.
85. What is IIS?
IIS (Internet Information Service) is a tool that is used for hosting websites.
A website is a collection of web pages.
86. What is CDC?
CDC (Child Domain Controller): it is the subdomain of the domain that inherits the properties of the parent domain also It reduces the load on the parent domain it is represented as www.snitsolutions.in
87. What is Group policy?
GROUP POLICY: It is an administrative tool for managing user’s settings and computers settings across the network.
88. What is OU?
It is a logical container that contains active directory objects (users, groups, computers, etc.)
It is also called a sub-tree and OU is the smallest scope or unit to which you can assign group policy settings or delegate administrative authority.
89. What is a VPN?
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet.
90. What are the VPN encryption protocols?
PPTP (Point to Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), SSTP (Secure Socket Tunneling Protocol)
91. What is a firewall?
A firewall that blocks unwanted and unauthorized access to the network and system.
92. What is IP Sec?
Short for IP Security, a set of protocols developed by the IETF to support the secure exchange of packets at the IP layer.
93. What is a mail server?
Mail server is software that maintains user mailboxes. Eg: Exchange server
Lotus Domino, etc.
94. Port numbers for various applications and services
There are a total of 65536 ports available. Below is a list of some well-known ports
95. What is a Logon script?
A logon script is a bat file or script file that runs when a user logs on.
96. What is the use of ping command?
It checks whether a computer can transmit data over a network.
97. What is the use of the tracert command?
This checks the path of a data packet flowing from one router to another until it reaches its destination.
98. When would you use a crosslink cable?
To connect similar device
What is the Internet?
It is a worldwide collection of computer networks cooperating to exchange data using
What is a packet?
A block of information with an IP address
A segment is a defined portion or section of something larger such as a data file.
A block of information with MAC address
Every service protocol has its service address known as the port number.
It represents the address of the network.
Comments
Post a Comment