Windows PC and servers installation and support

You’ve received a trouble ticket that monitor is not working; what is the first thing you should do?

The thing you should do is check to see if all cables are plugged in correctly. First check power, then video signal cable and if both check out make sure that computer itself is powered on. If asked for further troubleshooting steps, explain that there is a possibility that video driver or PC hardware could be causing the issue

What is Safe Mode, how do you get to it, and what is it used for?

In order to reach Safe Mode, computer must be restarted and by pressing F8 key before the OS loads. You will arrive at the selection screen at which you will scroll up to select ”Safe Mode”. Safe Mode is used to troubleshoot driver issues, hardware issues and remove viruses or unwanted software.

What is an IP Address and how to find it? OR .Which commands would you use in CMD to test network connectivity?

IP address is a number assigned to your computer to identify its existence/location on a network. Meaning that DHCP server will assign a number to each computer connected to a network as part of identification.

You can find your IP address by opening a Command Prompt Windows “CMD” and type in ipconfig/all. Alternatively, you can look at network adapter properties.

What is a Default Gateway?

You can see what the Default Gateway is by performing an ipconfig/all command through CMD. Default Gateway serves as a path to reach other networks… For example, in order to reach the internet outside of your business or home; you need a gateway that will open the way for you. Default Gateway in a business environment is typically a proxy server.

You receive a trouble ticket that states: “My printer is not working properly. It prints out weird pattern on paper. Please assist.”

This issue is caused by a bad/wrong printer driver. Solution is to acquire and install a correct printer driver.

What are some commonly used LAN Cables?

There 4 different types of LAN Cables: CAT5, CAT5 e, CAT6, and CAT6 a.

CAT5 speeds are up to 100mbps, CAT5 e up to 1000mbps, CAT6 up to 1000mbps certified gigabit. and CAT6 a up to 10,000 mbps. All the speeds are based of 100meters maximum distance.

What is Blue Screen of Death (BSOD)?

BSOD is most commonly caused by bad hardware; the error appears as a blue screen crashing the computer. BSOD can be caused by hardware, software or driver issues and conflicts. In order to trouble shoot BSOD you will need to run a full Hardware diagnostic on the PC and update all of the drivers.

What is DHCP?

DHCP stands for Dynamic Host Configuration Protocol and it deals with handling of IP addresses for all computers connected to a network. Each computer is allowed to have connection to the network or internet resources after DHCP Server assigns an IP address, dynamically. Dynamic type of IP address can change at any point.

What is DNS?

DNS stands for Domain Name System and it’s mostly used to interpret Domain names in to numeric ip address. DNS uses port 53 TCP or UDP  it reroutes known host names to IP address that hosts it’s service. For example; DNS for www.microsoft.com is located at 104.90.84.14, but it can change randomly. You could say that it serves as an address book for the host names, which are then translated in to numbers (ip) in order for computers to understand it. In this example it assigns and routes web address names to webhosting services.

What is VPN?

A Virtual Private Network is commonly used as a secure way to connect from remote location to network resources in your business/company. For example; you can take your laptop to a coffee shop, start a VPN, and through it securely connect to a PC at work, or access company’s emails and files.

What is ping command and it’s use?

Generally, the Ping command is used to determine whether your computer has access to external resources or the internet. Through command prompt (CMD) type ping www.microsoft.com. This function sends 4 packets of data which are sent back as acknowledgment of successful connection. It also provides the latency results measured in milliseconds.

What is a .PST file?

.PST is a file extension used by MS Outlook archive file. An email archived would commonly be known as a PST.

How would you change folder permissions?

You can change folder permissions through Group Policy but it can also be done at local level with Administrator Privileges. Under folder properties, select Security tab and then Edit button, after which a pop up will provide and ability to add users and allow for Read, Write. Execute, or Full permissions.

What is a difference between a Switch and a Hub?

There are a couple of main differences between Switch and a Hub. Hub can be used to connect multiple computers to a single network, while switch can be used to create multiple segments of the same network. Second difference is that with a Hub all computers connected to it receive the data packets at once; which can create latency issues. Switch can regulate this by only sending data packets to computer that requested it.

How would you recover data from Virus infected computer?

In order to successfully and safely recover data you would extract the HD from the infected computer. Slave it to a second computer that has updated virus definitions, updated MS patches and drivers. From there you would scan the drive for viruses and once virus is removed you can extract data that needs to be recovered.

What is RAID?

Stands for Redundant Array of Independent Disks and is used to provide data redundancy (mirroring) across multiple hard disks. It can also be utilized to improve read/write performance across the server by using striping configuration. For example RAID 1; two or more disks with identical data stored (redundancy). RAID 0; two or more disks, data distributed evenly to improve performance (no redundancy).

What does IntelliMirror do?

As part of Windows Server OS, IntelliMirror provides assistance in managing user data, computer information, applications and settings. This is used by user Group Policy that defines business roles, group memberships and locations. For example, if a user moves to a different computer; the applications, settings, and stored files will follow.

Explain what Group Policy is.

A Group Policy is used to control user’s desktops and computer configuration by creating a default template for specific members of the group. This makes it easier to control and process large groups of users.

Can you name different types of email servers and which ports do they use?

You can have two types of email servers:

Incoming Mail Server (POP3 port 110, IMAP 143, HTTP 80)

Outgoing Mail Server (SMTP port 25)

Do you know what Virtual Machine is?

Virtual Machine is an emulation version of Operating System. You can have multiple copies of Windows Server running on a single hardware platform. This is mostly done through 3rd party software.

Do you know what “Tattooing” the registry means?

Basically, the group policy will make the changes to user’s registry but once the group policy is no longer in effect, registry values would not revert back leaving them tattooed in, sort of speak.

Why should we hire you?

This is your last chance to impress potential employer. Talk about any other experience that you may have related to this job. Mention things any employer could ask from their associates; for example being dependable, hardworking, and being a team player.

Friends, I know it can be hard to prepare for an interview and frankly nerve wrecking, but try to relax and answer all questions with confidence. It can be really hard to predict exact questions asked during an interview, so please study from many sources before taking up an interview, to maximize your chances in succeeding. Also, don’t forget to research the company beforehand.