DESKTOP SUPPORT ENGINEER INTERVIEW QUESTIONS ANSWERS PDF

adminComment(0)

Top 50 Desktop Support Interview Questions & Answers . 43) What is the difference between server OS and desktop OS? Download PDF. Desktop & Technical Support Interview Questions and Answers - Download as Word Doc .doc), PDF File .pdf), Text File .txt) or read online. System (DNS) is an Internet Engineering Task Force (IETF) standard name service that allows your. Interview question for desktop support engineer - Free download as Word Doc . doc /.docx), PDF File .pdf), Text File Download as DOCX, PDF, TXT or read online from Scribd .. System Administrator interview questions and raudone.info


Desktop Support Engineer Interview Questions Answers Pdf

Author:SIMON DOCHTERMAN
Language:English, Arabic, German
Country:United States
Genre:Children & Youth
Pages:542
Published (Last):10.04.2016
ISBN:680-2-69353-720-8
ePub File Size:23.79 MB
PDF File Size:15.61 MB
Distribution:Free* [*Registration needed]
Downloads:21837
Uploaded by: MIGUEL

+ Desktop Support Interview Questions and Answers, Question1: What is active It is prized by engineers because it uses very small amounts of electric. DESKTOP ENGINEER Interview Questions and Answers pdf free Desktop engineers provide support and implementation services to. Apps Technical Interview Questions and Answers PDF. Desktop Support Engineer - Interview. Questions and Answers. Updated Download the Questions as a.

After the repair is finished, you will be able to log on with your new password. Dll file is missing? A missing or corrupt.

Engineering Questions

Another program was uninstalled that removed a. A program was installed that overwrote the. A bad installation of a program corrupted one or more files causing the. Another user or program maliciously or mistakenly deleted the.

A hardware issue exists with the computer, such as a bad hard disk drive, causing the data on the drive to become corrupt, casing the.

What are the features of Windows XP?

Enhanced Device Driver Verifier Windows File Protection Protects core system files from being overwritten by application installations. Windows Installer A system service that helps users install, configure, track, upgrade, and remove software programs correctly. Kerberos Support Provides industry-standard and high-strength authentication with fast, single logon to Windows based enterprise resources. Synchronization Manager Lets users compare and update their offline files and folders with those on the network.

300+ TOP DESKTOP ENGINEER Interview Questions and Answers

Wireless Networking Support Provides secured access, as well as performance improvements, for wireless networks. Remote Assistance Remote Assistance enables a user to share control of his or her computer with someone on a network or the Internet. System Restore The System Restore feature enables users and administrators to restore a computer to a previous state without losing data. Recovery Console Provides a command-line console for administrators to perform administrative tasks.

Internet Connection Firewall A firewall client that can protect small businesses from common Internet attacks. Network Setup Wizard Makes it easy for a small business owner to set up and manage a network. System Preparation Tool SysPrep SysPrep helps administrators clone computer configurations, systems, and applications. A single image, which includes the operating system and business applications, can be restored to multiple different machine configurations.

What is Marshalling? The process of gathering data and transforming it into a standard format before it is transmitted over a network so that the data can transcend network boundaries. In order for an object to be moved around a network, it must be converted into a data stream that corresponds with the packet structure of the network transfer protocol.

This conversion is known as data marshalling. What are the differnt file system in windows? What is the maximum amount of databases that can be hosted on Exchange Enterprise? What 3 types of domain controller does Exchange access? What Exchange process is responsible for communication with AD? What must be done to an AD forest before Exchange can be deployed?

Run the following command: What are the required components of Windows Server for installing Exchange ? Exchange Setup requires that the following components and services be installed and enabled on the server: How can we solve this problem?

Desktop & Technical Support Interview Questions and Answers

Which of the following API is used to hide a window? What is Paging? In computer operating systems, paging is one of the memory-management schemes by which a computer can store and retrieve data from secondary storage for use in main memory. In the paging memory-management scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. In a computer system using segmentation, an instruction operand that refers to a memory location includes a value that identifies a segment and an offset within that segment.

A segment has a set of permissions, and a length, associated with it. If the currently running process is allowed by the permissions to make the type of reference to memory that it is attempting to make, and the offset within the segment is within the range specified by the length of the segment, the reference is permitted; otherwise, a hardware exception is raised.

How many types of operating system? Types of operating system There are several types of operating system, defined according to whether they can simultaneously manage information measuring 16 bits, 32 bits, 64 bits or more. However, contrary to what many believe, the two have almost nothing in common. RAM is This is reusable memory that the computer uses to run programs.

ROM is This is memory that has data permanently written on it and is usually not reusable. Types of RAM 3. Types of ROM 4. Similarities 5. Both are types of memory and both are vital for your computer to operate properly.

Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction. GUI Clients: These are applicatoins, where occassional requests to the server result from a human interacting with a GUI Example: Windows 3. These are applications, which are highly-iconic, object-oriented user interface that provides seamless access to information in very visual formats.

What is meant by Horizontal scaling and Vertical scaling? Vertical Scaling means to add more hardware resources to the same machine, generally by adding more processors and memory. What is Networking? A computer network is any set of computers or devices connected to each other with the ability to exchange data.

How can i install active directory in windows ? The member server should be located in the forest root domain. After you install AD DS successfully, the member server will become a domain controller. You can install AD DS on any member server that meets the domain controller hardware requirements. Click Start, and then click Server Manager. In Roles Summary, click Add Roles.

If necessary, review the information on the Before You Begin page, and then click Next. If necessary, review the information on the Active Directory Domain Services page, and then click Next. On the Confirm Installation Selections page, click Install. On the Operating System Compatibility page, review the warning about the default security settings for Windows Server domain controllers, and then click Next.

On the Choose a Deployment Configuration page, click Existing forest, click Add a domain controller to an existing domain, and then click Next. On the Network Credentials page, type the name of any existing domain in the forest where you plan to install the additional domain controller.

Under Specify the account credentials to use to perform the installation, click My current logged on credentials or click Alternate credentials, and then click Set.

In the Windows Security dialog box, provide the user name and password for an account that can install the additional domain controller. To install an additional domain controller, you must be a member of the Enterprise Admins group or the Domain Admins group. When you are finished providing credentials, click Next. On the Select a Domain page, select the domain of the new domain controller, and then click Next.

On the Select a Site page, select a site from the list or select the option to install the domain controller in the site that corresponds to its IP address, and then click Next. On the Additional Domain Controller Options page, make the following selections, and then click Next: DNS server: This option is selected by default so that your domain controller can function as a DNS server.

If you do not want the domain controller to be a DNS server, clear this option. Global Catalog: This option is selected by default. It adds the global catalog, read- only directory partitions to the domain controller, and it enables global catalog search functionality.

Read-only domain controller. This option is not selected by default. It makes the additional domain controller read only. If you selected Use advanced mode installation on the Welcome page, the Install from Media page appears. You can provide the location of installation media to be used to create the domain controller and configure AD DS, or you can have all the replication done over the network. Note that some data will be replicated over the network even if you install from media.

If you selected Use advanced mode installation on the Welcome page, the Source Domain Controller page appears. Click Let the wizard choose an appropriate domain controller or click Use this specific domain controller to specify a domain controller that you want to provide as a source for replication to create the new domain controller, and then click Next.

If you do not choose to install from media, all data will be replicated from this source domain controller. Windows Server Backup backs up the directory service by volume. For backup and recovery efficiency, store these files on separate volumes that do not contain applications or other nondirectory files. On the Summary page, review your selections.

Click Back to change any selections, if necessary. To save the settings that you have selected to an answer file that you can use to automate subsequent Active Directory operations, click Export settings. Type the name for your answer file, and then click Save. You can either select the Reboot on completion check box to have the server restart automatically or you can restart the server to complete the AD DS installation when you are prompted to do so.

What is difference safe mode normal mode? Safe mode is a troubleshooting option for Windows that starts your computer in a limited state. Only the basic files and drivers necessary to run Windows are started. In normal mode all basic files and drivers are necessary to run windows.

Think about ur college network if three departments where there and and 25 computers in each department and if someone ask u to group the computer s,what will be ccriteria to do that.

What is Firewall and types of firewall? A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria. There are several types of firewall techniques: Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules.

Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Circuit-level gateway: Once the connection has been made, packets can flow between the hosts without further checking.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. What is troubleshooting? To isolate the source of a problem and fix it. What is shadow copy? It is implemented as a Windows service called the Volume Shadow Copy service. How do you check whether Active Directory has been installed properly or not?

A web server can be referred to as either the hardware the computer or the software the computer application that helps to deliver content that can be accessed through the Internet. A web server is what makes it possible to be able to access content like web pages or other data from anywhere as long as it is connected to the internet.

Application server is a program that handles all application operations between users and an organization's backend business applications or databases. An application server is typically used for complex transaction-based applications. A database server is a computer program that provides database services to other computer programs or computers, as defined by the client—server model.

In case DHCP fails in your server then how do you satisfy that problem within some minutes? What is the Protocol? The main difference is that BOOTP was designed for manual pre-configuration of the host information in a server database, while DHCP allows for dynamic allocation of network addresses and configurations to newly attached hosts. How to rename domain name in win server? To rename a domain controller Open Command Prompt.

NewComputerName Restart the computer. From the command prompt, type: To rename a domain controller in a domain that contains a single domain controller Install a Windows Server member server in the domain. On the new server, create an additional domain controller by installing Active Directory.

After Active Directory is installed, enable the global catalog on the new domain controller. Transfer the operations master roles from the domain controller that you want to rename to the new domain controller.

Note that you must transfer the roles, do not seize them. Verify that the new domain controller is functioning correctly by doing the following: Verify authentications and global catalog searches. Run Dcdiag. Perform any other appropriate tests to verify that the new domain controller can provide all of the domain functions of the first domain controller. On the new domain controller, open Command Prompt.

Net share In the list that is generated, verify the existence of Sysvol and Netlogon. Uninstall Active Directory from the domain controller that you want to rename to be a member server. Rename the member server. Install Active Directory on the renamed server to create an additional domain controller.

Transfer the operations master roles back to the renamed domain controller. Enable the global catalog on the renamed domain controller. What is Wi-Fi? What is the latest version? The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.

What is mean topology and types of topology? Network topology refers to the way that your computer network is arranged. The network can have a physical or a logical topology. The physical topology describes the layout of computers and where the workstations are positioned.

The logical network topology describes how the information flows through the network. The different kinds of topology are: The word "bus" refers to the physical line that joins all the machines on the network. The advantages of this topology are that it is easy to implement and functions easily; on the other hand, it is highly vulnerable, since if one of the connections is defective, the whole network is affected. Star topology In star topology, the network computers are linked to a piece of hardware called a hub.

Unlike networks built with bus topology, networks which use star topology are much less vulnerable, as one of the connections can easily be removed by disconnecting it from the hub, without paralyzing the rest of the network. However, a star topology network is bulkier than a bus network, as additional hardware is required the hub.

Ring topology A ring topology is a network topology where each node device on the network connects to two other nodes. This forms a continuous path for the signal through each device. This works because data travels from node to node device to device. In a ring topology also called a ring network , each node handles the data packets itself, then passes it to the next node, which also handles the packets.

Mesh topology A mesh topology is made up of a network where each device has a point-to-point connection to every other device on the network.

This provides the dedicated capacity of a point-to-point link to each device and significant fault tolerance. The tree like structure allows you to have many servers on the network and you can branch out the network in many ways. This is particularly helpful for colleges, universities and schools so that each of the branches can identify the relevant systems in their own network and yet connect to the big network in some way.

What is a wild card certificate? A wildcard certificate allows you to secure multiple web sites with a single SSL certificate. Wildcard certificates are a service provided under Certificate Management Service. How many scopes con create in one dhcp? You can configure as many scopes on a DHCP server as is required in your network environment. What is VPN and what are the main advantages? A virtual private network VPN is the extension of a private network that encompasses links across shared or public networks like the Internet.

With a VPN, you can send data between two computers or two networks across a shared or public network in a manner that emulates a point-to-point private link. Virtual private networking is the act of creating and configuring a VPN. What is dhcp? DHCP includes the following features to reduce network administration: What is secured socket layer and what is the requirement of its in networking? SSL Secure Sockets Layer is the standard security technology for establishing an encrypted link between a web server and a browser.

This link ensures that all data passed between the web server and browsers remain private and integral.

Http is hyper text transfer protocol which is responsible for transmitting and receiving information across the Internet where as https is secure http, which is used exchanging confidential information with a server, which needs to be secured in order to prevent unauthorized access. HTTPS is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server.

What is Peer to peer Network? Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data.

Peer-to-peer networking also known simply as peer networking differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers.

What is the difference between a Virtual Server and a Dedicated Server? A dedicated server is a type of Internet hosting in which the client leases an entire server not shared with anyone.

This is more flexible than shared hosting, as organizations have full control over the server s , including choice of operating system, hardware, etc. A dedicated server could also be a computer that manages printer resources. However, that not all servers are dedicated.

In some networks, it is possible for a computer to act as a server and perform other functions as well. In the Web hosting business, a dedicated server is typically a rented service.

The user rents the server, software and an Internet connection from the Web host. A server, usually a Web server, that shares computer resources with other virtual servers. Virtual Web servers are a very popular way of providing low-cost web hosting services. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. In most cases, performance is not affected and each web site behaves as if it is being served by a dedicated server.

If too many virtual servers reside on the same computer, or if one virtual server starts hogging resources, Web pages will be delivered more slowly. What is Antivirus?

Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. What are Cold Boot and Warm Boot?

A hard reboot also known as a cold reboot, cold boot or cold start is when power to a computer is abruptly turned off, then turned back on. A soft reboot also known as a warm reboot is restarting a computer under software control, without removing power or directly triggering a reset line. What is the type of dsl technologies? According to the FCC, the different types of DSL technologies provide transmission speeds ranging from several hundred thousand bits per second to millions of bits per second.

All types of DSL Internet service can be categorized as either asymmetric or symmetric. Asymmetric means that most of the bandwidth is for sending data to the user downloading and only a small amount is available for uploading data. ADSL requires a splitter at the user's end to split the Internet data signal from the telephone signal.

DSL Lite also known as G. Lite is a slower version of ADSL that doesn't require a splitter at the user's end because the splitting happens remotely at the telephone company.

Larger businesses often use SDSL. SHDSL, which is faster and can optimize performance based on telephone line conditions. IDSL runs over a single pair of wires. How to take backup of Outlook Express explain all the steps in detail. To back up Outlook Express items Step 1: Copy message files to a backup folder Step A: Locate the Store folder 1.

Start Outlook Express. Click Tools, and then click Options. On the Maintenance tab, click Store Folder. In the Store Location dialog box, copy the store location. To do this, follow these steps: Put the mouse pointer at one end of the box under the Your personal message store is located in the following folder box.

Press and hold the left mouse button, and then drag the mouse pointer across the Your personal message store is located in the following folder box. Click Cancel, and then click Cancel again to close the dialog box. Step B: Copy the contents of the Store folder 1. On the Edit menu, click Select All. On the Edit menu, click Copy, and then close the window.

Step C: Create a backup folder 1. Right-click any empty area on your desktop, click New, and then click Folder. Step D: Paste the contents of the Store folder into the backup folder 1. Double-click the Mail Backup folder to open it. Right-click inside the Mail Backup folder window, and then click Paste. Step 2: Export the Address Book to a.

On the File menu, click Export, and then click Address Book. Click Browse. Select the Mail Backup folder that you created. In the File Name box, type address book backup, and then click Save.

Click OK, and then click Close. Step 3: Export the mail account to a file 1. On the Tools menu, click Accounts. On the Mail tab, click the mail account that you want to export, and then click Export.

What is cache memory?

Repeat these steps for each mail account that you want to export. Click Close. Step 4: Export the newsgroup account to a file 1. On the News tab, click the news account that you want to export, and then click Export. Repeat these steps for each news account that you want to export. To restore Outlook Express items Step 1: Import messages from the backup folder 1. On the File menu, point to Import, and then click Messages. Click Browse, and then click the Mail Backup folder. Click OK, and then click Next.

Click All folders, click Next, and then click Finish. Import the Address Book file 1. Select the Mail Backup folder, click the address book backup. Click Next, and then click Finish. Import the mail account file 1. On the Mail tab, click Import.

In the Look In box, select the Mail Backup folder. Click the mail account that you want to import, and then click Open. Repeat these steps for each mail account that you want to import.

Import the newsgroup account file 1. On the News tab, click Import. Click the news account that you want to import, and then click Open. Repeat these steps for each news account that you want to import. What is folder sharing?

Hiden Sharing: Open Sharing: Broadcast Domain: Broadcast domain is a restricted area in which information can be transmitted for all devices in the domain to receive. More specifically, Ethernet LANs are broadcast domains. Any devices attached to the LAN can transmit frames to any other device because the medium is a shared transmission system. Frames are normally addressed to a specific destination device on the network. While all devices detect the frame transmission on the network, only the device to which the frame is addressed actually receives it.

All network traffic is sent across the repeater unaltered. In addition, bridges maintain separate collision domains, so that computers on each segment only contend with other computers on the same segment for access. Collision Domain: The protocol allows multiple devices connected to a shared network cable to use that cable by taking turns accessing it.

The basic strategy goes like this: A computer listens on the cable to see if another computer is transmitting, which is indicated by a voltage change on the cable. If busy, the computer waits and listens.

When the cable is not busy, a computer attempts to transmit. Another computer may attempt to transmit at the same time, which causes a collision. Both computers that attempted to transmit must back off, wait, and then attempt to transmit again. Computers on the network detect collisions by looking for abnormally changing voltages. Signals from multiple systems overlap and distort one another.

Overlapping signals will push the voltage above the allowable limit. This is detected by attached computers, which reject the corrupted frames called runts. How do you check the listening ports on a windows box? Command line. Diffrent types of cables used in lan cabling? UDP uses the Internet Protocol to actually get a data unit called a datagram from one computer to another. However, UDP does not provide the service of dividing a message into packets datagrams and reassembling it at the other end.

This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. Network applications that want to save processing time because they have very small data units to exchange and therefore very little message reassembling to do may prefer UDP to TCP.

Explain Application Layer with the help of application layer protocol? In the Open Systems Interconnection OSI communications model, the application layer provides services for an application program to ensure that effective communication with another application program in a network is possible.

The application layer is not the application itself that is doing the communication. What is modem and what use of in networking? A modem is a Modulator and Demodulator. It's like a bridge between computer and ordinary telephone lines. Telephone lines only accept analog signals but computers only accept digital binary signals so modems help link them. Routers then emit the digital signal. A modem is a device that modulates an analog carrier signal to incode digital infomation.

How to connect two hosts with different subnet each other to communicate? How to connect How to configure SMTP connector in exchange server for external outgoing mail? To create and securely configure the SMTP connector follows these steps: Start Exchange System Manager. Start the System Manager from the Microsoft Exchange program group.

Right click the top-level node and on the shortcut menu, click Properties. In the message box that informs you that you need to restart the System Manager, click OK, and then restart System Manager. There should be a container called Administrative Groups in the console tree. Expand the nodes. What is tracert command? What are the types of printer? What is a safe mode in Windows OS Explain last known good configuration.

What is disk clean up, disk defragmentation, device manager, and system restore? Explain the differences between USB port and Firewire port? How do you install a printer in Windows XP? What is a browser and name any 5 browsers? What is a Serial port What is a parallel port What is the difference between a serial port and a parallel port? What is an A record? What is a PTR record? Define RAS server What is a port number?

Explain different RAID levels. What is an IAS server? What is packet data? Explain the difference between IP v4 and IP v6. Explain a group with respect to network administration Explain child domain and its uses.

What is an organizational unit with in terms of a domain? Expalin rights, policy and permission in network administration. What is a domain controller? Explain what is additional domain controller What are the types of active directory partitions.

How do you make a computer run faster? What is attrib command? What is edit command? How do you copy a file or folder using copy command? How do you format the hard disk using command line utilities? Explain mkdir , rmdir, and chdir commands. What is the path of host file in Windows OS? Explain the types of hard disk. What is a router? What is a bridge router? What is the difference between primary and secondary partition?

What is a backup? What are the types of backups in Window OS? Explain the differences among differential backup, incremental backup, and copy backup. What is remote desktop? What is the difference between recovery console and automated system recovery? How many bytes are there in MAC address?

Name the range of Class A IP address. Name the range of Class B IP address. Name the range of Class C IP address. What is the transmission speed of T1 carrier? List out some ports that are available on a computer What are some common types of LAN cable? What is a social engineering attack? What is a phishing attack? What is Denial of Service attack in hacking What is eavesdropping with respect to hacking What is virus with respect to computer technology?

What does it mean when a program is x86? Difference between x86 and SysWoW64 folders I could go on and on forever writing questions and you could also go on and on searching for "Desktop Support Engineer Interview Question," but the fact is that if you are going for L1 level 1 positions, you only need to do your basics well.

Answers You have had the training, practicals, and stuff like that, now answer the questions in your own words. Practical Demonstrations Besides fact-based questions you will also be tested on your practical skills. Last Word Get properly dressed and don't excessively stare at the receptionist lol.

Do You Still Want Answers? Yes No I now agree that one needs to answer by himself See results. How to appear for an Interview. Questions must be on-topic, written with proper grammar usage, and understandable to a wide audience. Could you please send me answers of all questions at azarkh gmail. Sir, You're Awesome, I'm Very happy all the question. Please send me to answer all the question-related L1, L2 Desktop-Engineer. Dear Sir, Please send me desktop l1 and l2 level interview question and answer.

Regards Harikrushna. Hello Try to give answers also. What is the use of giving questions without answers? Pl send me a Desktop support questions answers pdf.

Please send the all the questions and answers on email id vijay. Some tools that help are: How would you handle a user who continually misdiagnoses their PC issues?

They are also looking for how you will prioritize each of these incidents. How do you handle setting up new employees? The role of the desktop technician is to help ease the new employee into the resources available to them and get them up to speed quickly.

In this situation. In responding to this question. Technical Questions Q. These components may include: It might also include a FAQ on getting help. What the hiring manager is trying to assess is how you set expectations with each of the individuals. This question is used by the hiring manger to assess your problem-solving abilities. How do you manage these conflictingpriorities? Obviously this is a trick question. Imagine the following situation: By asking this question. This question is used by the hiring manager to assess your knowledge of common practices within the IT department.

What hiring managers want to know is whether you have time-management skills. Anti-virus software: Internet downloads. What are some of the guidelines you would recommend for implementing security at the user level?

This is virus protection just to ensure that you understand the basics of protecting against viruses. What are typical virus sources and how do you prevent virus attacks? The major changes include the following: Has anything changed with the system for example. Possible virus sources include e-mail attachments. Some of the top techniques are included below. Verify updates have succeeded. As the closest point of contact to the end-users. The following provides a concise summary of some of the major differences.

XP is a minor update with Windows designed to get Windows technology into the hands of consumers. What are the main differences between the following operating systems? To prevent virus infections: Customer service. Windows Servers. Password security: Instruct users not to give out their passwords. Knowledge requirement will include but not limited to the following Windows Operating systems.

Instruct users not to write down their passwords. Anti Viruses. Desktop engineer who works in help desks is responsible to providing user advice. The general job description of a desktop support engineer is: As a demanding profession. Windows and XP Desktop security: Instruct users to enable screen savers that automatically lock their PC when there is no activity on it for more than five minutes.

Active Directory. Office System. Instruct users to make sure their password cannot be easily guessed by using a combination of alphanumeric characters. Tell how you installed and test computer system an ensured they function properly. Describe how you have worked with your staff members to figure out solutions to major issues. Provide examples if necessary. Are you a team player? Did you work in a team to solve problems?

Have you worked independently also? As a desktop engineer you must have the proper ability to work with others and alone. Tell how you test computers to ensure they function properly. Have you trained or coached employees on computer systems? If you did. Have you used to test network and desktop systems — Have you trouble-shouted computerized systems? In your answer. What is your specialty? Have you provided desktop support for hardware. Explain the step taken to ensure smooth upgrade.

Have you upgraded computer systems or offered recommendations on upgrades needed. This article covers sample of job interview questions for technical desktop support engineers also called help desk engineers and provides tips on answering these questions.

Interview question for desktop support engineer

A success story. Tell me about your daily routine as a desktop engineer? Tell how did you provide help-desk support to the employees on their desktop systems such as — network servers. If you are. Describe physical setting up of hardware and software systems installation for various applications and programs. Show how you well versed with special systems. Have you been responsible for downloading new computer systems to your organization? If you were responsible for these activities.

You may also tell about installing equipments for monitoring computer performance. Have you interacted with the IT staff? You must present your ability to handle different tasks and challenges. Coordinating with Information Technology professionals to enhance system communication. Interview question for desktop support engineer Uploaded by Aalok Singh. Flag for inappropriate content.

Related titles. Tech Interview Questions: Expand BIOS: A Basic Input. Windows Server Interview Questions and Answers. Interview Questions for Desktop Support Technician.

System Administrator interview questions and answers. Jump to Page. Search inside document. List of Probable questions 1. Explain mkdir, rmdir and chdir commands Types of hard disk Documents Similar To Interview question for desktop support engineer.

Syed Abdul Hafeez. Najim Shaikh. Geno Thomas. Vimal Vallathol. Riyas Jacksparow.If you are, give details. Remplmon 3. POP server It is basically used for sending and receiving the mail.

Cross cable: Restart the server and make sure you update your backup. Go to properties and then click on appearance tab. MSI Microsoft Installer allows install, uninstall and repair the program with a single file, while.

TANGELA from Kissimmee
I fancy exploring ePub and PDF books gracefully . See my other articles. One of my hobbies is worldbuilding.
>